last executing test programs: 3m15.01558283s ago: executing program 32 (id=1927): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x7fff}, 0x18) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000000)='cpu~\t\t') 2m31.667637987s ago: executing program 33 (id=2986): mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1000002, 0x11012, 0xffffffffffffffff, 0x10c000) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000000100)=0x0) r2 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) read$qrtrtun(r2, 0x0, 0xeffd) timer_settime(r1, 0x1, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00'}, 0x18) preadv(0xffffffffffffffff, 0x0, 0x0, 0x6, 0xa) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_open_dev$sg(0x0, 0x0, 0x5) syz_io_uring_setup(0x22f, 0x0, &(0x7f0000000000), &(0x7f0000000a00)) r3 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x8, &(0x7f0000000200)=0x7fffffff, 0x4) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f0000000080)=@req3={0x8000, 0x6, 0x300, 0xfc}, 0x1c) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x20000000000001d2, &(0x7f0000000300)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x21}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 2m31.469943716s ago: executing program 34 (id=2988): timer_create(0xf3a61c91401d7c85, &(0x7f0000533fa0)={0x0, 0x21, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@newtaction={0x68, 0x30, 0x53b, 0x0, 0x0, {}, [{0x54, 0x1, [@m_simple={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_DEF_PARMS={0x18, 0x2, {0x0, 0xfffffffd, 0x20000000}}, @TCA_DEF_DATA={0x5, 0x3, '\x00'}]}, {0x4}, {0xc}, {0xc, 0x8, {0x1, 0x3}}}}]}]}, 0x68}}, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02000000040000000100000027"], 0x48) mmap(&(0x7f0000fa5000/0x1000)=nil, 0x1000, 0x9, 0x11, r2, 0xb5748000) timer_gettime(r0, &(0x7f0000000040)) 2m30.587547034s ago: executing program 35 (id=2992): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f00000016c0)={0x10, 0x0, 0x25dfdbfb, 0x40000044}, 0xc) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f0000000300)={[{@grpquota}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x800}}, {@quota}, {@stripe={'stripe', 0x3d, 0x2}}, {@jqfmt_vfsold}]}, 0x1, 0x4fa, &(0x7f00000005c0)="$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") set_tid_address(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r2 = openat$cgroup_devices(r1, &(0x7f0000000380)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r2, &(0x7f0000000000)=ANY=[@ANYBLOB='b 75:*\tr\nr'], 0xa) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x22400049, &(0x7f00000002c0)={[{@nombcache}, {@abort}, {@nomblk_io_submit}, {@noblock_validity}, {@nolazytime}, {@jqfmt_vfsold}, {@jqfmt_vfsv0}, {@barrier_val={'barrier', 0x3d, 0xd95a}}, {@debug}]}, 0x84, 0x480, &(0x7f00000004c0)="$eJzs3M9vFFUcAPDvTH8gP0oXxB8gyioSG9GWFlQOXjSacDEx0YMea6kEWcDQmgghUo3Bo/EvUI8m/gWe9GLUk8ar3o0JMVxED2bN7M7Att2tbbfbBefzSab73vx6782b13kzb2cDKK1q9ieJ2BERv0TEaDO6eIVq8+PG9cszf12/PJNEvf7KH0ljvT+vX54pVt2Rf27P9zmWRqQfJrHQJt25i5fOTNdqsxfy+MT82bcn5i5eevL02elTs6dmz00dP37s6OQzT089tSHlHMnyuu+98/v3nnj9k5dmYuGN77/M8j+QL28tR1Ol6zSrUY16vV5PF80dbvw91PXeby8jLeFksI8ZYU2y8z+rrqFG+x+NgbhVeaPx4gd9zRzQU9n1adeyuc2rYnooaSwH/q+0cSir4oqf3f8W0+b2QPrr2nPNG6Cs3DfyqblkMLL79qTSvGMf6FH6OyLitYW/P82maPscAgBgY32d9X+eaNf/S+PelvV25mNDlYg4HBG7I+LuiNgTEfdENNa9LyLuX2P61SXx5f2fn7auq2CrlPX/ns3Hthb3/26O2lQG8thIo/xDyZuna7NH8mMyFkNbsvjkCml888LPH3daVm3p/2VTln7RF8zz8fvglsXbnJyen+6mzK2uvR+xb7Bd+ZObIwFJROyNiH3r2H92zE4//sX+LLxz+/Ll/13+FWzAOFP984jHmvW/EEvKX0iaKXUan5y4K2qzRyaKs2K5H368+nJrfKgl3FX5N0BW/9vanv95+YtmUIzXzq09jau/ftTxnma95/9w8mojPJzPe3d6fv7CZMRwPmPR/Klb2xbxYv2s/GMH27f/3RH/fJZv90BEZCfxgxHxUEQcyPP+cEQ8EhEHVyj/d88/+tbKR6i/9X+yQ/3nZ0AlaR2vX0dg4My3X3VKf3X1f6wRGsvnrOb/32oz2N3RAwAAgDtD2hiDTtLxm+E0HR9vfod/T2xLa+fn5g9X451zJ5tj1ZUYSosnXaMtz0Mn82fDRXxqSfxoROxqfNNoayM+PnO+NtLvwkPJbe/Q/jO/9epLL8DtY03jaEnv8gFsPu9rQnlp/1Be2j+Ul/YP5dWu/V+JuNGHrACbzPUfykv7h/LS/qG8tH8opeWvxBc/t7KeN/1vBXaf6GrzEgUGutt8IiLaLorWH+3oQSDSPh66+pV6vZv9pP2v9wtzB/LAlohY7VZXelqnS8+fFXk7AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAuCP8GwAA///IPOO2") syz_mount_image$msdos(&(0x7f0000000180), &(0x7f0000000000)='.\x00', 0x2046022, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, &(0x7f0000000000)) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 2m30.343478288s ago: executing program 36 (id=2996): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x7, 0x4, 0x80, 0x1, 0x28}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x17, 0x8, &(0x7f0000000080)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r0}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000f00)='kfree\x00', r1}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f0000000680)=@newtaction={0x180, 0x30, 0x216822a75a8bdd29, 0xffe4, 0x0, {}, [{0x16c, 0x1, [@m_connmark={0x50, 0x2, 0x0, 0x0, {{0xd}, {0x20, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x3, 0xd, 0x5, 0x0, 0x3}, 0x8}}]}, {0xfffffdd6}, {0xc}, {0xc}}}, @m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0xd4, 0x3, 0x0, 0x0, {{0x9}, {0x58, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0x0, 0x3, {0x2, 0xea3, 0x7}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0x1d28}}, @TCA_GACT_PARMS={0x18, 0x2, {0xb66, 0xb3, 0x10000000, 0x34e, 0xffff}}, @TCA_GACT_PARMS={0x18, 0x2, {0x7ff, 0xd8, 0x0, 0x9, 0x100000e0}}]}, {0x52, 0x6, "a06b1d1931f3579c6d7c5159238a286074602c3726c701f3c0d5382de62a6e8c4fb714fcd674c66cd306a4f78d3d05530609c9b04b7483bd084d70df8e77e6fbd503917aa0a6c737cef0ed021b60"}, {0xc}, {0x1, 0x8, {0x2, 0x2}}}}]}]}, 0x180}}, 0x0) r3 = syz_open_dev$hiddev(&(0x7f0000000240), 0x4, 0xb80) ioctl$HIDIOCGUSAGE(r3, 0xc018480b, &(0x7f0000000540)={0x1, 0x200, 0x80000000, 0x3ff, 0x9be, 0x7f}) chdir(&(0x7f0000000040)='./file0\x00') prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) chroot(&(0x7f0000000300)='.\x00') r4 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53048fc) close(r4) getpeername$packet(r4, &(0x7f00000002c0), &(0x7f0000000400)=0x14) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0xf) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="02142000110000000040000000000000030005"], 0x88}}, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000011c0), 0x2401, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffd}, 0x94) r7 = syz_open_dev$sg(&(0x7f00000002c0), 0x0, 0x0) ioctl$SG_IO(r7, 0x2285, &(0x7f0000000040)={0x53, 0xfffffffe, 0x6, 0x1, @buffer={0x300, 0x49, &(0x7f0000000440)=""/73}, &(0x7f0000000380)="259374c96ee3", 0x0, 0xffffffff, 0x30, 0x0, 0x0}) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0xb, 0x59032, 0xffffffffffffffff, 0x0) r8 = getpid() madvise(&(0x7f0000a5e000/0x1000)=nil, 0x1000, 0x17) process_vm_readv(r8, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) 1m58.69891582s ago: executing program 37 (id=3516): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xc94284a3061bb7fe, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', 0xffffffffffffffff, 0x0, 0xffffffffffffffff}, 0x18) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r0 = socket$nl_rdma(0x10, 0x3, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc90, 0x0, 0x0, 0x0, 0x23, 0x8, 0x0, 0x0}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000d7c900000900000001"], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x810) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000880)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r1, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r3}, 0x10) getitimer(0x2, &(0x7f0000000340)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000181100", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000180)='kfree\x00', r5}, 0x18) r6 = socket$rds(0x15, 0x5, 0x0) bind$rds(r6, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10) sendmsg$rds(r6, &(0x7f0000000080)={&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) sendmsg$rds(r6, &(0x7f0000000140)={&(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r6, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={0x38, 0x1403, 0x1, 0x70bd26, 0x25dfdbff, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'veth0_to_bridge\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x20000010) r7 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x10042, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000840)={0x0, @in={{0x2, 0x4e20, @multicast1}}, 0x9, 0x666, 0xdc, 0x9, 0x2}, &(0x7f0000000300)=0x98) sendmsg$inet_sctp(r7, &(0x7f0000000ac0)={&(0x7f0000000140)=@in6={0xa, 0x4e22, 0x9, @empty, 0x7}, 0x1c, &(0x7f0000000700)=[{&(0x7f0000000380)="946a9c27f1b889c1d83cc733c03ca68d8d7fdeb33c1bd6eb081236010597f5e0982e11cfca72946ec5b07dad1fe5bf2ff0f632266e5d55835a2e56066b479f4419666cc90c09d91fbdc15505bded7ab77a6f1715394639df4016f5e561e70f8f39a0aa5ed57f1d348630abd4624c88e2d80f836f1f73b113e875e0cf33152907213d4090ec012992b0c58f5799b8b76e2ca3b94b1291809fb921d1aa5871dedd9f9faaff1ec588046a1ac286963ef15d327321a3e4932d4ffe77caa60b144f44815f2800026de791798b978c", 0xcc}, {&(0x7f0000000480)="3da5c04ed2e20fb5f2449a9c6cc773043ccde76c499d3dc4717b4d8b022c2150ba2bd0ca3909eaa1644c5011185ddb49b37d048b23525a99a5d988ea911c8838b2fd579cba0d43738b10e034293a6c86d9e784a8a1a9ae60c676d85d6386c009ff6939c1379b275de8240594b135ff308e1d4884f856c384ddb200662080825a02142532c4d0f61894c5f0474014b5971193bd2811c239a1cec0b1383d6a8f74eb622005dce4526dc3537dee609a9de059018830721b03409a0cc961db0639a221e4884c8e990c368c1b4bbcec2268ed6596fb30838970415c90429ece27d03ecb3fc71d050e06", 0xe7}, {&(0x7f0000000280)="72639af4aeae66f6c5b73a6a81301d65f60405a95386cb6468609b25ecb35c938c1d7c7f8b5474a4c3db5c90141c4f6d8e5fd399a8f61b541944fdf7c6ac33a7ebb4de8ef04c75129b2fee2aa7f4b118cbf9a1cefefacb2b8ef52f530cc4441db88bdb022f6d08a3f14e47544b0ae8eb74c3fd60792f92a88e7e", 0x7a}, {&(0x7f0000000580)="4742339dabe59cc8fdbc956ca4e0925b84e16d82af74a51897226c4a735699ce4308f31d6f5e771e4fef6db04d237d59b7f1d08d24087cba4325907271642d9925aae1f7b33ed55f700d1974efcf4f79c03274d02b0d4659cdd15033af9fcf71869bc862d0cd22a57ebb8850525898732bf44e705179d99d1f68d5ad106acac25082728527ffb63660786cea", 0x8c}, {&(0x7f0000000640)="2b3a3aaa2547c6e67d9086757a35d6ad1b95189345c6381bd35aa708a4f84d9c4f7f632223e3b73537f981185d0eedee11b4d5713f39b744778695bbfe1863c37fcb174e6a724a1c804d7ee8343e148157f7f328e37104b51d427c2a548ff89d3a9d3ed0b544af30ea6d13c9f1c430570a3e4e8287e08b7165b6fc7a15d81b6887fdc28f", 0x84}], 0x5, &(0x7f0000000900)=[@dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0x64010102}, @authinfo={0x18, 0x84, 0x6, {0xff}}, @authinfo={0x18, 0x84, 0x6, {0x1}}, @sndrcv={0x30, 0x84, 0x1, {0x8, 0xa, 0x2, 0x3, 0xfffffffb, 0x7, 0x2, 0x8, r8}}, @dstaddrv6={0x20, 0x84, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @dstaddrv6={0x20, 0x84, 0x8, @remote}, @authinfo={0x18, 0x84, 0x6, {0x1}}, @prinfo={0x18, 0x84, 0x5, {0x20, 0xea}}], 0xe8, 0x1000}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000002fc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@ipv4_newroute={0x34, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_SPORT={0x6, 0x1c, 0x4e23}, @RTA_OIF={0x8}, @RTA_IP_PROTO={0x5, 0x1b, 0x1}]}, 0x34}}, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f0000000000)=0x4, 0x4) 1m32.129303365s ago: executing program 3 (id=3980): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000680)='./file0\x00', 0x0, &(0x7f0000000340)={[{@usrquota}, {@nojournal_checksum}]}, 0x21, 0x4bd, &(0x7f00000006c0)="$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") r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000000180)=@file={0x1, './file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa'}, 0x6e) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="01000000040000000300"/20, @ANYRES32, @ANYBLOB="feffffff00"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000007c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000feffff18110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000feffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000200085000000030000009500000000000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x1) r5 = socket$phonet(0x23, 0x2, 0x1) r6 = dup2(r5, r4) write$ppp(r6, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000980)='sys_enter\x00', r8, 0x0, 0x2}, 0x18) r9 = socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r9, 0x8933, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x2, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000680)='kfree\x00', r10, 0x0, 0xfffffffffffffffb}, 0x18) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r11}, 0x10) clock_gettime(0x0, 0x0) sendmsg$nl_route(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000008c80)=ANY=[@ANYBLOB="2c00000026000506"], 0x2c}}, 0x800) recvmmsg(r9, &(0x7f0000007700), 0x4000267, 0xfc0, 0x0) sendto$inet(r6, 0x0, 0x0, 0x800, 0x0, 0x0) r12 = socket$inet6(0xa, 0x800000000000002, 0x0) sendto$inet6(r12, 0x0, 0x27, 0x400ed80, &(0x7f0000000040)={0xa, 0x4e22, 0x10000, @local}, 0x1c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) 1m31.904523518s ago: executing program 3 (id=3981): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='ns\x00') symlinkat(&(0x7f0000000200)='./file0\x00', r1, &(0x7f00000002c0)='./file2\x00') ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000140)=@v2={0x2, @adiantum, 0x1, '\x00', @a}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000021007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x80082, 0x0) write$vga_arbiter(r3, &(0x7f0000000200)=ANY=[@ANYBLOB='lock i'], 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000006000000000000000064000000070000000c0000000000000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, 0x2}, 0x94) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x136, 0x136, 0x6, [@typedef={0x10000, 0x0, 0x0, 0x8, 0x1}, @ptr={0x0, 0x0, 0x0, 0x2, 0x2}, @datasec={0x4, 0x8, 0x0, 0xf, 0x2, [{0x4, 0x7, 0x2}, {0x3, 0x46fc, 0x2}, {0x1, 0x2, 0x7fffffff}, {0x4, 0x673, 0x8}, {0x2, 0x2, 0xa4ac}, {0x3, 0xb636, 0x7f}, {0x1, 0xd, 0x8}, {0x1, 0x54da, 0x3}], "dfcc"}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x5, 0x2}]}, @func_proto={0x0, 0x7, 0x0, 0xd, 0x0, [{0x4, 0x2}, {0xd}, {0x2, 0x3}, {0xd, 0x4}, {0xf, 0x5}, {0x4}, {0x4, 0x5}]}, @struct={0x6, 0x3, 0x0, 0x4, 0x0, 0x7, [{0x1, 0x3, 0xfffffff3}, {0x10, 0x4, 0xc}, {0x10, 0x0, 0x4a}]}, @typedef={0x8, 0x0, 0x0, 0x8, 0x1}, @func={0x6, 0x0, 0x0, 0xc, 0x4}, @int={0x9, 0x0, 0x0, 0x1, 0x0, 0x5d, 0x0, 0xb}]}, {0x0, [0x61, 0x0, 0x0, 0x61]}}, &(0x7f00000000c0)=""/15, 0x156, 0xf, 0x0, 0x2}, 0x28) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x6, '\x00', 0x0, r6, 0x3, 0x5}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r5}, 0x10) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f00000035c0)={0x0, 0x0, &(0x7f0000003580)={&(0x7f0000000680)=@newsa={0x154, 0x10, 0x1, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80, '\x00', 0x3a}, @in6=@mcast2, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {@in6=@remote, 0x0, 0x6c}, @in=@dev={0xac, 0x14, 0x14, 0x1f}, {0x0, 0x0, 0x0, 0xfffffff800000003, 0x9, 0x0, 0xffffffffffffffd}, {0x0, 0x4}, {0x0, 0x2000}, 0x0, 0x0, 0xa, 0x1, 0x6}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}, @encap={0x1c, 0x4, {0xfffffffffffffffd, 0x4e20, 0x4e21, @in6=@private0={0xfc, 0x0, '\x00', 0x1}}}]}, 0x154}, 0x1, 0x0, 0x0, 0x4004050}, 0x8000) io_setup(0x6, &(0x7f0000000680)=0x0) io_submit(r8, 0x2, &(0x7f0000000400)=[&(0x7f0000000000)={0x180a, 0x0, 0x3, 0x1, 0x0, r4, 0x0, 0x0, 0x16}, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x8, 0x3, r4, &(0x7f0000000040)="580c90d91adbd5a923", 0x9, 0x1}]) 1m31.851581013s ago: executing program 3 (id=3982): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0x13) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000080000000000000000000001811", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r2}, 0x10) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f00000000c0)={0xfffffff8, 0x40000000, 0xfffbfffd, 0x9, 0x53, "0c41920887e8d2b791f19dd026d76d7fcb366b", 0x4, 0x200}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000040)=0x8) 1m31.850872483s ago: executing program 3 (id=3983): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x18) socket$inet(0x2, 0x2, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x2000044, &(0x7f0000000040)={[{@nodelalloc}, {@jqfmt_vfsold}, {@quota}]}, 0x2, 0x503, &(0x7f0000000500)="$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") sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800000009) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) r6 = getpid() r7 = syz_pidfd_open(r6, 0x0) setns(r7, 0x24020000) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000200)='.\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x2125099, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) mount$bind(&(0x7f0000000040)='.\x00', &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x2a05404, 0x0) r8 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r8, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x190da) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007b113000000000008510000002000000850000002c00000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6}, 0x70) 1m31.752499853s ago: executing program 3 (id=3985): socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000007"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='kfree\x00', r2, 0x0, 0x8000000000000}, 0x18) add_key(&(0x7f0000000040)='ceph\x00', 0x0, &(0x7f00000009c0)="010000000037a788a11d18000000000000006923c63a4541062101b60a2156566de77062", 0x24, r0) (fail_nth: 5) 1m31.516032566s ago: executing program 3 (id=3992): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e000000000000000100000007"], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f00000002c0)={0x0, r1}, 0x8) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095", @ANYBLOB, @ANYRES16=0x0, @ANYRES64=0x0, @ANYRESHEX=r0, @ANYRES32=r1, @ANYRESDEC=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffee1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x30, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='kfree\x00', r5, 0x0, 0x6}, 0x18) unshare(0x60060200) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000380)='neigh_update\x00', r6}, 0x10) r7 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000300)=0x14) sendto$packet(r7, &(0x7f0000000900)="0a3ce681593b8e02e27c4352837b4178bce50e8c44ea5c46989cb716f38187aa29e96eaa67c8d3d23fc4410f6ca6c6b9ee3d21ddb60e432ccdd7b5cafa549b64f80578d87ea97ac474908a9b34b38bce6c40cb78214f19fabd7e0a283f366e92a16a16f51d436ffb4e528666fc197d3ec52d2a8e12c053d0f85aeb95b90bbac754c25ca1bd3a7e9f4e9917b8fc6ab1f4c6bacb434f13a325bf000000b3e6a93ead97b6c0fc399a0a33171304cc4207245eee92250270abe5c2cc2a09ea66000d5f4f8a2652b47903764a256f00000000000000000000002cd8884d17133454ef2021f8c79bb8c2f68d78dc6cf5d7672d97d95baab0a6", 0xf6, 0x8000, 0x0, 0x0) socket$inet6(0x10, 0x3, 0x0) io_uring_setup(0x1694, &(0x7f0000000080)={0x0, 0x2}) r8 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setsig(r8, 0xa, 0x13) fcntl$setlease(r8, 0x400, 0x0) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000000)='kmem_cache_free\x00', r9}, 0x18) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setlease(r8, 0x400, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1m31.515322227s ago: executing program 38 (id=3992): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e000000000000000100000007"], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f00000002c0)={0x0, r1}, 0x8) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095", @ANYBLOB, @ANYRES16=0x0, @ANYRES64=0x0, @ANYRESHEX=r0, @ANYRES32=r1, @ANYRESDEC=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffee1}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x30, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='kfree\x00', r5, 0x0, 0x6}, 0x18) unshare(0x60060200) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000380)='neigh_update\x00', r6}, 0x10) r7 = accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000300)=0x14) sendto$packet(r7, &(0x7f0000000900)="0a3ce681593b8e02e27c4352837b4178bce50e8c44ea5c46989cb716f38187aa29e96eaa67c8d3d23fc4410f6ca6c6b9ee3d21ddb60e432ccdd7b5cafa549b64f80578d87ea97ac474908a9b34b38bce6c40cb78214f19fabd7e0a283f366e92a16a16f51d436ffb4e528666fc197d3ec52d2a8e12c053d0f85aeb95b90bbac754c25ca1bd3a7e9f4e9917b8fc6ab1f4c6bacb434f13a325bf000000b3e6a93ead97b6c0fc399a0a33171304cc4207245eee92250270abe5c2cc2a09ea66000d5f4f8a2652b47903764a256f00000000000000000000002cd8884d17133454ef2021f8c79bb8c2f68d78dc6cf5d7672d97d95baab0a6", 0xf6, 0x8000, 0x0, 0x0) socket$inet6(0x10, 0x3, 0x0) io_uring_setup(0x1694, &(0x7f0000000080)={0x0, 0x2}) r8 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setsig(r8, 0xa, 0x13) fcntl$setlease(r8, 0x400, 0x0) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000000)='kmem_cache_free\x00', r9}, 0x18) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) fcntl$setlease(r8, 0x400, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 59.275839777s ago: executing program 7 (id=4534): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x11, 0xc, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000001480)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000380)='kfree\x00', r0, 0x0, 0x4804}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000040000000100000000000000", @ANYRES32=0x1], 0x50) r1 = socket$kcm(0xa, 0x5, 0x0) r2 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r2, &(0x7f00000002c0)={&(0x7f0000000180)={0x2, 0x2, @dev}, 0x10, &(0x7f0000001400)=[{&(0x7f0000000080)='_', 0x1}], 0x11}, 0x64) setsockopt$sock_attach_bpf(r2, 0x84, 0x1e, &(0x7f0000000240), 0x4) r3 = socket$kcm(0xa, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8916, &(0x7f0000000000)={r3}) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x8936, &(0x7f0000000000)={r3}) (fail_nth: 7) 59.211269954s ago: executing program 7 (id=4535): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x2000, 0x0, 0x0, 0x41000}, 0x94) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000900)=ANY=[@ANYBLOB="2c0000003f00070dfeffffff00000000017c0000040077000c0003"], 0x2c}, 0x1, 0x0, 0x0, 0x4048011}, 0x4044000) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000006300)=ANY=[@ANYBLOB="140000001000010000000000000000000a00000a20000000000a01030000006f688cfc000a0000000900010073797a300000000030000000030a010100000000000000000a00000508000b400000000408000a40000000080900010073797a30"], 0x78}, 0x1, 0x0, 0x0, 0x90}, 0x800) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="020000009d26f8702ca5d9260000000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) socket$inet_smc(0x2b, 0x1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) r4 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r5 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)=@chain={'key_or_keyring:', r5}) 59.208066444s ago: executing program 7 (id=4537): sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) getpid() bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000080), &(0x7f0000000280)=@udp}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) syz_emit_ethernet(0xd2, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffbfff00000000000086dd600489f1009c1100fc010000000000000025030000000000ff020000000000000000000000000001"], 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x50) gettid() listen(0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000680)='sched_switch\x00', r3}, 0x18) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, 0x0, 0x40c0080) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_type(r4, &(0x7f0000000300), 0x2, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000c40), 0x12) r6 = socket$nl_route(0x10, 0x3, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r6, 0x0, r7, 0x0, 0x1, 0x5) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_ro(r8, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r9, &(0x7f0000000200)=0x1, 0x12) 56.706969633s ago: executing program 9 (id=4567): r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000011c0), 0x2401, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xb904}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000440)=@req={0x401, 0xfffffffe, 0x0, 0xffffffff}, 0x10) close(r2) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x39) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) r4 = socket(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x2) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r6) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r7, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=@newqdisc={0x48, 0x24, 0x5820a61ca228651, 0x0, 0x2, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}, {0x1}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x7fffffff, 0x1}}]}}]}, 0x48}}, 0x8d0) sendmsg$nl_route_sched(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)=@newtfilter={0x70, 0x28, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {0x8}, {0xfff2}, {0xfff1, 0x10}}, [@filter_kind_options=@f_bpf={{0x8}, {0x44, 0x2, [@TCA_BPF_ACT={0x34, 0x1, [@m_vlan={0x30, 0x9, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc}}}]}, @TCA_BPF_NAME={0xc, 0x7, './file0\x00'}]}}]}, 0x70}}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r9}, &(0x7f0000000100)=0x0) r11 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) read$qrtrtun(r11, 0x0, 0xeffd) timer_settime(r10, 0x1, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r12}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00', r3}, 0x18) write$P9_RWALK(r0, 0x0, 0x30) 56.165758097s ago: executing program 7 (id=4574): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='kfree\x00', r0}, 0x18) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x204000, &(0x7f0000000740)={[{@journal_dev={'journal_dev', 0x3d, 0xffffffffffffff0b}}, {@min_batch_time={'min_batch_time', 0x3d, 0x4ab}}, {@data_err_ignore}, {@nobarrier}, {@inlinecrypt}, {@oldalloc}, {@data_err_ignore}, {@discard}, {@stripe={'stripe', 0x3d, 0x2}}], [{@dont_hash}, {@defcontext={'defcontext', 0x3d, 'root'}}]}, 0x3, 0x572, &(0x7f0000000c40)="$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") pipe2$9p(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f00000000c0)={0xa}, 0x1c) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r7, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r8}, 0x10) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r5, &(0x7f0000000480)={0x0, 0x4b, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYRESDEC=r0, @ANYRES16=r6, @ANYRES32=r6, @ANYRESDEC=r2, @ANYBLOB="e9ae4d28c8ccb8e02215383fb0dc509cbc1e4c1bd56068441ca453c46cb002fc819040fe3360d343d3ccc1dae39371dfdb417d8f2d8e6ac29c99036812c4a9e57cadddebb6f087967ea0cf18c73f78d0d10625a0fa91b124c3b00d60e82740d75693aee5dae347b876422e33d435a29048c39c0622ad6ef9922723b50cf529be972a52e47f8ce0182bcc"], 0x1c}, 0x1, 0x0, 0x0, 0x8004}, 0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x441, 0x104) fallocate(r9, 0x0, 0x3, 0x800000) r10 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x101042, 0x1b6) pwrite64(r10, &(0x7f0000000140)='2', 0x1, 0xfec9) 56.151366688s ago: executing program 1 (id=4575): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x2, 0xcc}]}]}, {0x0, [0x61, 0x5f, 0x5f]}}, 0x0, 0x31, 0x0, 0x1, 0x80000021}, 0x28) 56.100525283s ago: executing program 8 (id=4576): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r0 = socket(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000b00)=ANY=[@ANYBLOB="14000000f303010000000000000000000a00000a1400"], 0x28}}, 0x0) 56.099645883s ago: executing program 1 (id=4577): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/mdstat\x00', 0x0, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x40) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x0, 0x5, 0xfffffffd}) prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x0) r1 = syz_clone(0x0, 0x0, 0x9, 0x0, 0x0, 0x0) ptrace(0x10, r1) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x12, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r3}, 0x10) ptrace$getregset(0x4204, r1, 0x201, &(0x7f00000001c0)={0x0}) r4 = syz_io_uring_setup(0x49a, &(0x7f00000000c0)={0x0, 0x79af, 0x3180, 0x8000, 0x40024e}, &(0x7f0000000340)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r5, r6, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x48, 0x0, @fd=r0, 0xffffffffffffffff, &(0x7f0000000580)=""/207, 0xcf, 0x0, 0x1}) io_uring_enter(r4, 0x627, 0x4c1, 0x43, 0x0, 0x30) 55.888086684s ago: executing program 1 (id=4578): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x2000, 0x0, 0x0, 0x41000}, 0x94) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000900)=ANY=[@ANYBLOB="2c0000003f00070dfeffffff00000000017c0000040077000c0003"], 0x2c}, 0x1, 0x0, 0x0, 0x4048011}, 0x4044000) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000006300)=ANY=[@ANYBLOB="140000001000010000000000000000000a00000a20000000000a01030000006f688cfc000a0000000900010073797a300000000030000000030a010100000000000000000a00000508000b400000000408000a40000000080900010073797a30"], 0x78}, 0x1, 0x0, 0x0, 0x90}, 0x800) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="020000009d26f8702ca5d9260000000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3}, 0x4) socket$inet_smc(0x2b, 0x1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) r5 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r6 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)=@chain={'key_or_keyring:', r6}) 55.862188957s ago: executing program 8 (id=4579): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x22000406, &(0x7f00000004c0)={[{@dioread_lock}, {@noblock_validity}, {@abort}, {@dioread_lock}, {@stripe={'stripe', 0x3d, 0x1f5}}, {@grpjquota, 0x2e}, {@barrier}, {@nolazytime}, {@jqfmt_vfsv1}, {@grpid}], [], 0x2c}, 0x84, 0x4aa, &(0x7f0000000740)="$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") r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x2000, 0x0) r1 = socket$inet6(0x10, 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff3b, 0x0, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) recvfrom$inet6(r1, 0x0, 0x0, 0x120, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=@newlink={0x34, 0x10, 0x401, 0x70bd2c, 0x0, {0x0, 0x0, 0x0, 0x0, 0x401c0}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @bond={{0x9}, {0x4}}}]}, 0x34}}, 0x0) recvfrom$inet6(r1, 0x0, 0x0, 0x2002, 0x0, 0x0) r3 = socket$inet(0x2, 0x2, 0x1) setsockopt$sock_int(r3, 0x1, 0x5, &(0x7f0000000340)=0x6, 0x4) sendmsg$NL802154_CMD_DEL_SEC_KEY(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010029bd7000fcdbdf25180000000c000600010000000100000008000300", @ANYRES32=0x0, @ANYBLOB='\f\x00'/13, @ANYRES32=0x0, @ANYBLOB="08000300", @ANYRES32=0x0, @ANYBLOB], 0x50}}, 0x8001) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xfffffffffffffffe, 0x4031, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) cachestat(r4, &(0x7f0000001180)={0x5, 0x1}, &(0x7f000009de80), 0x0) r5 = socket$packet(0x11, 0x2, 0x300) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r7, &(0x7f0000002540)={0x0, 0x0, &(0x7f0000002500)={&(0x7f0000000c00)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="0100feffffff000000000c000000100003800400040008000200fd7f0000180001801400020076657468305f746f5f626f6e64"], 0x3c}}, 0x8084) r9 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000080)={'veth0_to_hsr\x00', 0x0}) sendmsg$nl_route_sched(r9, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newqdisc={0x24, 0x24, 0x1, 0x70bd2b, 0x0, {0x60, 0x0, 0x0, r10, {}, {0xfff1, 0xffff}, {0x0, 0xf}}}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x3000c81c) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r4, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB='4@\x00\x00', @ANYRES16=r8, @ANYBLOB="040026bd7000ffdbdf25050000002000018008000100", @ANYRES32=r10, @ANYBLOB="14000200766c616e3100"/20], 0x34}, 0x1, 0x0, 0x0, 0x85}, 0x1) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x81}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r11}, 0x10) setsockopt$packet_tx_ring(r5, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x808000, 0x4, 0x20300, 0xfc}, 0x1c) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f0000000100)=@req3={0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x861}, 0x1c) sendmsg$inet(r3, &(0x7f0000001040)={&(0x7f0000000040)={0x2, 0xffff, @broadcast}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000400)='\b\x00', 0x2}, {&(0x7f0000000180)="2d0000008058", 0x6}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000007000000940b040a0101027f00000100000000001c000000000000000000000008"], 0x40}, 0x20008024) getdents(r0, 0x0, 0x54) 55.768362446s ago: executing program 1 (id=4580): syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x4) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020700000000000002030207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000100850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sched_switch\x00', r5}, 0x10) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x52ba, 0xffffffffffffffff) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000d00)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a30000000002c000000030a01080000000000000000010000000900030073797a32000000000900010073797a30000000005c000000060a010400000000000000000100000008000b40000000000900010073797a300000000034000480300001800a0001006d617463680000002000028008000300b07346e30a0001007374617465000000080002"], 0xd0}}, 0x0) prctl$PR_MCE_KILL(0x29, 0x1, 0x1) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10) recvmmsg(r0, &(0x7f00000000c0)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000500)=""/238, 0xee}], 0x1, &(0x7f0000000600)=""/168, 0xa8}, 0x5}], 0x1, 0x60010000, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10) io_setup(0x8f0, &(0x7f0000002400)) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet6_SIOCADDRT(r6, 0x890b, &(0x7f0000000580)={@dev={0xfe, 0x80, '\x00', 0x37}, @rand_addr=' \x01\x00', @ipv4={'\x00', '\xff\xff', @loopback}, 0x2000000, 0x3, 0x7d, 0x200, 0xfffffffffffffffd, 0x930311}) ioctl$sock_inet6_SIOCADDRT(r6, 0x890b, &(0x7f0000000200)={@initdev={0xfe, 0x88, '\x00', 0x5, 0x0}, @loopback={0x3f}, @loopback, 0x6, 0x0, 0x6, 0x0, 0x4000000000000009, 0x10200}) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff00000006"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='kmem_cache_free\x00', r8}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0a000000020000000200000004"], 0x2d) 55.767515006s ago: executing program 9 (id=4581): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x318, 0x0, 0xffffffff, 0xffffffff, 0x128, 0xffffffff, 0x248, 0xffffffff, 0xffffffff, 0x248, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, [0xff, 0xff000000, 0x0, 0xffffff00], [0xff000000, 0xff, 0xff], 'wg2\x00', 'geneve1\x00', {}, {}, 0x29, 0x10, 0x0, 0x60}, 0x0, 0xe0, 0x128, 0x60030000, {0x0, 0xff000000}, [@common=@unspec=@connbytes={{0x38}, {[{0x19a}, {0x1}], 0x1, 0xf87c4be628ed8e41}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00', {0x8}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @empty, [0xff000000, 0xffffff00, 0xffffff00, 0xff], [0xff, 0xff, 0xffffffff, 0xff000000], 'ip6gre0\x00', '\x00', {0xff}, {}, 0x84, 0x2, 0x4}, 0x0, 0xf0, 0x120, 0x0, {}, [@common=@dst={{0x48}, {0x0, 0x7, 0x0, [0x1, 0xa2e8, 0x4, 0x0, 0x9, 0xc, 0x7, 0x6f, 0x3a, 0x489, 0x2c, 0x8, 0x8, 0xfffe, 0x5, 0x9], 0xb}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x2, 0x6, 0x9}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) (async) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x318, 0x0, 0xffffffff, 0xffffffff, 0x128, 0xffffffff, 0x248, 0xffffffff, 0xffffffff, 0x248, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, [0xff, 0xff000000, 0x0, 0xffffff00], [0xff000000, 0xff, 0xff], 'wg2\x00', 'geneve1\x00', {}, {}, 0x29, 0x10, 0x0, 0x60}, 0x0, 0xe0, 0x128, 0x60030000, {0x0, 0xff000000}, [@common=@unspec=@connbytes={{0x38}, {[{0x19a}, {0x1}], 0x1, 0xf87c4be628ed8e41}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00', {0x8}}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @empty, [0xff000000, 0xffffff00, 0xffffff00, 0xff], [0xff, 0xff, 0xffffffff, 0xff000000], 'ip6gre0\x00', '\x00', {0xff}, {}, 0x84, 0x2, 0x4}, 0x0, 0xf0, 0x120, 0x0, {}, [@common=@dst={{0x48}, {0x0, 0x7, 0x0, [0x1, 0xa2e8, 0x4, 0x0, 0x9, 0xc, 0x7, 0x6f, 0x3a, 0x489, 0x2c, 0x8, 0x8, 0xfffe, 0x5, 0x9], 0xb}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x2, 0x6, 0x9}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x378) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0x28f43000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f0000000100), 0x2, 0x4fd, &(0x7f0000000b00)="$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") (async) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f0000000100), 0x2, 0x4fd, &(0x7f0000000b00)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYRES16=r0, @ANYRESOCT=r1, @ANYRESHEX, @ANYRESHEX=r1], 0x50) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x28, 0x1, 0xfe, 0x0, 0x0, 0x7, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x1, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x28, 0x1, 0xfe, 0x0, 0x0, 0x7, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x1, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) setrlimit(0x9, &(0x7f0000000080)={0x8606, 0xffff}) io_setup(0x8f0, &(0x7f0000002400)) (async) io_setup(0x8f0, &(0x7f0000002400)) renameat2(r1, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000180)='./file1\x00', 0x7) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = socket(0x40000000015, 0x5, 0x0) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) bind$inet(r2, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(0xffffffffffffffff, 0x0, 0x200000c0) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, &(0x7f00000012c0), 0xfe, 0x244, &(0x7f0000000400)="$eJzs3T9oJFUcB/DvzO565m6RUxtB/AMiooFwdoJNbBQCEoKIoEJExEZJhJhgl1jZWGitksomiJ3RUtIEG0WwipoiNoIGC4OFFiu7k0hMVqNu3Dkynw9MZibz3vzesPN9u83sBmisq0mmk7SSTCbpJCmON7i7Wq4e7q5PbM8nvd4TPxWDdtV+5ajflSRrSR5KslUWeamdrGw+s/fLzmP3vbncuff9zacnxnqRh/b3dh8/eG/2jY9mHlz54qsfZotMp/un6zp/xZD/tYvklv+j2HWiaNc9Av6Judc+/Lqf+1uT3DPIfydlqhfvraUbtjp54N2/6vv2j1/ePs6xAuev1+v03wPXekDjlEm6KcqpJNV2WU5NVZ/hv2ldLl9eXHp18sXF5YUX6p6pgPPSTXYf/eTSx1dO5P/7VpV/4OLq5//JuY1v+9sHrbpHA4zFHdWqn//J51bvj/xD48g/NJf8Q3PJPzSX/ENzyT80l/zDBdb5+8PyD80l/9Bc8g/NdTz/AECz9C7V/QQyUJe65x8AAAAAAAAAAAAAAAAAAOC09Ynt+aNlXDU/eyfZfyRJe1j91uD3iJMbB38v/1z0m/2hqLqN5Nm7RjzBiD6o+enrm76rt/7nd9Zbf3UhWXs9ybV2+/T9Vxzef//dzWcc7zw/YoF/qTix//BT461/0m8b9daf2Uk+7c8/14bNP2VuG6yHzz/ds79i+Uyv/DriCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABib3wMAAP//+kBtTA==") r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101842, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000005c0)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000980)='./file1\x00', 0x42, 0xc2) pwrite64(r4, &(0x7f0000000080)="cc", 0x1, 0x200980) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) (async) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) sendfile(r5, r5, 0x0, 0xe0000000) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) (async) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) (async) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)=ANY=[], 0x18}}, 0x0) (async) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)=ANY=[], 0x18}}, 0x0) r6 = creat(0x0, 0x9c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000196c0)={r6, 0xe0, &(0x7f0000019880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000540)=[0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0], 0x0, 0x1095, &(0x7f00000195c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000380), &(0x7f0000019640), 0x8, 0xb2, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) socket$nl_route(0x10, 0x3, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) 55.001273523s ago: executing program 9 (id=4584): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) lsm_set_self_attr(0x69, &(0x7f0000000000)=ANY=[@ANYBLOB="6700000000000000010000800000000081000000000000006100000000000000c27d10a53c7ed718d330160d12ec7725ee4789d06e64ba319d12960974e682b6b7b00fbe479912eda4154caee4920b5095"], 0x81, 0x0) 54.982196615s ago: executing program 9 (id=4585): r0 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000140000e5b7030000000700008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'gretap0\x00', &(0x7f0000000180)={'sit0\x00', 0x0, 0x1, 0x1, 0x2, 0x8, {{0x5, 0x4, 0x1, 0x5, 0x14, 0x65, 0x0, 0x36, 0x4, 0x0, @remote, @broadcast}}}}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="58000004100001ffff000000001f07744a6350c6510000668b0000005bf95c7a36d8ea159d14ec25dc08cd6bd12b73f06344b0f548", @ANYRES32=r3, @ANYBLOB="421c00000000000024001280090001007866726d000000001400028008000100030000000800020003000000140003007866726d3000"/64], 0x58}, 0x1, 0x0, 0x0, 0xc001}, 0x4000800) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000240)={0x1, &(0x7f0000000140)=[{0x6, 0x85, 0xef, 0x401}]}) setfsuid(0xee01) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r4, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r4, 0x25, &(0x7f00000000c0)) close(0xffffffffffffffff) 54.868170946s ago: executing program 8 (id=4586): bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)=@chain) 54.859160507s ago: executing program 8 (id=4588): r0 = creat(&(0x7f0000000380)='./file0\x00', 0x81) close(r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x35b, 0xa, 0x0, 0x7}, {0x3, 0x72, 0x8, 0x7}]}, 0x10) (async) get_robust_list(0x0, 0x0, 0x0) (async) r2 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) (async, rerun: 32) r3 = fsmount(r2, 0x0, 0x0) (rerun: 32) fchdir(r3) (async) r4 = open(&(0x7f0000000040)='./bus\x00', 0x143142, 0x80) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="1801000001ffffeb00000000eb658e0d850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r6, 0x89f9, &(0x7f0000000100)={'sit0\x00', &(0x7f00000000c0)={@ipv4={'\x00', '\xff\xff', @private=0xa010102}, @remote, 0x0, 0x8}}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x18) (async) ftruncate(r4, 0x2007ffb) sendfile(r4, r4, 0x0, 0x1000000201005) (async, rerun: 32) r7 = syz_open_dev$tty1(0xc, 0x4, 0x3) (async, rerun: 32) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) (async) ioctl$TUNSETIFF(r8, 0x400454ca, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) r9 = bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1900000004000000040000000035000005800200", @ANYRES32=r9, @ANYBLOB="0000b911000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00'], 0x50) (async) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000ed074479000000000000000018000000", @ANYRES32=r10, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r12}, 0x18) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x5}, 0x50) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r11, 0x0, 0x0}, 0x20) (async, rerun: 64) ioctl$GIO_UNIMAP(r7, 0x4b66, &(0x7f0000000340)) (rerun: 64) socket$caif_stream(0x25, 0x1, 0x1) 54.838602489s ago: executing program 8 (id=4589): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = socket(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000b00)=ANY=[@ANYBLOB="14000000f303010000000000000000000a00000a1400"], 0x28}}, 0x0) 54.724032421s ago: executing program 1 (id=4590): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8a}, 0x94) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r2}, &(0x7f0000000000), &(0x7f00000005c0)=r3}, 0x20) ioctl$SG_SET_RESERVED_SIZE(r1, 0x2275, &(0x7f0000000040)) 54.651879468s ago: executing program 7 (id=4591): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x85, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x8, 0x1, 0x9, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x4e4}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r2 = openat$sysfs(0xffffff9c, &(0x7f0000000040)='/sys/kernel/notes', 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x14) sendfile(r3, r2, 0x0, 0x7ffff088) read$rfkill(r2, &(0x7f0000000080), 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[], 0x200000000000000) 54.650774988s ago: executing program 9 (id=4592): syz_mount_image$iso9660(&(0x7f0000000100), &(0x7f0000000080)='./file0\x00', 0x200600, &(0x7f00000000c0)=ANY=[], 0x1, 0x415, &(0x7f00000006c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000004280)='.\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000d00)=""/65, 0x41) (async) r1 = syz_open_dev$usbfs(&(0x7f0000000100), 0x205, 0x8401) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f00000001c0)='kfree\x00', r3}, 0x18) (async) r4 = memfd_create(&(0x7f0000000200)='\x00\xc76\xbe\x91\x8d\x182)!\x9a%\xd9\x19\x17\xb0\xed|\xb3\xc2\x017h\xe9{L\xa2\xd28\xd6\x06\a\x0e\xfd\xfe\x12\x8f&\x13\xae%@T\xa3\xb0>\\\xec\xa9\xf9Q@6A\x10\x8cn|\x00\x00\x00\x00\x00\x00\x00\x00\xeb0\xdd\xe8\x87\x05=\xfb\x8b$\xdcQ\xee\xc5\x1f\x8bQ\xf7fo\"i\xa1hk\x1d\xf5z\xc1\x7f\xa4\\]\xc4\xbe3\xf9\xa8\t?:\xd8\xda\x84\xeepI[\x1c\x00\x00\x00\x00\xf9v\x00\x00\x00\x00\x00T\xb6\xbe\x0f~\xc0\x92\xe9Or\xa8\x81(\x01\x14\xfc\x83\xf9\xfb\x05\x94Tr@Lq]\xf9\x15zj\x87\xc4\x8e\xe8\xf0_o\x16Oy\x00\x16h\xcc\x81.F/\xb9-&R\x8e\xb2\xb3bBx\x1e1\x18\x8f2\xf7]#\xed,\xc7\x03\x00\x00\x00\xa3\xee\xcb\xaf\xb3\xe3\'}\x18\xe8O\xa8#K\xb6\xe4R$\xaa\x00U\x92\xd2\x99\xb8\xde\xf9s\xcb\x89\xf2\xf6a\xcb[\xcc+\x1a`.\x00\xcf\x1c\x14\x1d$\x98\xf3\xed\x1cA\xc1+0\x87\xd1\xf2\xc6\x8fs>\x16\x8b\xdeV\b$e\xe5\x8d/\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x16\xe1\xa3\xe0\x18\xe5\xee\xb0\x93\xfe\xac\x98m\xaf\xb9K\xac\xa0\x1a\xe2\xb4\xfd\x1cO5\xce9\xf9\x02h\x0e%\xa1\x11COf\xed[z\xc6\xc1:L\xdb\xac\x84Ru=E\xf7\x94\xae\x18v\v\xcc\xcd\b\xa5\x19\xb5idBc\xf1S\x93\x0f\x82me\x9a\xb8\a\xff\x91\xed\x9d|\xa7D\xf1\xb2\x14\xff\xc5\xaf[\x86\xca!E\x9a<\x00', 0x5) fsetxattr$security_selinux(r4, &(0x7f0000000480), &(0x7f00000004c0)='system_u:object_r:hwdata_t:s0\x00', 0x1a, 0x0) r5 = syz_open_dev$usbmon(&(0x7f0000000900), 0x7, 0x0) (async) r6 = fcntl$dupfd(r1, 0x406, r1) (async, rerun: 64) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) (rerun: 64) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r8, 0x0, 0x10007ffffffff}, 0x18) (async, rerun: 64) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) (async, rerun: 64) removexattr(0x0, 0x0) (async) r9 = syz_open_procfs(0x0, &(0x7f0000000200)='projid_map\x00') writev(r9, &(0x7f00000000c0)=[{&(0x7f0000000140)='1', 0x1}], 0x1) (async, rerun: 64) ioctl$MON_IOCX_GETX(r5, 0x4018920a, &(0x7f00000000c0)={0x0, 0x0}) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"/2944], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x4a) ioctl$USBDEVFS_SUBMITURB(r6, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x200, 0x0, &(0x7f0000000080)={0x80, 0x30, 0x0, 0x0, 0x79d4}, 0x8, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x0}) 54.432873269s ago: executing program 1 (id=4593): bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB="0500000004000000080000000b"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000480)='kfree\x00', 0xffffffffffffffff, 0x0, 0x7fffffffffffffff}, 0x18) r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000140)=@fragment={0xb6, 0x0, 0x92, 0x0, 0x0, 0x1b, 0x65}, 0x8) sendto$inet6(r0, 0x0, 0xffffffffffffff2e, 0x404cc40, &(0x7f0000000040)={0xa, 0x4e22, 0xffffff7c, @mcast2, 0x7}, 0x1c) 54.401192573s ago: executing program 39 (id=4593): bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB="0500000004000000080000000b"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000480)='kfree\x00', 0xffffffffffffffff, 0x0, 0x7fffffffffffffff}, 0x18) r0 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000140)=@fragment={0xb6, 0x0, 0x92, 0x0, 0x0, 0x1b, 0x65}, 0x8) sendto$inet6(r0, 0x0, 0xffffffffffffff2e, 0x404cc40, &(0x7f0000000040)={0xa, 0x4e22, 0xffffff7c, @mcast2, 0x7}, 0x1c) 54.356602827s ago: executing program 9 (id=4595): r0 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000a00)="0883e18fab211a186d0b0fa76fb1209f2343827d241d3be7104549eac035fafdbca2c9b040abdb86ab44c0c10ba30000615075f3322346f753c1f5909cbf03eecb746f8bbce01c39607e2fb2ffe32a3e7c0f8ba36567ee0cf86b11f2620093151512dda1f87c1cbc439c42999e5b49d2ddae544cbf8eda6f2b7700fece41e2aebfa938e20bde6d1203387b4cc06ceae06b870aa4126ca08d37175d04c39b0e3c8bb366f830d09895529fc0933b337c7176d07c395cb122d211ad7a8ac7172015b7cc3b", 0xc3, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x0}, &(0x7f00000001c0)="a6", 0x1, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000200)='asymmetric\x00', &(0x7f0000000140)=@keyring={'key_or_keyring:', r2}) keyctl$KEYCTL_MOVE(0x1e, r0, 0xffffffffffffffff, r1, 0x0) 54.356396037s ago: executing program 40 (id=4595): r0 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000a00)="0883e18fab211a186d0b0fa76fb1209f2343827d241d3be7104549eac035fafdbca2c9b040abdb86ab44c0c10ba30000615075f3322346f753c1f5909cbf03eecb746f8bbce01c39607e2fb2ffe32a3e7c0f8ba36567ee0cf86b11f2620093151512dda1f87c1cbc439c42999e5b49d2ddae544cbf8eda6f2b7700fece41e2aebfa938e20bde6d1203387b4cc06ceae06b870aa4126ca08d37175d04c39b0e3c8bb366f830d09895529fc0933b337c7176d07c395cb122d211ad7a8ac7172015b7cc3b", 0xc3, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000540), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x0}, &(0x7f00000001c0)="a6", 0x1, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000200)='asymmetric\x00', &(0x7f0000000140)=@keyring={'key_or_keyring:', r2}) keyctl$KEYCTL_MOVE(0x1e, r0, 0xffffffffffffffff, r1, 0x0) 54.356230837s ago: executing program 8 (id=4596): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x7}, 0x8) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x8, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x4, 0x7}, 0x13748, 0x10000, 0x0, 0x5, 0xa, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_io_uring_setup(0x7983, &(0x7f0000000580)={0x0, 0xd736, 0x4000, 0x3, 0xbffffffa}, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$nl_rdma(0x10, 0x3, 0x14) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0xaf1}, 0x8) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000200)=[{{&(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback, 0x1}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000001680)='\t', 0x1}], 0x1}}], 0x1, 0x885) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000300)=ANY=[@ANYRES32=0x0, @ANYBLOB="01"], 0x8) 54.348524808s ago: executing program 41 (id=4596): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x7}, 0x8) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x8, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x4, 0x7}, 0x13748, 0x10000, 0x0, 0x5, 0xa, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_io_uring_setup(0x7983, &(0x7f0000000580)={0x0, 0xd736, 0x4000, 0x3, 0xbffffffa}, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$nl_rdma(0x10, 0x3, 0x14) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0xaf1}, 0x8) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000200)=[{{&(0x7f00000000c0)={0xa, 0x4e23, 0x0, @loopback, 0x1}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000001680)='\t', 0x1}], 0x1}}], 0x1, 0x885) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000300)=ANY=[@ANYRES32=0x0, @ANYBLOB="01"], 0x8) 54.200606783s ago: executing program 7 (id=4599): bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)=@chain) 54.200122733s ago: executing program 42 (id=4599): bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)=@chain) 2.031983057s ago: executing program 2 (id=5774): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xc94284a3061bb7fe, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', 0xffffffffffffffff, 0x0, 0xffffffffffffffff}, 0x18) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r0 = socket$nl_rdma(0x10, 0x3, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc90, 0x0, 0x0, 0x0, 0x23, 0x8, 0x0, 0x0}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000d7c900000900000001"], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x810) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000880)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r1, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r3}, 0x10) getitimer(0x2, &(0x7f0000000340)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000180)='kfree\x00', r5}, 0x18) r6 = socket$rds(0x15, 0x5, 0x0) bind$rds(r6, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10) sendmsg$rds(r6, &(0x7f0000000080)={&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) sendmsg$rds(r6, &(0x7f0000000140)={&(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r6, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={0x38, 0x1403, 0x1, 0x70bd26, 0x25dfdbff, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'veth0_to_bridge\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x20000010) r7 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x10042, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000840)={0x0, @in={{0x2, 0x4e20, @multicast1}}, 0x9, 0x666, 0xdc, 0x9, 0x2}, &(0x7f0000000300)=0x98) sendmsg$inet_sctp(r7, &(0x7f0000000ac0)={&(0x7f0000000140)=@in6={0xa, 0x4e22, 0x9, @empty, 0x7}, 0x1c, &(0x7f0000000700)=[{&(0x7f0000000380)="946a9c27f1b889c1d83cc733c03ca68d8d7fdeb33c1bd6eb081236010597f5e0982e11cfca72946ec5b07dad1fe5bf2ff0f632266e5d55835a2e56066b479f4419666cc90c09d91fbdc15505bded7ab77a6f1715394639df4016f5e561e70f8f39a0aa5ed57f1d348630abd4624c88e2d80f836f1f73b113e875e0cf33152907213d4090ec012992b0c58f5799b8b76e2ca3b94b1291809fb921d1aa5871dedd9f9faaff1ec588046a1ac286963ef15d327321a3e4932d4ffe77caa60b144f44815f2800026de791798b978c", 0xcc}, {&(0x7f0000000480)="3da5c04ed2e20fb5f2449a9c6cc773043ccde76c499d3dc4717b4d8b022c2150ba2bd0ca3909eaa1644c5011185ddb49b37d048b23525a99a5d988ea911c8838b2fd579cba0d43738b10e034293a6c86d9e784a8a1a9ae60c676d85d6386c009ff6939c1379b275de8240594b135ff308e1d4884f856c384ddb200662080825a02142532c4d0f61894c5f0474014b5971193bd2811c239a1cec0b1383d6a8f74eb622005dce4526dc3537dee609a9de059018830721b03409a0cc961db0639a221e4884c8e990c368c1b4bbcec2268ed6596fb30838970415c90429ece27d03ecb3fc71d050e", 0xe6}, {&(0x7f0000000280)="72639af4aeae66f6c5b73a6a81301d65f60405a95386cb6468609b25ecb35c938c1d7c7f8b5474a4c3db5c90141c4f6d8e5fd399a8f61b541944fdf7c6ac33a7ebb4de8ef04c75129b2fee2aa7f4b118cbf9a1cefefacb2b8ef52f530cc4441db88bdb022f6d08a3f14e47544b0ae8eb74c3fd60792f92a88e7e", 0x7a}, {&(0x7f0000000580)="4742339dabe59cc8fdbc956ca4e0925b84e16d82af74a51897226c4a735699ce4308f31d6f5e771e4fef6db04d237d59b7f1d08d24087cba4325907271642d9925aae1f7b33ed55f700d1974efcf4f79c03274d02b0d4659cdd15033af9fcf71869bc862d0cd22a57ebb8850525898732bf44e705179d99d1f68d5ad106acac25082728527ffb63660786cea", 0x8c}, {&(0x7f0000000640)="2b3a3aaa2547c6e67d9086757a35d6ad1b95189345c6381bd35aa708a4f84d9c4f7f632223e3b73537f981185d0eedee11b4d5713f39b744778695bbfe1863c37fcb174e6a724a1c804d7ee8343e148157f7f328e37104b51d427c2a548ff89d3a9d3ed0b544af30ea6d13c9f1c430570a3e4e8287e08b7165b6fc7a15d81b6887fdc28f", 0x84}], 0x5, &(0x7f0000000900)=[@dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0x64010102}, @authinfo={0x18, 0x84, 0x6, {0xff}}, @authinfo={0x18, 0x84, 0x6, {0x1}}, @sndrcv={0x30, 0x84, 0x1, {0x8, 0xa, 0x2, 0x3, 0xfffffffb, 0x7, 0x2, 0x8, r8}}, @dstaddrv6={0x20, 0x84, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @dstaddrv6={0x20, 0x84, 0x8, @remote}, @authinfo={0x18, 0x84, 0x6, {0x1}}, @prinfo={0x18, 0x84, 0x5, {0x20, 0xea}}], 0xe8, 0x1000}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000002fc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@ipv4_newroute={0x34, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_SPORT={0x6, 0x1c, 0x4e23}, @RTA_OIF={0x8}, @RTA_IP_PROTO={0x5, 0x1b, 0x1}]}, 0x34}}, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f0000000000)=0x4, 0x4) 1.993728251s ago: executing program 2 (id=5775): socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00"/14], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000e5b7030000000700008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r1, 0x25, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000240)={0x1, &(0x7f0000000140)=[{0x6, 0x85, 0xef, 0x401}]}) setfsuid(0xee01) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r2, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r2, 0x25, &(0x7f00000000c0)) close(r1) 1.756897215s ago: executing program 4 (id=5779): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="020300030f0000002cbd7040fcdbdf2503000900800000001cdc0dca1d9f68846960e56de42944af0300060a1414ac0002004e22ac1414bb000000000000000002000100000000000000070c00000080030005000000000002004e22ac14140a00000000000000000200130002"], 0x78}, 0x1, 0x7}, 0x0) 1.756386905s ago: executing program 4 (id=5781): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r0}, 0x10) mremap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1000, 0x0, &(0x7f00008b5000/0x1000)=nil) r1 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$GIO_UNISCRNMAP(r1, 0x4b52, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/25], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000001e00100000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000fcffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r3}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x9, 0x4, 0x7ffc0002}]}) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000180)=""/15) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x64, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) read(r1, &(0x7f0000000040)=""/109, 0x6d) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bond0\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000001640)=""/139, &(0x7f0000000100)=0x8) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xfecc) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000003c0)={&(0x7f0000e8a000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000280)=""/103, 0x67, 0x1, &(0x7f0000000200)=""/13, 0xd}, &(0x7f0000000400)=0x40) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/vlan/vlan1\x00') r5 = socket(0x2, 0x2, 0x1) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r5, 0x8983, &(0x7f0000000000)={0x1, 'vlan1\x00', {}, 0x5832}) 1.672168364s ago: executing program 6 (id=5784): bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x10, 0x4, 0x8, 0x5}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008900000b70300000000000085"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, &(0x7f0000000000), &(0x7f0000000040)=r3}, 0x20) 1.671606524s ago: executing program 6 (id=5785): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xc94284a3061bb7fe, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', 0xffffffffffffffff, 0x0, 0xffffffffffffffff}, 0x18) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r0 = socket$nl_rdma(0x10, 0x3, 0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc90, 0x0, 0x0, 0x0, 0x23, 0x8, 0x0, 0x0}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000d7c900000900000001"], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x810) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000880)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r1, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r3}, 0x10) getitimer(0x2, &(0x7f0000000340)) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000180)='kfree\x00', r5}, 0x18) r6 = socket$rds(0x15, 0x5, 0x0) bind$rds(r6, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10) sendmsg$rds(r6, &(0x7f0000000080)={&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) sendmsg$rds(r6, &(0x7f0000000140)={&(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r6, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={0x38, 0x1403, 0x1, 0x70bd26, 0x25dfdbff, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'veth0_to_bridge\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x20000010) r7 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0), 0x10042, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000840)={0x0, @in={{0x2, 0x4e20, @multicast1}}, 0x9, 0x666, 0xdc, 0x9, 0x2}, &(0x7f0000000300)=0x98) sendmsg$inet_sctp(r7, &(0x7f0000000ac0)={&(0x7f0000000140)=@in6={0xa, 0x4e22, 0x9, @empty, 0x7}, 0x1c, &(0x7f0000000700)=[{&(0x7f0000000480)="3da5c04ed2e20fb5f2449a9c6cc773043ccde76c499d3dc4717b4d8b022c2150ba2bd0ca3909eaa1644c5011185ddb49b37d048b23525a99a5d988ea911c8838b2fd579cba0d43738b10e034293a6c86d9e784a8a1a9ae60c676d85d6386c009ff6939c1379b275de8240594b135ff308e1d4884f856c384ddb200662080825a02142532c4d0f61894c5f0474014b5971193bd2811c239a1cec0b1383d6a8f74eb622005dce4526dc3537dee609a9de059018830721b03409a0cc961db0639a221e4884c8e990c368c1b4bbcec2268ed6596fb30838970415c90429ece27d03ecb3fc71d050e06", 0xe7}, {&(0x7f0000000280)="72639af4aeae66f6c5b73a6a81301d65f60405a95386cb6468609b25ecb35c938c1d7c7f8b5474a4c3db5c90141c4f6d8e5fd399a8f61b541944fdf7c6ac33a7ebb4de8ef04c75129b2fee2aa7f4b118cbf9a1cefefacb2b8ef52f530cc4441db88bdb022f6d08a3f14e47544b0ae8eb74c3fd60792f92a88e7e", 0x7a}, {&(0x7f0000000580)="4742339dabe59cc8fdbc956ca4e0925b84e16d82af74a51897226c4a735699ce4308f31d6f5e771e4fef6db04d237d59b7f1d08d24087cba4325907271642d9925aae1f7b33ed55f700d1974efcf4f79c03274d02b0d4659cdd15033af9fcf71869bc862d0cd22a57ebb8850525898732bf44e705179d99d1f68d5ad106acac25082728527ffb63660786cea", 0x8c}, {&(0x7f0000000640)="2b3a3aaa2547c6e67d9086757a35d6ad1b95189345c6381bd35aa708a4f84d9c4f7f632223e3b73537f981185d0eedee11b4d5713f39b744778695bbfe1863c37fcb174e6a724a1c804d7ee8343e148157f7f328e37104b51d427c2a548ff89d3a9d3ed0b544af30ea6d13c9f1c430570a3e4e8287e08b7165b6fc7a15d81b6887fdc28f", 0x84}], 0x4, &(0x7f0000000900)=[@dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0x64010102}, @authinfo={0x18, 0x84, 0x6, {0xff}}, @authinfo={0x18, 0x84, 0x6, {0x1}}, @sndrcv={0x30, 0x84, 0x1, {0x8, 0xa, 0x2, 0x3, 0xfffffffb, 0x7, 0x2, 0x8, r8}}, @dstaddrv6={0x20, 0x84, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @dstaddrv6={0x20, 0x84, 0x8, @remote}, @authinfo={0x18, 0x84, 0x6, {0x1}}, @prinfo={0x18, 0x84, 0x5, {0x20, 0xea}}], 0xe8, 0x1000}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000002fc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=@ipv4_newroute={0x34, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_SPORT={0x6, 0x1c, 0x4e23}, @RTA_OIF={0x8}, @RTA_IP_PROTO={0x5, 0x1b, 0x1}]}, 0x34}}, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f0000000000)=0x4, 0x4) 1.664273464s ago: executing program 6 (id=5786): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x1d, 0xc, &(0x7f0000000b80)=ANY=[@ANYRESHEX=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0xfffffffffffffcb7, 0x0, 0x41100, 0x94, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000000)='afs_call\x00', r0, 0x0, 0x80000001}, 0x18) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x30120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffd31) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = syz_io_uring_setup(0x497, &(0x7f0000000400)={0x0, 0x3f73, 0x100, 0x4, 0x1a}, &(0x7f0000000340)=0x0, 0x0) io_uring_register$IORING_REGISTER_PBUF_RING(r3, 0x16, &(0x7f0000000040)={&(0x7f0000001000)={[{0x0, 0xffffffffffffff3a, 0x3, 0xf4}]}, 0x1, 0x1}, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x7, [@struct={0x5, 0x1, 0x0, 0xf, 0x0, 0x15, [{0x7fd, 0x15, 0x9d83}]}]}, {0x0, [0x61, 0x0, 0x0, 0x5f, 0x2e]}}, &(0x7f0000005bc0)=""/255, 0x37, 0xff, 0x9, 0x1000}, 0x28) r5 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x101343) open_by_handle_at(0xffffffffffffffff, 0x0, 0xfe) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x9, 0xc) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r5, 0x400454a4, &(0x7f0000000040)) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000, 0x0, 0x0, 0x10000}) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000005c0)={@ifindex, 0x26, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) r6 = socket$inet_mptcp(0x2, 0x1, 0x106) syz_io_uring_submit(r4, 0x0, &(0x7f00000002c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x20, 0x10, r6, 0x0, 0x0, 0x0, 0x2000, 0x1, {0x1}}) io_uring_enter(r3, 0x3516, 0xf4f5, 0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r7, 0x0, 0x40000000003}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000300)='rcu_utilization\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0f0000000400000004000000"], 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) syz_clone(0x60002080, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_opts(r2, 0x0, 0x4, 0x0, 0x0) 1.438081947s ago: executing program 6 (id=5787): syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000000)=0x1, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020700000000000002030207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000100850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) prctl$PR_MCE_KILL(0x29, 0x1, 0x1) bind$inet(r0, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10) recvmmsg(r0, &(0x7f00000000c0)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000500)=""/238, 0xee}], 0x1, &(0x7f0000000600)=""/168, 0xa8}, 0x5}], 0x1, 0x60010000, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10) io_setup(0x8f0, &(0x7f0000002400)) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000580)={@dev={0xfe, 0x80, '\x00', 0x37}, @rand_addr=' \x01\x00', @ipv4={'\x00', '\xff\xff', @loopback}, 0x2000000, 0x3, 0x7d, 0x200, 0xfffffffffffffffd, 0x930311}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000200)={@initdev={0xfe, 0x88, '\x00', 0x5, 0x0}, @loopback={0x3f}, @loopback, 0x6, 0x0, 0x6, 0x0, 0x4000000000000009, 0x10200}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff00000006"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='kmem_cache_free\x00', r6}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0a000000020000000200000004"], 0x2d) 1.079780413s ago: executing program 0 (id=5791): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)={0x2c, 0x9, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10040057}, 0x240008c4) (fail_nth: 6) 1.062472114s ago: executing program 0 (id=5792): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) statfs(&(0x7f0000000200)='.\x00', 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x20100, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000010400000000000000", @ANYRES32=0x0, @ANYBLOB="400d00000000000030001280"], 0x50}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nfc(0x0, r3) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000000c0)=0x0) sendmsg$NFC_CMD_DEV_UP(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYRES32=r2], 0x1c}}, 0x20040044) sendmsg$sock(r1, &(0x7f0000000bc0)={&(0x7f0000000500)=@nfc={0x27, r4, 0x0, 0x4}, 0x80, &(0x7f0000000580)=[{0x0}], 0x1, &(0x7f0000000ac0)}, 0x4) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'macsec0\x00', 0x400}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6b}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x18, r7, 0x10, 0x70bd2b, 0x25dfdbfd, {0x1a}, [@HEADER={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000801}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0500000003f01f0081000000ffff000001000000", @ANYRES32, @ANYBLOB="00002200000000000000000000000000000000008468987603321d2c60b447a59240c34587fb36679e6a4655dcb7425b3f928034f83b2bb8fc2db42e6b63627b06f140706467475261ecc237375ab778033e739dca19f0adc4ed92a95e5f4f5bce657367501bf2ec2fb217562cce71b75638a45cc83ccc", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000fcffffff00"/28], 0x50) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newqdisc={0x34, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0xffe0}, {0xf}, {0xffef, 0xd}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x1}}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$NL80211_CMD_FRAME(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000780)=ANY=[@ANYBLOB="a0000000", @ANYRES16=0x0, @ANYBLOB="10002cbd7000fedbdf253b0000000c009900060000005f00000008005700ffffffff0800a100ef000000050019010c0000000800a100020005000800a100b00b0000080027000000000008009f00030000000800a100040000000800a0000200000008002201001000000400870008005700e2070000080022018e02008008009f000200000008002201e00200000800a00004000000040087005464e5eea47a01feea4a2d1fdd197efc7100ef0ea4d285f831da19b1e8edcc88142eaa770022709dd7ec7f886d2491cca0e832ff32f558b6ec97a904615f97a1bd6596c8d96bb6193c06ca9de3ee0cea9db126d3218abe01df40ef0bb746bed6ad7b763387b6e663c51273efedad3cb56ef0017840a1201456ece58126ff010000dc2fc3a20143597af351c267f7799153f8cd819cf473a3baa553994456fcfad95b6ae6348d55750199be1a2144ef66895422b93502f6707686a3d61fc6a20a523c25dff6eef8c479f4e72b10f703c0035eb3df82a886b03f7c9556100000000000000000efe6e8a30d9a29f2cb28a92003f6e72db66fe9836f00ac50000c70c22d5dbb2fabab2717002a16c5692a97ff957d9b4b56b4dcb8c7fc835c42480723ba8065b8b6b3b474f1e0430d2f12534334ff85668c7233d25c79ed93e895abf5e10bedf602addb49acddaf8446246f4e585015f8ae6366c6e5a77255724551ea29571c1aead32f2810149ea8cb0328f87b706afc0ef7fca775d564feb1829530d2efa26021a96f331e503199eb038d1ce92d8b7d93e1f96adba5853f9913c8ddd2bc01d207f62b9dc9cb90ce96c0b9cb148dc2afe5bf64df4b4a21017aa5cb543092d0af8d898ba9e07bfc48f5da00c4f21906cf6e4f70975e686d658af21d9554d92fd84cb7efab409ef1f72698e7e8a7d8db466c8d7941701cd76ffae5e39db8a19feffe563bd445867bc0849956667aa0461e50409368fe77c7aa851a78538c5e504789485e4a3fce4f52a947b9030d9fd9fce5ef25c1e2f65777489b3f0409698af62e80b7245e5cfc229a3fde8673fc612a798db7c2bfaeb07d3830756ceb5bf7ae66c3b3fa8fa6acd734fca06fe82c2cbca5b38dc0d4c73d864ce3480d2cddaab0d0cf78b14320dea7e81ff756eaaa52d7e87f4ec8a090d81b39b9484fe96c54e62760ae69b5c353e2ae873f8a08cd8c6e9111f03aac1cd7f4ba2877125dadcce71675"], 0xa0}, 0x1, 0x0, 0x0, 0x200d1}, 0x404c000) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000040)=@rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x1}, 0x80, 0x0}, 0x2000c005) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000300)="d8000000180081064e81f782db4cb904021d0800fe067c05e8fe55a10a0005000140020003600e41b0000900ac0006fc1100000004000500014002000000035c3b61c1d67f6f94007174cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001b14d6d930dfe1d9d322fe7c4650b5b9bd6ee6f63f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0adff010000000000000dd6e4edef3d9345", 0xc3}], 0x1}, 0x20004804) r9 = socket(0x10, 0x803, 0x0) sendto(r9, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) 1.041502546s ago: executing program 2 (id=5794): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2c, &(0x7f0000000000)='/proc/sys/net/\x00\x00v4\x00\x00s/\x92ync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd1l,'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) fchdir(r0) setresuid(0x0, 0xee00, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000200)={'#! ', './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa'}, 0x102) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x28011, r1, 0x0) utimensat(0xffffffffffffff9c, &(0x7f00000003c0)='.\x00', &(0x7f00000002c0)={{0x0, 0x3fffffff}}, 0x0) 955.786335ms ago: executing program 2 (id=5795): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000280)=[{{&(0x7f00000000c0)=@in6={0xa, 0x4e24, 0x1, @mcast1, 0xe}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)}, {&(0x7f0000000180)="beb482e0c14ddddf6af28a802c1739209e96750100ae05569d536b762b8b918fb8fec97a98ee64aa59191928d90b7596d88a53ec8bb68428c473647b2149f9da33d1bec9e28c61c9a40db072aa57", 0x4e}, {&(0x7f00000003c0)="987b9f35eb8a6f0b51de0ee25943b18a08e0d7ec0b713d14c4fbdc36795f10a770dedf17863ed450005cc4395af4aff95f6d83caaa631e8cada48732cb94db568f5599b076c122200fbaa3cf80cc61193815a3dd970deec214abf16a79ee975f712dbe710630dbcaa17a737c0af25b4a2a87b130bf4ba8a3f2a55500ec6a720b0f7de2869f0bcdb0855c83691951aacb3ebc5bad452ed50ce72ee7b4e0e1b2d98a8635f9b05edccfe86b945957e25345", 0xb0}, {&(0x7f0000000480)="8341df3a0c7476625e836e89930fe8496c7d82cfc8c61dcf31ce0146d2fb262fc8791bf1a69efdd6612e1f7cba48899105b83465017cb52d9b13f7f350ac81973f8cf6e187143c53b546070abe6e90a6544431be1bb647b0ea1c4e7add5612772738eae8026d70f3f8525a513cd66f537d6e4fb554f7da307582d15beaa0cb3f4396f1ae7b702ac9841f9e6b0245f5cd79a9ae34cc270b4fc3c9066a0c1317ade4b19e3a4d0a199ca8e068674bab21d730356c9e30bfd00cd383b6146876e584736bc874f135bc57754dcec9101eec1a4295958f464299822b8bd1", 0xdb}], 0x4, &(0x7f0000000300)=[@timestamping={{0x14, 0x1, 0x25, 0xfff}}, @txtime={{0x18, 0x1, 0x3d, 0x3ff}}, @txtime={{0x18, 0x1, 0x3d, 0x100}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}, @mark={{0x14, 0x1, 0x24, 0xe}}], 0x78}}], 0x1, 0x40) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000000100000100000028"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = creat(0x0, 0x6a) write$binfmt_elf32(r2, 0x0, 0x58) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r2, 0x942e, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a30000000060a03000000000000000808000a40000000030900010073797a30000000000800094000000002140000001100010000000000000000000500000a"], 0x58}, 0x1, 0x0, 0x0, 0x4000000}, 0x4010) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000340)={0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000001100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) r4 = socket(0x10, 0x3, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) bind$packet(r5, &(0x7f0000000300)={0x11, 0x63dcbf62d8600606, 0x0, 0x1, 0x8, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x32}}, 0x14) bind$packet(r5, &(0x7f0000000040)={0x11, 0x606}, 0x14) connect$netlink(r4, &(0x7f0000000280)=@proc={0x10, 0x0, 0x1}, 0xc) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x18, 0xf, &(0x7f0000000340)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r6}, 0x18) sendmsg$nl_route_sched(r4, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000e40)=@newtaction={0x18, 0x31, 0x829, 0x0, 0x0, {0x0, 0x0, 0x2}, [{0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4010}, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1800403, &(0x7f0000000940), 0x2, 0x5ad, &(0x7f0000000180)="$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") sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000100001000000f5ffffffffffffff000a14000000060a0000000000000000000002"], 0x3c}}, 0x0) mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f0000000000)='\x06\x00\x00\x00\x04\xb0\xfe\x98\x9a!s\x91]\xab\xc9\xa2IV\xb6-\xd9z\x81\x91\x8aP}I\xc6\x0e\xd9\v\xda\xbfS\x16 \x04\r\xcd\xdb:\xd4\xaf\r\x11\xa0\xd7\xd7\xb6\x9bz\x99\xaf\xfd\x87fN\xad\x90U\xb4A\xdf\xabB\xbba\x7f\xb8\x96\x1a\xe7\xc1\xab\x16\x02\x000x0, &(0x7f0000000600)=0x0) io_uring_register$IORING_REGISTER_PBUF_RING(r3, 0x16, 0x0, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x7, [@struct={0x5, 0x1, 0x0, 0xf, 0x0, 0x15, [{0x7fd, 0x15, 0x9d83}]}]}, {0x0, [0x61, 0x0, 0x0, 0x5f, 0x2e]}}, &(0x7f0000005bc0)=""/255, 0x37, 0xff, 0x9, 0x1000}, 0x28) r6 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x101343) open_by_handle_at(0xffffffffffffffff, 0x0, 0xfe) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x9, 0xc) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r6, 0x400454a4, &(0x7f0000000040)) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000, 0x0, 0x0, 0x10000}) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000005c0)={@ifindex, 0x26, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) r7 = socket$inet_mptcp(0x2, 0x1, 0x106) syz_io_uring_submit(r4, r5, &(0x7f00000002c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x20, 0x10, r7, 0x0, 0x0, 0x0, 0x2000, 0x1, {0x1}}) io_uring_enter(r3, 0x3516, 0xf4f5, 0x0, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r8, 0x0, 0x40000000003}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000300)='rcu_utilization\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0f0000000400000004000000"], 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) syz_clone(0x60002080, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_opts(r2, 0x0, 0x4, 0x0, 0x0) 731.281497ms ago: executing program 5 (id=5799): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x18) futimesat(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00"], &(0x7f0000001b80)='syzkaller\x00', 0x5, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000050000000000000001000004080000000000000003000000100000000000000000000002000000000300000000000004040000000000002e"], 0x0, 0x4d}, 0x20) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'ip6gre0\x00', &(0x7f0000000480)={'syztnl1\x00', 0x0, 0x2f, 0x40, 0x7, 0x97, 0x9, @loopback, @private0, 0x7800, 0x40, 0x619e, 0x9}}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="2100000007000000010001000900000001000000", @ANYRES32, @ANYBLOB="00001400"/20, @ANYRES32=r2, @ANYRES32, @ANYBLOB="000000d0098375a133f78800"/28], 0x50) socket$inet(0x2, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB='\v\x00\x00\x00\b\x00\x00\x00\f\x00\x00'], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x5, r3}, 0x38) r4 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f0000000200)='asymmetric\x00', &(0x7f0000000000)=@chain={'key_or_keyring:', r4}) 626.922848ms ago: executing program 5 (id=5800): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x1, 0x6) fchdir(r1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000000), 0x208e24b) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) preadv(r2, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x3f, 0x3f) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000280), 0x20cf81, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) open_tree(0xffffffffffffff9c, 0x0, 0x1) getsockopt$PNPIPE_IFINDEX(r4, 0x113, 0x2, &(0x7f00000003c0)=0x0, &(0x7f0000000400)=0x4) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYRES16], &(0x7f0000001800)='syzkaller\x00', 0x0, 0x0, 0x0, 0xf4ec12088bb3b1a7, 0x0, '\x00', r5, 0x2, r4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='9p_protocol_dump\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r7}, &(0x7f0000000500), &(0x7f0000000540)}, 0x20) link(&(0x7f0000000000)='./file1\x00', &(0x7f0000000140)='./file0\x00') 605.0948ms ago: executing program 0 (id=5801): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYRES32], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000440)='kfree\x00', r0, 0x0, 0x5}, 0x18) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0xfffffffffffffccc, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) fgetxattr(r1, &(0x7f0000000000)=ANY=[], 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r3, &(0x7f00000030c0)=[{{0x0, 0x0, &(0x7f0000000400)}}], 0x1, 0x9200000000000000) dup3(0xffffffffffffffff, r3, 0x0) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f00000001c0)={'batadv_slave_0\x00', 0x0}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r3, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r4, 0x1, 0xc1b5, 0x25dfdbff, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r5}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x10000}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x6}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x101}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r6}]}, 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x24000804) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r2, 0xc0a85320, &(0x7f00000005c0)={{0x80}, 'port0\x00', 0x72, 0x11cfa, 0x0, 0x8000008, 0x3, 0x4, 0x1, 0x0, 0x7cce8c743ee810df}) r7 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) read(r2, &(0x7f0000000840)=""/40, 0x28) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000180)={0x381, @time={0x5}, 0x40, {0xc0, 0xff}, 0x46, 0x1, 0x1}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r7, 0x40505330, &(0x7f0000000bc0)={0x800100, 0x0, 0x0, 0x724f, 0x0, 0x55a}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) fcntl$setpipe(r8, 0x407, 0x4) 375.012712ms ago: executing program 6 (id=5802): unshare(0x22020600) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8000, r0}, 0x38) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000380), &(0x7f0000001100)=0x1c, 0x80000) sendmsg$sock(r2, &(0x7f0000000580)={&(0x7f00000003c0)=@hci={0x1f, 0x1, 0x2}, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000440)="d42a57dbf3468b5e1b191099d8a9bae219e5469a817a354274fb667b9789756e4aacb6993f5b8352dbbb31c6d6", 0x2d}, {&(0x7f0000000a00)="bd7079e5487846e472a2d56574adde6b9612076a7d99de5f8ec581d572ec938fd4eb676aed29df6a1d1355b271b447c50a6f775c943bf543adae89fe795ff22769c2678d6ba24ae9f9e0c488a584f77e7911b7102b6ee652d16628cb31c91442cd51f6ea56aca1a2fd532e6ec4e7a2bdae460ccb6bb3f97b0a466b5f6d5b72b7be89baf828253b1683ed8a9ab64004d3e6488d6db8b1c9221a880559e9781136f9ee3a5a81de308bea8db93406aeb0860a54dca94420bf047691c070a3fce0f9e36c55824d4e3c6fc7571272b61eb348a5499039bed0a2ba0cef9aa274b7", 0xde}, {&(0x7f0000000600)="5405bd73c9ce95ede0e0308d7c7d803ee12448f1099808fb60f7e73c2f47a80c2f5cf218d33ce4abafb4e276af4259fc9479d63addaa064ac585385c1f02d5a8ed06e3a331ca6c5baeb34d71ac95b1c4ecc76858206b79e7daf9d0673b1aaf69ea228f99683f5058c30dc1a336acf1a992e78a9f2172", 0x76}, {&(0x7f0000000b00)="b81e138c1306de7e55db3b032efd7894f12e5465e903bc54317975f21183ed8ec92b6f3e422d074a9443d4adbabad0e2451856c194fc7841201f37abb403881b0892bf08373bdf82fd5bc3de5b989e7d52c0124f5d7b14300550fa000c6dddb986bb2a242914f0cf9e899027993c8fb20f4091fe7fa7de67f0d4bddaf77d61265213d2c4e864c5375074d8e7ff92378782cf73b269f25a699e285eaad3083b4907021d7464", 0xa5}, {&(0x7f0000000bc0)="16bc5ea99c3377488142455df20a7c296126a5371758d1bf8b62bc277bec48740402b97fb6e9feb2f5746d7c4dd70000c8f9292e90e5856c488bf72c8fae960b8649e38d63df744e569059dca9655b208462eb1cbb1a0b8a89e486de156a6123782f02e505e4a0e90a2dcbf1f8aa19e6e9d275", 0x73}, {&(0x7f0000000c40)="c2f96a641ae8f5bdee24be1ea3545c2f9742403ae0b7044d9d7fa6287fcaf067685ae1be7849e8febee0ce8cc18195aee44da3ae17b686b04d979328c9aa302cffc748848926912bcc0b1b5bfc9ba20ac10c284aa2cde2d75bfd9b0a3d89a2a483fb117d9b03b53d31996018f9f8f07a6becc10853d797cfad53a40925a2091a1b3de16b4884e862e195c41f078f36bd95f57d0eb1cdfb6f61e01c5bdc1eae13c437b8253e2656d676d1acaf74e1a7dfafe431418170702136d8aec3d3", 0xbd}, {&(0x7f0000000d00)="d999546a2bae52c32c06bd3cc3f8c47dc6669cd50774accd90ba5378527b965e3f139c36270167cac06dff94c83811fedbf9b20cadec50aa2522674ccec7a19720c98c043f85be6c7547dc11b099b9a9b58d173f0ece440a9013a875fa666d37c00f4091be1a492a761b84f5253a9190a56b6dad337faa539c6bb63a2abd652fa273ce2cf8a7a9c1f0f59dea722a4e80fe84904d0e1e8f988a379789e4fbea21ef4070b8f7447386c813683e30ff2e7f51b998c4aefc789574000000000000000000", 0xc2}, {&(0x7f0000000480)="8a137651aaae68e7803aa8976dfdf4baa6", 0x11}, {&(0x7f0000000e00)="e6e5be2013fd14771cb0a832dae1eb3f006aad82765a3dc6d3784923bdcd353e67a669896b5f080602f7040569d43558864d87abd3ee714a5b68c71c94a1ac2dca2f1ce6960100c7cd69b94a6c81b041a677b221efae0da6c1ad7bf0b2ab00dff5deb8d44d7fd32656222a270fb5808603deb232c296eb02a0998fe39aa6c7a1601af3bb94250b2ab5013e08a05f2fc430ff70", 0x93}, {&(0x7f0000000ec0)="429260206c841f5fc28ebc22fa5d4dd926d4b45aa1630a8f9cb409d56d53b3181f945eca37a732d5d74c1875e8e88fb669a22c541085df3018733e1d28e5aa3eb6d2d9c4174e8d319869c818bf3aa95eaccd68878cb1262ebe0e4ddd7b1a5a5ce0c539229637983b600de4d2781218ad396fe0f2861a4cd1cc08ae42e259c31dbe209f66537614b23ce8da0ba737241ade39d750134dd9fbfecf9f80a06279e6cbf5c70a4adb9d388189fd8f7229b4ed0aae2bc6b14b05f78241f1ea36ab1d5497f544db1a8745dbe3915d0254d0cf0373455fe6eca1468922d28ba5539a7b2c2fb75897a49a9730eb5934c6b1", 0xed}], 0xa, &(0x7f0000001080)=[@txtime={{0x18, 0x1, 0x3d, 0x2de}}, @mark={{0x14, 0x1, 0x24, 0x2}}, @mark={{0x14, 0x1, 0x24, 0x7ff}}], 0x48}, 0x45) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'vlan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4000000010000305000000000100000000000000", @ANYRES32=0x0, @ANYBLOB="00000000008000002000128008000100687372001400028008000200", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r4], 0x40}}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r5, 0x0, 0x3}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x1e, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x7f, '\x00', 0x0, @sk_lookup=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = socket$inet6(0xa, 0x80002, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r9, @ANYBLOB="010028bd7000ffdbdf251b00000008009a0004"], 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x4) r10 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) writev(r7, &(0x7f00000006c0)=[{&(0x7f0000000540)="2e9b5b0007e03dd65193dfb6c575963f86dd6067", 0x14}, {&(0x7f00000001c0)="b7000018110d0000e44ba0d544", 0xd}, {&(0x7f00000005c0)="37a8a6c41ea007f3c101004c63942c6cf4c8057700000006c4fd4d80a89943afd95d2f64a709031084879a0a16bf6636c7", 0x31}], 0x3) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x2a8, 0x0, 0x940c, 0x3002, 0x0, 0x2c0, 0x328, 0x3d8, 0x3d8, 0x328, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0, 0x4001}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x1, 0xbe, {0x565159d7}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x308) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000680), 0x208000, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0x1, 0x1000ffffffff}, 0x2000, 0x3, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$nl_generic(r11, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000980)=ANY=[@ANYBLOB="240000003f000500000000000000df25047c0000040000000c0001"], 0x24}, 0x1, 0x0, 0x0, 0x48800}, 0x0) r12 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) syz_io_uring_setup(0x76d0, &(0x7f00000000c0)={0x0, 0x64c1, 0x800, 0x0, 0x231, 0x0, r12}, &(0x7f0000000040), &(0x7f00000001c0)) 296.07014ms ago: executing program 5 (id=5803): r0 = socket(0x10, 0x3, 0x0) r1 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x1f07d1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1, 0x8000000}, 0x6025, 0x4005, 0x10000, 0x3, 0x2, 0x20005, 0x7, 0x0, 0x0, 0x0, 0x20080006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) sendmsg$key(r1, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x4070bd2c, 0x25dfdbfc, [@sadb_key={0x2, 0x9, 0x8, 0x0, "1c"}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @remote}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x7, 0xc, 0x80000000}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @remote}}]}, 0x60}, 0x1, 0x7}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000007c0)=@newqdisc={0x58, 0x24, 0x3fe3aa0262d8c583, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, r2, {0x0, 0xffe0}, {0xffff, 0xffff}, {0x10, 0xe}}, [@qdisc_kind_options=@q_fq={{0x7}, {0x2c, 0x2, [@TCA_FQ_FLOW_DEFAULT_RATE={0x8, 0x6, 0xffffffff}, @TCA_FQ_RATE_ENABLE={0x8, 0x5, 0x1}, @TCA_FQ_FLOW_REFILL_DELAY={0x8, 0x9, 0x3}, @TCA_FQ_FLOW_MAX_RATE={0x8, 0x7, 0x101}, @TCA_FQ_ORPHAN_MASK={0x8, 0xa, 0xaced}]}}]}, 0x58}}, 0x4048000) r3 = openat$selinux_policy(0xffffff9c, &(0x7f0000000300), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r3, 0x0) io_uring_register$IORING_UNREGISTER_IOWQ_AFF(r3, 0x12, 0x0, 0x0) socket(0x10, 0x3, 0x0) (async) socket$key(0xf, 0x3, 0x2) (async) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x1f07d1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x1, 0x8000000}, 0x6025, 0x4005, 0x10000, 0x3, 0x2, 0x20005, 0x7, 0x0, 0x0, 0x0, 0x20080006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) (async) sendmsg$key(r1, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x4070bd2c, 0x25dfdbfc, [@sadb_key={0x2, 0x9, 0x8, 0x0, "1c"}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @remote}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x7, 0xc, 0x80000000}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @remote}}]}, 0x60}, 0x1, 0x7}, 0x0) (async) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00'}) (async) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000007c0)=@newqdisc={0x58, 0x24, 0x3fe3aa0262d8c583, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, r2, {0x0, 0xffe0}, {0xffff, 0xffff}, {0x10, 0xe}}, [@qdisc_kind_options=@q_fq={{0x7}, {0x2c, 0x2, [@TCA_FQ_FLOW_DEFAULT_RATE={0x8, 0x6, 0xffffffff}, @TCA_FQ_RATE_ENABLE={0x8, 0x5, 0x1}, @TCA_FQ_FLOW_REFILL_DELAY={0x8, 0x9, 0x3}, @TCA_FQ_FLOW_MAX_RATE={0x8, 0x7, 0x101}, @TCA_FQ_ORPHAN_MASK={0x8, 0xa, 0xaced}]}}]}, 0x58}}, 0x4048000) (async) openat$selinux_policy(0xffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r3, 0x0) (async) io_uring_register$IORING_UNREGISTER_IOWQ_AFF(r3, 0x12, 0x0, 0x0) (async) 295.636781ms ago: executing program 0 (id=5804): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1b459d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x183, 0x800000006}, 0x11d075, 0x4005, 0xb, 0x0, 0x1, 0x1, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000400)=[{0x6, 0x1, 0x2, 0x7fff7ffc}]}) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f00000012c0)=ANY=[@ANYBLOB="020000000000000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000007f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000002000000e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x290) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2, 0x0, 0xffffffffffffffff}, 0x18) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r3, 0xfffffffffffffffe, r3, 0x1) close_range(r0, 0xffffffffffffffff, 0x0) 295.407021ms ago: executing program 0 (id=5805): socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00"/14], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000e5b7030000000700008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r1, 0x25, &(0x7f00000000c0)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000240)={0x1, &(0x7f0000000140)=[{0x6, 0x85, 0xef, 0x401}]}) setfsuid(0xee01) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r2, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r2, 0x25, &(0x7f00000000c0)) close(r1) 257.444354ms ago: executing program 4 (id=5806): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000100), 0x120) socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00'}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000200)={0x3, {{0x2, 0x4e23, @multicast2}}}, 0x88) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) sendmsg$kcm(r0, &(0x7f00000002c0)={&(0x7f0000001580)=@l2tp6={0xa, 0x0, 0x100000, @private1}, 0x80, &(0x7f0000000300)=[{&(0x7f0000002340)='L', 0x1}], 0x1}, 0x8c1) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000040)={0x0, 'veth1_virt_wifi\x00', {0x4}, 0xc}) r2 = socket(0x18, 0x1, 0x0) perf_event_open(&(0x7f0000001100)={0x5, 0x80, 0x9, 0x8, 0xb, 0xfb, 0x0, 0x3c, 0xc002, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x18842, 0x0, 0x7fffffff, 0x1, 0x8, 0x3, 0x7, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001f40)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) 183.654012ms ago: executing program 5 (id=5807): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x2000, 0x0, 0x0, 0x41000}, 0x94) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000900)=ANY=[@ANYBLOB="2c0000003f00070dfeffffff00000000017c0000040077000c0003"], 0x2c}, 0x1, 0x0, 0x0, 0x4048011}, 0x4044000) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000006300)=ANY=[@ANYBLOB="140000001000010000000000000000000a00000a20000000000a01030000006f688cfc000a0000000900010073797a300000000030000000030a010100000000000000000a000005"], 0x78}, 0x1, 0x0, 0x0, 0x90}, 0x800) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="020000009d26f8702ca5d9260000000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3}, 0x4) socket$inet_smc(0x2b, 0x1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) r5 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r6 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000280)=@chain={'key_or_keyring:', r6}) 182.992181ms ago: executing program 6 (id=5808): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r0}, 0x10) mremap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1000, 0x0, &(0x7f00008b5000/0x1000)=nil) r1 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$GIO_UNISCRNMAP(r1, 0x4b52, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/25], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000001e00100000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000fcffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r3}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x9, 0x4, 0x7ffc0002}]}) shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000180)=""/15) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x64, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) read(r1, &(0x7f0000000040)=""/109, 0x6d) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'bond0\x00'}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000001640)=""/139, &(0x7f0000000100)=0x8) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xfecc) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f00000003c0)={&(0x7f0000e8a000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000280)=""/103, 0x67, 0x1, &(0x7f0000000200)=""/13, 0xd}, &(0x7f0000000400)=0x40) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/vlan/vlan1\x00') r5 = socket(0x2, 0x2, 0x1) ioctl$sock_SIOCSIFVLAN_DEL_VLAN_CMD(r5, 0x8983, &(0x7f0000000000)={0x1, 'vlan1\x00', {}, 0x5832}) 55.607004ms ago: executing program 4 (id=5809): bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x10, 0x4, 0x8, 0x5}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008900000b70300000000000085"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, &(0x7f0000000000), &(0x7f0000000040)=r3}, 0x20) 35.740586ms ago: executing program 5 (id=5810): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x400c810) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x7, 0x9) (fail_nth: 4) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x8) r5 = getpid() sched_setscheduler(r5, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x7a, 0x0, 0x0, 0x41000, 0x44, '\x00', 0x0, @cgroup_sysctl=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) write$P9_RWRITE(r3, &(0x7f0000000040)={0xb}, 0x11000) read(r2, &(0x7f0000032440)=""/102364, 0x18fdc) 24.814768ms ago: executing program 2 (id=5811): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x18) futimesat(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00"], &(0x7f0000001b80)='syzkaller\x00', 0x5, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000003000000030000000050000000000000001000004080000000000000003000000100000000000000000000002000000000300000000000004040000000000002e"], 0x0, 0x4d}, 0x20) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'ip6gre0\x00', &(0x7f0000000480)={'syztnl1\x00', 0x0, 0x2f, 0x40, 0x7, 0x97, 0x9, @loopback, @private0, 0x7800, 0x40, 0x619e, 0x9}}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="2100000007000000010001000900000001000000", @ANYRES32, @ANYBLOB="00001400"/20, @ANYRES32=r2, @ANYRES32, @ANYBLOB="000000d0098375a133f78800"/28], 0x50) socket$inet(0x2, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB='\v\x00\x00\x00\b\x00\x00\x00\f\x00\x00'], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x5, r3}, 0x38) r4 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f0000000200)='asymmetric\x00', &(0x7f0000000000)=@chain={'key_or_keyring:', r4}) 2.43106ms ago: executing program 4 (id=5812): bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0xa, 0x5, 0x0) dup(r0) r1 = socket(0x2, 0x80805, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000001c0)={0x14, 0x453, 0x4, 0x70bd2b, 0x25dfdbff, "e4"}, 0x14}, 0x1, 0x0, 0x0, 0xc044}, 0x2080) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @private=0xa010101}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000100), &(0x7f00000002c0)=0x8) 0s ago: executing program 2 (id=5813): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r1}, &(0x7f0000000000), &(0x7f00000005c0)=r2}, 0x20) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000000040)) kernel console output (not intermixed with test programs): parsing attributes in process `syz.7.4535'. [ 241.840967][T16321] FAULT_INJECTION: forcing a failure. [ 241.840967][T16321] name failslab, interval 1, probability 0, space 0, times 0 [ 241.853754][T16321] CPU: 0 UID: 0 PID: 16321 Comm: syz.9.4541 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 241.853850][T16321] Tainted: [W]=WARN [ 241.853859][T16321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 241.853875][T16321] Call Trace: [ 241.853884][T16321] [ 241.853894][T16321] __dump_stack+0x1d/0x30 [ 241.853921][T16321] dump_stack_lvl+0xe8/0x140 [ 241.853945][T16321] dump_stack+0x15/0x1b [ 241.853976][T16321] should_fail_ex+0x265/0x280 [ 241.854062][T16321] should_failslab+0x8c/0xb0 [ 241.854098][T16321] kmem_cache_alloc_noprof+0x50/0x480 [ 241.854132][T16321] ? security_file_alloc+0x32/0x100 [ 241.854177][T16321] security_file_alloc+0x32/0x100 [ 241.854278][T16321] init_file+0x5c/0x1d0 [ 241.854310][T16321] alloc_empty_file+0x8b/0x200 [ 241.854405][T16321] alloc_file_pseudo+0xc6/0x160 [ 241.854463][T16321] __shmem_file_setup+0x1de/0x210 [ 241.854483][T16321] shmem_file_setup+0x3b/0x50 [ 241.854500][T16321] __se_sys_memfd_create+0x2c3/0x590 [ 241.854532][T16321] __x64_sys_memfd_create+0x31/0x40 [ 241.854645][T16321] x64_sys_call+0x2ac2/0x3000 [ 241.854673][T16321] do_syscall_64+0xd2/0x200 [ 241.854696][T16321] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 241.854734][T16321] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 241.854778][T16321] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 241.854798][T16321] RIP: 0033:0x7fa4e515f6c9 [ 241.854813][T16321] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 241.854894][T16321] RSP: 002b:00007fa4e3bc6e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 241.854918][T16321] RAX: ffffffffffffffda RBX: 000000000000043b RCX: 00007fa4e515f6c9 [ 241.854935][T16321] RDX: 00007fa4e3bc6ef0 RSI: 0000000000000000 RDI: 00007fa4e51e2960 [ 241.854951][T16321] RBP: 0000200000000200 R08: 00007fa4e3bc6bb7 R09: 00007fa4e3bc6e40 [ 241.854964][T16321] R10: 000000000000000a R11: 0000000000000202 R12: 00002000000001c0 [ 241.854976][T16321] R13: 00007fa4e3bc6ef0 R14: 00007fa4e3bc6eb0 R15: 0000200000000140 [ 241.854995][T16321] [ 242.202139][T16322] lo speed is unknown, defaulting to 1000 [ 242.526059][T16333] netlink: 27 bytes leftover after parsing attributes in process `syz.8.4545'. [ 242.548990][T16332] loop9: detected capacity change from 0 to 512 [ 242.557467][ T29] kauditd_printk_skb: 472 callbacks suppressed [ 242.557532][ T29] audit: type=1326 audit(250.879:39017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16328 comm="syz.4.4544" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa844aff6c9 code=0x7ffc0000 [ 242.586949][ T29] audit: type=1326 audit(250.879:39018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16328 comm="syz.4.4544" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa844aff6c9 code=0x7ffc0000 [ 242.610109][ T29] audit: type=1326 audit(250.879:39019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16328 comm="syz.4.4544" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa844aff6c9 code=0x7ffc0000 [ 242.633177][ T29] audit: type=1326 audit(250.879:39020): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16328 comm="syz.4.4544" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa844aff6c9 code=0x7ffc0000 [ 242.656590][ T29] audit: type=1326 audit(250.879:39021): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16328 comm="syz.4.4544" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa844aff6c9 code=0x7ffc0000 [ 242.679700][ T29] audit: type=1326 audit(250.879:39022): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16328 comm="syz.4.4544" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa844aff6c9 code=0x7ffc0000 [ 242.702692][ T29] audit: type=1326 audit(250.879:39023): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16328 comm="syz.4.4544" exe="/root/syz-executor" sig=0 arch=c000003e syscall=248 compat=0 ip=0x7fa844aff6c9 code=0x7ffc0000 [ 242.725893][ T29] audit: type=1326 audit(250.879:39024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16328 comm="syz.4.4544" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa844aff6c9 code=0x7ffc0000 [ 242.749011][ T29] audit: type=1326 audit(250.879:39025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16328 comm="syz.4.4544" exe="/root/syz-executor" sig=0 arch=c000003e syscall=250 compat=0 ip=0x7fa844aff6c9 code=0x7ffc0000 [ 242.772046][ T29] audit: type=1326 audit(250.879:39026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16328 comm="syz.4.4544" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa844aff6c9 code=0x7ffc0000 [ 242.829283][T16332] EXT4-fs (loop9): encrypted files will use data=ordered instead of data journaling mode [ 242.864043][T16332] EXT4-fs error (device loop9): ext4_init_orphan_info:618: comm syz.9.4546: orphan file block 0: bad magic [ 242.876911][T16332] EXT4-fs (loop9): mount failed [ 242.996827][T16343] loop4: detected capacity change from 0 to 512 [ 243.004273][T16343] FAT-fs (loop4): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 243.048776][T16348] loop9: detected capacity change from 0 to 512 [ 243.060244][T16348] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 243.083200][T16353] netlink: 104 bytes leftover after parsing attributes in process `syz.4.4553'. [ 243.098771][T16353] loop4: detected capacity change from 0 to 1024 [ 243.108824][T16353] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 243.501667][T16357] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16357 comm=syz.1.4554 [ 243.592024][T11420] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 243.614053][T16363] loop9: detected capacity change from 0 to 512 [ 243.622109][T16363] EXT4-fs error (device loop9): ext4_expand_extra_isize_ea:2803: inode #11: comm syz.9.4557: corrupted xattr block 95: invalid header [ 243.636181][T16363] EXT4-fs error (device loop9): ext4_validate_block_bitmap:432: comm syz.9.4557: bg 0: block 7: invalid block bitmap [ 243.648879][T16363] EXT4-fs error (device loop9) in ext4_mb_clear_bb:6667: Corrupt filesystem [ 243.657782][T16363] EXT4-fs error (device loop9): ext4_xattr_delete_inode:2967: inode #11: comm syz.9.4557: corrupted xattr block 95: invalid header [ 243.671599][T16363] EXT4-fs warning (device loop9): ext4_evict_inode:274: xattr delete (err -117) [ 243.680777][T16363] EXT4-fs (loop9): 1 orphan inode deleted [ 243.686988][T16363] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 243.714405][T11420] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 243.730466][T16367] loop8: detected capacity change from 0 to 512 [ 243.737214][T16367] FAT-fs (loop8): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 243.829489][T16376] netlink: 76 bytes leftover after parsing attributes in process `syz.9.4562'. [ 243.854484][T16377] netlink: 'syz.8.4561': attribute type 1 has an invalid length. [ 243.863586][T16377] program syz.8.4561 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 243.972362][T16388] netlink: 12 bytes leftover after parsing attributes in process `syz.9.4567'. [ 243.972416][T14765] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 244.130172][T16397] loop8: detected capacity change from 0 to 512 [ 244.136936][T16397] FAT-fs (loop8): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 244.196741][T16402] loop8: detected capacity change from 0 to 512 [ 244.209003][T16402] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 244.225586][T16402] netlink: 'syz.8.4573': attribute type 10 has an invalid length. [ 244.233501][T16402] netlink: 168 bytes leftover after parsing attributes in process `syz.8.4573'. [ 244.246575][T16402] team0: Port device syz_tun added [ 244.281379][T16405] $Hÿ: renamed from bond0 (while UP) [ 244.290109][T16405] $Hÿ: entered promiscuous mode [ 244.295218][T16405] bond_slave_0: entered promiscuous mode [ 244.301037][T16405] bond_slave_1: entered promiscuous mode [ 244.509041][T16410] loop7: detected capacity change from 0 to 1024 [ 244.548364][T16410] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 244.566463][T11401] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 244.579856][T16410] RDS: rds_bind could not find a transport for 0:0:20::, load rds_tcp or rds_rdma? [ 244.730998][T16418] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16418 comm=syz.8.4576 [ 244.748193][T16420] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4578'. [ 244.814813][T16424] loop8: detected capacity change from 0 to 512 [ 244.830192][T16424] EXT4-fs warning (device loop8): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 244.841849][T16424] EXT4-fs warning (device loop8): dx_probe:849: Enable large directory feature to access it [ 244.852018][T16424] EXT4-fs warning (device loop8): dx_probe:934: inode #2: comm syz.8.4579: Corrupt directory, running e2fsck is recommended [ 244.869306][T16424] EXT4-fs (loop8): Cannot turn on journaled quota: type 1: error -117 [ 244.878062][T16424] EXT4-fs error (device loop8): ext4_iget_extra_inode:5075: inode #15: comm syz.8.4579: corrupted in-inode xattr: invalid ea_ino [ 244.891972][T16424] EXT4-fs error (device loop8): ext4_orphan_get:1397: comm syz.8.4579: couldn't read orphan inode 15 (err -117) [ 244.906014][T16424] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 245.034000][T16424] bond1: entered promiscuous mode [ 245.044351][T16424] EXT4-fs warning (device loop8): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 245.055960][T16424] EXT4-fs warning (device loop8): dx_probe:849: Enable large directory feature to access it [ 245.066077][T16424] EXT4-fs warning (device loop8): dx_probe:934: inode #2: comm syz.8.4579: Corrupt directory, running e2fsck is recommended [ 245.329641][T16424] EXT4-fs warning (device loop8): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 245.341268][T16424] EXT4-fs warning (device loop8): dx_probe:849: Enable large directory feature to access it [ 245.351533][T16424] EXT4-fs warning (device loop8): dx_probe:934: inode #2: comm syz.8.4579: Corrupt directory, running e2fsck is recommended [ 245.474167][T16424] EXT4-fs error (device loop8): ext4_readdir:264: inode #2: block 3: comm syz.8.4579: path /343/file0: bad entry in directory: rec_len % 4 != 0 - offset=0, inode=4294967295, rec_len=17, size=1024 fake=0 [ 245.495060][T16424] EXT4-fs error (device loop8): ext4_readdir:264: inode #2: block 64: comm syz.8.4579: path /343/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, size=1024 fake=0 [ 245.522869][T16430] loop9: detected capacity change from 0 to 512 [ 245.744607][T11401] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 246.141112][T13890] team0: Port device syz_tun removed [ 246.222000][T13890] pimreg: left allmulticast mode [ 246.240891][T10064] netdevsim netdevsim9 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 246.299365][T10064] netdevsim netdevsim9 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 246.359342][T10064] netdevsim netdevsim9 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 246.429147][T10064] netdevsim netdevsim9 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 246.638412][T10064] bond1 (unregistering): (slave bridge2): Releasing active interface [ 246.738980][T10064] bond0 (unregistering): Released all slaves [ 246.747375][T10064] bond1 (unregistering): Released all slaves [ 246.826113][T10064] hsr_slave_0: left promiscuous mode [ 246.831836][T10064] hsr_slave_1: left promiscuous mode [ 246.839728][T10064] veth1_macvtap: left promiscuous mode [ 246.845275][T10064] veth0_macvtap: left promiscuous mode [ 246.897084][T10074] smc: removing ib device syz! [ 246.917540][ T5571] lo speed is unknown, defaulting to 1000 [ 246.923323][ T5571] infiniband syz2: ib_query_port failed (-19) [ 247.804624][T16498] chnl_net:caif_netlink_parms(): no params data found [ 247.841391][T16498] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.848487][T16498] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.855679][T16498] bridge_slave_0: entered allmulticast mode [ 247.862198][T16498] bridge_slave_0: entered promiscuous mode [ 247.868986][T16498] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.876043][T16498] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.883282][T16498] bridge_slave_1: entered allmulticast mode [ 247.889937][T16498] bridge_slave_1: entered promiscuous mode [ 247.906755][T16498] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 247.917203][T16498] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 247.937071][T16498] team0: Port device team_slave_0 added [ 247.943809][T16498] team0: Port device team_slave_1 added [ 247.959429][T16498] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 247.966394][T16498] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 247.992438][T16498] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 248.003671][T16498] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 248.010640][T16498] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 248.036632][T16498] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 248.062599][T16498] hsr_slave_0: entered promiscuous mode [ 248.068714][T16498] hsr_slave_1: entered promiscuous mode [ 248.074529][T16498] debugfs: 'hsr0' already exists in 'hsr' [ 248.080386][T16498] Cannot create hsr debugfs directory [ 248.323127][T16498] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 248.331948][T16498] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 248.340895][T16498] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 248.349790][T16498] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 248.365143][T16498] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.372233][T16498] bridge0: port 2(bridge_slave_1) entered forwarding state [ 248.379527][T16498] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.386649][T16498] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.395238][T10074] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.403293][T10074] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.431926][T16498] 8021q: adding VLAN 0 to HW filter on device bond0 [ 248.444274][T16498] 8021q: adding VLAN 0 to HW filter on device team0 [ 248.453489][T10095] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.460588][T10095] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.472049][T10074] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.479141][T10074] bridge0: port 2(bridge_slave_1) entered forwarding state [ 248.542724][T16498] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 248.607514][T16498] veth0_vlan: entered promiscuous mode [ 248.615575][T16498] veth1_vlan: entered promiscuous mode [ 248.631754][T16498] veth0_macvtap: entered promiscuous mode [ 248.639489][T16498] veth1_macvtap: entered promiscuous mode [ 248.650853][T16498] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 248.663514][T16498] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 248.675838][T10066] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 248.692672][T10066] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 248.706676][T10066] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 248.720614][T10066] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 248.843272][T16530] chnl_net:caif_netlink_parms(): no params data found [ 248.882682][T16530] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.889831][T16530] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.897289][T16530] bridge_slave_0: entered allmulticast mode [ 248.903769][T16530] bridge_slave_0: entered promiscuous mode [ 248.910611][T16530] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.917719][T16530] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.924902][T16530] bridge_slave_1: entered allmulticast mode [ 248.931710][T16530] bridge_slave_1: entered promiscuous mode [ 248.952178][T16530] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 248.963565][T16530] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 248.984461][T16530] team0: Port device team_slave_0 added [ 248.991005][T16530] team0: Port device team_slave_1 added [ 249.008457][T16530] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 249.015433][T16530] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 249.041609][T16530] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 249.053366][T16530] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 249.060397][T16530] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 249.086361][T16530] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 249.115868][T16530] hsr_slave_0: entered promiscuous mode [ 249.122400][T16530] hsr_slave_1: entered promiscuous mode [ 249.128392][T16530] debugfs: 'hsr0' already exists in 'hsr' [ 249.134126][T16530] Cannot create hsr debugfs directory [ 249.392612][T16530] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 249.402059][T16530] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 249.411410][T16530] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 249.420716][T16530] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 249.473591][T16530] 8021q: adding VLAN 0 to HW filter on device bond0 [ 249.489094][T16530] 8021q: adding VLAN 0 to HW filter on device team0 [ 249.499599][T10066] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.506726][T10066] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.520158][T10099] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.527301][T10099] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.607803][T16530] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 249.700907][ T29] kauditd_printk_skb: 71 callbacks suppressed [ 249.700926][ T29] audit: type=1400 audit(2000000003.790:39098): avc: denied { shutdown } for pid=16566 comm=77DEA305FF07 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 249.792948][T16530] veth0_vlan: entered promiscuous mode [ 249.808197][T16530] veth1_vlan: entered promiscuous mode [ 249.858493][T16530] veth0_macvtap: entered promiscuous mode [ 249.874137][T16530] veth1_macvtap: entered promiscuous mode [ 249.899461][T16530] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 249.924316][T16530] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 249.949597][T10066] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 249.971938][T10066] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 250.005219][T10066] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 250.024224][T10066] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 250.034945][ T29] audit: type=1326 audit(2000000004.120:39099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16581 comm="syz.4.4602" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fa844aff6c9 code=0x0 [ 250.069346][T16598] netlink: 8 bytes leftover after parsing attributes in process `syz.5.4594'. [ 250.129106][T16576] chnl_net:caif_netlink_parms(): no params data found [ 250.154438][T16608] loop5: detected capacity change from 0 to 128 [ 250.154723][T16574] chnl_net:caif_netlink_parms(): no params data found [ 250.173544][T16608] netlink: 4788 bytes leftover after parsing attributes in process `syz.5.4605'. [ 250.183044][T16608] netlink: 4788 bytes leftover after parsing attributes in process `syz.5.4605'. [ 250.194055][T16608] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 54) [ 250.202152][T16608] FAT-fs (loop5): Filesystem has been set read-only [ 250.229062][T16576] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.236145][T16576] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.243932][T16576] bridge_slave_0: entered allmulticast mode [ 250.250895][T16576] bridge_slave_0: entered promiscuous mode [ 250.262051][T16576] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.269287][T16576] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.276640][T16576] bridge_slave_1: entered allmulticast mode [ 250.284305][T16576] bridge_slave_1: entered promiscuous mode [ 250.294831][T16530] FAT-fs (loop5): error, fat_free: invalid cluster chain (i_pos 54) [ 250.326597][T16574] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.333965][T16574] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.341904][T16574] bridge_slave_0: entered allmulticast mode [ 250.348857][T16574] bridge_slave_0: entered promiscuous mode [ 250.357899][T16576] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 250.369696][T16574] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.376935][T16574] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.384501][T16574] bridge_slave_1: entered allmulticast mode [ 250.391193][T16574] bridge_slave_1: entered promiscuous mode [ 250.404265][T16576] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 250.423647][T16574] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 250.447744][T16574] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 250.458204][T16576] team0: Port device team_slave_0 added [ 250.466648][T16576] team0: Port device team_slave_1 added [ 250.475490][ T29] audit: type=1326 audit(2000000004.560:39100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16616 comm="syz.5.4606" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f8afa70f6c9 code=0x0 [ 250.515121][T16576] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 250.522121][T16576] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 250.548149][T16576] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 250.561072][T16574] team0: Port device team_slave_0 added [ 250.567418][T16576] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 250.574422][T16576] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 250.600466][T16576] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 250.615725][T16574] team0: Port device team_slave_1 added [ 250.649917][T16576] hsr_slave_0: entered promiscuous mode [ 250.656118][T16576] hsr_slave_1: entered promiscuous mode [ 250.662156][T16576] debugfs: 'hsr0' already exists in 'hsr' [ 250.667932][T16576] Cannot create hsr debugfs directory [ 250.683873][T16574] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 250.690945][T16574] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 250.716918][T16574] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 250.728859][T16574] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 250.735905][T16574] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 250.761980][T16574] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 250.785942][T16623] loop4: detected capacity change from 0 to 128 [ 250.801662][T16625] loop2: detected capacity change from 0 to 512 [ 250.807752][T16623] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000100) [ 250.808587][T16625] FAT-fs (loop2): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 250.815963][T16623] FAT-fs (loop4): Filesystem has been set read-only [ 250.837640][T16623] bio_check_eod: 51 callbacks suppressed [ 250.837709][T16623] syz.4.4608: attempt to access beyond end of device [ 250.837709][T16623] loop4: rw=524288, sector=2065, nr_sectors = 8 limit=128 [ 250.861015][T16574] hsr_slave_0: entered promiscuous mode [ 250.867286][T16574] hsr_slave_1: entered promiscuous mode [ 250.873339][T16574] debugfs: 'hsr0' already exists in 'hsr' [ 250.879142][T16574] Cannot create hsr debugfs directory [ 250.904199][T16628] loop2: detected capacity change from 0 to 1024 [ 250.910889][T16623] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000100) [ 250.918773][T16623] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000100) [ 250.927663][T16623] syz.4.4608: attempt to access beyond end of device [ 250.927663][T16623] loop4: rw=0, sector=2065, nr_sectors = 8 limit=128 [ 250.941199][T16623] syz.4.4608: attempt to access beyond end of device [ 250.941199][T16623] loop4: rw=0, sector=2065, nr_sectors = 8 limit=128 [ 250.945321][T16628] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 250.955791][T16623] syz.4.4608: attempt to access beyond end of device [ 250.955791][T16623] loop4: rw=0, sector=2065, nr_sectors = 8 limit=128 [ 250.989330][T16623] syz.4.4608: attempt to access beyond end of device [ 250.989330][T16623] loop4: rw=0, sector=2065, nr_sectors = 8 limit=128 [ 251.003700][T16623] syz.4.4608: attempt to access beyond end of device [ 251.003700][T16623] loop4: rw=0, sector=2065, nr_sectors = 8 limit=128 [ 251.017179][T16623] syz.4.4608: attempt to access beyond end of device [ 251.017179][T16623] loop4: rw=0, sector=2065, nr_sectors = 8 limit=128 [ 251.030788][T16623] syz.4.4608: attempt to access beyond end of device [ 251.030788][T16623] loop4: rw=0, sector=2065, nr_sectors = 8 limit=128 [ 251.044640][T16623] syz.4.4608: attempt to access beyond end of device [ 251.044640][T16623] loop4: rw=0, sector=2065, nr_sectors = 8 limit=128 [ 251.059388][T16623] syz.4.4608: attempt to access beyond end of device [ 251.059388][T16623] loop4: rw=0, sector=2065, nr_sectors = 8 limit=128 [ 251.290685][T16635] pim6reg: entered allmulticast mode [ 251.298446][T16634] pim6reg: left allmulticast mode [ 251.306710][T16498] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 251.532590][T16574] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 251.560930][T16574] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 251.587609][T16576] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 251.600599][T16647] loop5: detected capacity change from 0 to 512 [ 251.606977][ T29] audit: type=1326 audit(2000000005.680:39101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16646 comm="syz.5.4617" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8afa70f6c9 code=0x7ffc0000 [ 251.630822][ T29] audit: type=1326 audit(2000000005.680:39102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16646 comm="syz.5.4617" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8afa70f6c9 code=0x7ffc0000 [ 251.654553][ T29] audit: type=1326 audit(2000000005.690:39103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16646 comm="syz.5.4617" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f8afa70f6c9 code=0x7ffc0000 [ 251.678331][ T29] audit: type=1326 audit(2000000005.690:39104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16646 comm="syz.5.4617" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f8afa70f703 code=0x7ffc0000 [ 251.701977][ T29] audit: type=1326 audit(2000000005.690:39105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16646 comm="syz.5.4617" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f8afa70e17f code=0x7ffc0000 [ 251.725448][ T29] audit: type=1326 audit(2000000005.690:39106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16646 comm="syz.5.4617" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7f8afa70f757 code=0x7ffc0000 [ 251.749131][ T29] audit: type=1326 audit(2000000005.690:39107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16646 comm="syz.5.4617" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f8afa70df10 code=0x7ffc0000 [ 251.779160][T16574] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 251.784427][T16647] EXT4-fs error (device loop5): ext4_orphan_get:1418: comm syz.5.4617: bad orphan inode 13 [ 251.797268][T16647] ext4_test_bit(bit=12, block=4) = 1 [ 251.802602][T16647] is_bad_inode(inode)=0 [ 251.806450][T16574] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 251.806837][T16647] NEXT_ORPHAN(inode)=0 [ 251.817679][T16647] max_ino=32 [ 251.820888][T16647] i_nlink=1 [ 251.824404][T16647] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 251.827686][T16576] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 251.848767][T16647] EXT4-fs warning (device loop5): dx_probe:801: inode #2: comm syz.5.4617: Unrecognised inode hash code 20 [ 251.860250][T16647] EXT4-fs warning (device loop5): dx_probe:934: inode #2: comm syz.5.4617: Corrupt directory, running e2fsck is recommended [ 251.866814][T16576] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 251.873375][T16647] EXT4-fs error (device loop5): ext4_iget_extra_inode:5075: inode #15: comm syz.5.4617: corrupted in-inode xattr: e_value out of bounds [ 251.903913][T16647] EXT4-fs warning (device loop5): dx_probe:801: inode #2: comm syz.5.4617: Unrecognised inode hash code 20 [ 251.915393][T16647] EXT4-fs warning (device loop5): dx_probe:934: inode #2: comm syz.5.4617: Corrupt directory, running e2fsck is recommended [ 251.931101][T16576] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 251.938072][T16647] EXT4-fs error (device loop5): ext4_iget_extra_inode:5075: inode #15: comm syz.5.4617: corrupted in-inode xattr: e_value out of bounds [ 251.956955][T16647] EXT4-fs warning (device loop5): dx_probe:801: inode #2: comm syz.5.4617: Unrecognised inode hash code 20 [ 251.968458][T16647] EXT4-fs warning (device loop5): dx_probe:934: inode #2: comm syz.5.4617: Corrupt directory, running e2fsck is recommended [ 251.994468][T16647] EXT4-fs error (device loop5): ext4_iget_extra_inode:5075: inode #15: comm syz.5.4617: corrupted in-inode xattr: e_value out of bounds [ 252.029482][T16530] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 252.041232][T16574] 8021q: adding VLAN 0 to HW filter on device bond0 [ 252.359146][T16674] loop5: detected capacity change from 0 to 1024 [ 252.439890][T16678] netlink: 8 bytes leftover after parsing attributes in process `syz.2.4622'. [ 252.468137][T16574] 8021q: adding VLAN 0 to HW filter on device team0 [ 252.486926][T10102] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.494045][T10102] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.505626][T16576] 8021q: adding VLAN 0 to HW filter on device bond0 [ 252.522666][T16674] EXT4-fs: Ignoring removed orlov option [ 252.528538][T16674] EXT4-fs: Ignoring removed nomblk_io_submit option [ 252.535108][T16576] 8021q: adding VLAN 0 to HW filter on device team0 [ 252.546163][T10102] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.553409][T10102] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.578837][T16674] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 252.595474][T16674] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 252.606953][T10102] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.614144][T10102] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.624218][T10102] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.630854][T16690] loop2: detected capacity change from 0 to 512 [ 252.631349][T10102] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.645827][T16690] FAT-fs (loop2): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 252.693461][T16574] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 252.754274][T16697] loop4: detected capacity change from 0 to 128 [ 252.773636][T16697] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000100) [ 252.781578][T16697] FAT-fs (loop4): Filesystem has been set read-only [ 252.808669][T16697] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000100) [ 252.816731][T16697] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000100) [ 252.856314][T16576] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 252.947835][T16574] veth0_vlan: entered promiscuous mode [ 252.960621][T16574] veth1_vlan: entered promiscuous mode [ 253.054342][T16574] veth0_macvtap: entered promiscuous mode [ 253.094859][T16574] veth1_macvtap: entered promiscuous mode [ 253.138132][T16574] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 253.175545][T16574] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 253.338792][T10077] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 253.401448][T10077] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 253.433854][T16723] loop0: detected capacity change from 0 to 512 [ 253.449592][T10077] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 253.474740][T16723] FAT-fs (loop0): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 253.495824][T10077] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 253.617640][T16726] netlink: 8 bytes leftover after parsing attributes in process `syz.5.4630'. [ 253.769049][T16742] loop0: detected capacity change from 0 to 512 [ 253.810305][T16742] EXT4-fs error (device loop0): ext4_orphan_get:1418: comm syz.0.4635: bad orphan inode 13 [ 253.820813][T16742] ext4_test_bit(bit=12, block=4) = 1 [ 253.826135][T16742] is_bad_inode(inode)=0 [ 253.830344][T16742] NEXT_ORPHAN(inode)=0 [ 253.834442][T16742] max_ino=32 [ 253.837873][T16742] i_nlink=1 [ 253.841875][T16742] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 253.899925][T16742] EXT4-fs warning (device loop0): dx_probe:801: inode #2: comm syz.0.4635: Unrecognised inode hash code 20 [ 253.911529][T16742] EXT4-fs warning (device loop0): dx_probe:934: inode #2: comm syz.0.4635: Corrupt directory, running e2fsck is recommended [ 253.920910][T16576] veth0_vlan: entered promiscuous mode [ 253.927289][T16742] EXT4-fs error (device loop0): ext4_iget_extra_inode:5075: inode #15: comm syz.0.4635: corrupted in-inode xattr: e_value out of bounds [ 253.958818][T16576] veth1_vlan: entered promiscuous mode [ 254.009293][T16755] EXT4-fs warning (device loop0): dx_probe:801: inode #2: comm syz.0.4635: Unrecognised inode hash code 20 [ 254.020810][T16755] EXT4-fs warning (device loop0): dx_probe:934: inode #2: comm syz.0.4635: Corrupt directory, running e2fsck is recommended [ 254.094039][T16755] EXT4-fs error (device loop0): ext4_iget_extra_inode:5075: inode #15: comm syz.0.4635: corrupted in-inode xattr: e_value out of bounds [ 254.122472][T16576] veth0_macvtap: entered promiscuous mode [ 254.177786][T16758] netlink: 8 bytes leftover after parsing attributes in process `syz.2.4639'. [ 254.187273][T16576] veth1_macvtap: entered promiscuous mode [ 254.225345][T16576] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 254.264916][T16756] EXT4-fs warning (device loop0): dx_probe:801: inode #2: comm syz.0.4635: Unrecognised inode hash code 20 [ 254.276521][T16756] EXT4-fs warning (device loop0): dx_probe:934: inode #2: comm syz.0.4635: Corrupt directory, running e2fsck is recommended [ 254.303046][T16576] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 254.360865][T10077] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 254.377628][T16756] EXT4-fs error (device loop0): ext4_iget_extra_inode:5075: inode #15: comm syz.0.4635: corrupted in-inode xattr: e_value out of bounds [ 254.390397][T16761] loop2: detected capacity change from 0 to 512 [ 254.407503][T10077] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 254.409972][T16761] FAT-fs (loop2): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 254.428109][T10077] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 254.449253][T10077] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 254.459926][T16574] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 254.493648][T16764] loop5: detected capacity change from 0 to 512 [ 254.512342][T16764] FAT-fs (loop5): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 254.535192][T16769] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4644'. [ 254.600688][T16777] loop5: detected capacity change from 0 to 128 [ 254.671377][T16779] loop0: detected capacity change from 0 to 128 [ 254.691364][T16782] loop6: detected capacity change from 0 to 512 [ 254.711248][ T29] kauditd_printk_skb: 76 callbacks suppressed [ 254.711265][ T29] audit: type=1404 audit(2000000008.800:39184): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 254.777191][ T29] audit: type=1400 audit(2000000008.830:39185): avc: denied { mounton } for pid=16778 comm="syz.0.4647" path="/7/file0" dev="tmpfs" ino=55 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 254.800117][ T29] audit: type=1400 audit(2000000008.830:39186): avc: denied { read write } for pid=16778 comm="syz.0.4647" name="loop0" dev="devtmpfs" ino=912 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 254.823555][ T29] audit: type=1400 audit(2000000008.830:39187): avc: denied { create } for pid=16778 comm="syz.0.4647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 254.844536][ T29] audit: type=1326 audit(2000000008.830:39188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16780 comm="syz.5.4648" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8afa70f6c9 code=0x7ffc0000 [ 254.868254][ T29] audit: type=1326 audit(2000000008.830:39189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16780 comm="syz.5.4648" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8afa70f6c9 code=0x7ffc0000 [ 254.891958][ T29] audit: type=1400 audit(2000000008.830:39190): avc: denied { prog_load } for pid=16778 comm="syz.0.4647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 254.911371][ T29] audit: type=1400 audit(2000000008.830:39191): avc: denied { prog_load } for pid=16778 comm="syz.0.4647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 254.930783][ T29] audit: type=1400 audit(2000000008.830:39192): avc: denied { prog_load } for pid=16778 comm="syz.0.4647" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 254.950085][ T29] audit: type=1400 audit(2000000008.830:39193): avc: denied { mounton } for pid=16767 comm="syz.6.4600" path="/0/bus" dev="tmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 255.508737][T16801] FAULT_INJECTION: forcing a failure. [ 255.508737][T16801] name failslab, interval 1, probability 0, space 0, times 0 [ 255.521765][T16801] CPU: 1 UID: 0 PID: 16801 Comm: syz.2.4653 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 255.521840][T16801] Tainted: [W]=WARN [ 255.521847][T16801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 255.521863][T16801] Call Trace: [ 255.521872][T16801] [ 255.521961][T16801] __dump_stack+0x1d/0x30 [ 255.521986][T16801] dump_stack_lvl+0xe8/0x140 [ 255.522054][T16801] dump_stack+0x15/0x1b [ 255.522076][T16801] should_fail_ex+0x265/0x280 [ 255.522119][T16801] should_failslab+0x8c/0xb0 [ 255.522153][T16801] __kmalloc_node_track_caller_noprof+0xa5/0x580 [ 255.522296][T16801] ? led_tg_check+0x138/0x2b0 [ 255.522333][T16801] ? should_failslab+0x8c/0xb0 [ 255.522370][T16801] kstrdup+0x3e/0xd0 [ 255.522399][T16801] led_tg_check+0x138/0x2b0 [ 255.522470][T16801] xt_check_target+0x28d/0x4c0 [ 255.522581][T16801] ? strnlen+0x28/0x50 [ 255.522607][T16801] ? strcmp+0x22/0x50 [ 255.522632][T16801] ? xt_find_target+0x1cd/0x200 [ 255.522665][T16801] translate_table+0xc31/0xf90 [ 255.522740][T16801] do_ipt_set_ctl+0x66f/0x820 [ 255.522761][T16801] ? _raw_spin_unlock_bh+0x36/0x40 [ 255.522791][T16801] ? tcp_release_cb+0xf1/0x370 [ 255.522853][T16801] nf_setsockopt+0x199/0x1b0 [ 255.522900][T16801] ip_setsockopt+0x102/0x110 [ 255.522939][T16801] tcp_setsockopt+0x98/0xb0 [ 255.522964][T16801] sock_common_setsockopt+0x69/0x80 [ 255.523044][T16801] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 255.523080][T16801] __sys_setsockopt+0x184/0x200 [ 255.523173][T16801] __x64_sys_setsockopt+0x64/0x80 [ 255.523306][T16801] x64_sys_call+0x20ec/0x3000 [ 255.523331][T16801] do_syscall_64+0xd2/0x200 [ 255.523351][T16801] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 255.523382][T16801] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 255.523476][T16801] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 255.523504][T16801] RIP: 0033:0x7f83d3e2f6c9 [ 255.523523][T16801] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 255.523624][T16801] RSP: 002b:00007f83d2897038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 255.523643][T16801] RAX: ffffffffffffffda RBX: 00007f83d4085fa0 RCX: 00007f83d3e2f6c9 [ 255.523718][T16801] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003 [ 255.523736][T16801] RBP: 00007f83d2897090 R08: 0000000000000468 R09: 0000000000000000 [ 255.523794][T16801] R10: 0000200000001640 R11: 0000000000000246 R12: 0000000000000001 [ 255.523806][T16801] R13: 00007f83d4086038 R14: 00007f83d4085fa0 R15: 00007ffe494ed2f8 [ 255.523826][T16801] [ 256.384017][T16832] sctp: [Deprecated]: syz.2.4666 (pid 16832) Use of int in maxseg socket option. [ 256.384017][T16832] Use struct sctp_assoc_value instead [ 256.686655][T16835] x_tables: unsorted underflow at hook 3 [ 256.745124][T16837] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 256.820630][T16847] IPv6: Can't replace route, no match found [ 256.983013][T16860] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 257.952623][T16912] netlink: 8 bytes leftover after parsing attributes in process `syz.6.4701'. [ 259.178019][T17012] bond1: option ad_user_port_key: invalid value (1136) [ 259.184945][T17012] bond1: option ad_user_port_key: allowed values 0 - 1023 [ 259.193362][T17012] bond1 (unregistering): Released all slaves [ 259.581582][T17079] netlink: 4 bytes leftover after parsing attributes in process `\{('. [ 259.634769][T17088] FAULT_INJECTION: forcing a failure. [ 259.634769][T17088] name failslab, interval 1, probability 0, space 0, times 0 [ 259.647578][T17088] CPU: 0 UID: 0 PID: 17088 Comm: syz.6.4779 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 259.647610][T17088] Tainted: [W]=WARN [ 259.647619][T17088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 259.647638][T17088] Call Trace: [ 259.647646][T17088] [ 259.647655][T17088] __dump_stack+0x1d/0x30 [ 259.647692][T17088] dump_stack_lvl+0xe8/0x140 [ 259.647718][T17088] dump_stack+0x15/0x1b [ 259.647738][T17088] should_fail_ex+0x265/0x280 [ 259.647772][T17088] should_failslab+0x8c/0xb0 [ 259.647835][T17088] kmem_cache_alloc_noprof+0x50/0x480 [ 259.647892][T17088] ? security_file_alloc+0x32/0x100 [ 259.647928][T17088] security_file_alloc+0x32/0x100 [ 259.648023][T17088] init_file+0x5c/0x1d0 [ 259.648074][T17088] alloc_empty_file+0x8b/0x200 [ 259.648116][T17088] path_openat+0x68/0x2170 [ 259.648237][T17088] ? _parse_integer_limit+0x170/0x190 [ 259.648282][T17088] ? kstrtoull+0x111/0x140 [ 259.648322][T17088] ? kstrtouint+0x76/0xc0 [ 259.648357][T17088] do_filp_open+0x109/0x230 [ 259.648411][T17088] do_sys_openat2+0xa6/0x110 [ 259.648447][T17088] __x64_sys_openat+0xf2/0x120 [ 259.648472][T17088] x64_sys_call+0x2eab/0x3000 [ 259.648494][T17088] do_syscall_64+0xd2/0x200 [ 259.648515][T17088] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 259.648610][T17088] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 259.648694][T17088] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 259.648730][T17088] RIP: 0033:0x7f5bf59ff6c9 [ 259.648748][T17088] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 259.648822][T17088] RSP: 002b:00007f5bf445f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 259.648845][T17088] RAX: ffffffffffffffda RBX: 00007f5bf5c55fa0 RCX: 00007f5bf59ff6c9 [ 259.648861][T17088] RDX: 0000000000020000 RSI: 0000200000000240 RDI: ffffffffffffff9c [ 259.648877][T17088] RBP: 00007f5bf445f090 R08: 0000000000000000 R09: 0000000000000000 [ 259.648889][T17088] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 259.648900][T17088] R13: 00007f5bf5c56038 R14: 00007f5bf5c55fa0 R15: 00007ffdb67d9878 [ 259.648918][T17088] [ 259.680301][T17094] FAULT_INJECTION: forcing a failure. [ 259.680301][T17094] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 259.725448][T17096] netlink: 28 bytes leftover after parsing attributes in process `syz.6.4783'. [ 259.727299][T17094] CPU: 1 UID: 0 PID: 17094 Comm: syz.4.4782 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 259.727495][T17094] Tainted: [W]=WARN [ 259.727504][T17094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 259.727522][T17094] Call Trace: [ 259.727531][T17094] [ 259.727541][T17094] __dump_stack+0x1d/0x30 [ 259.727654][T17094] dump_stack_lvl+0xe8/0x140 [ 259.727703][T17094] dump_stack+0x15/0x1b [ 259.727729][T17094] should_fail_ex+0x265/0x280 [ 259.727789][T17094] should_fail_alloc_page+0xf2/0x100 [ 259.727851][T17094] __alloc_frozen_pages_noprof+0xff/0x360 [ 259.727911][T17094] alloc_pages_mpol+0xb3/0x260 [ 259.727942][T17094] vma_alloc_folio_noprof+0x1aa/0x300 [ 259.728020][T17094] handle_mm_fault+0xec2/0x2be0 [ 259.728106][T17094] ? __rcu_read_lock+0x37/0x50 [ 259.728143][T17094] ? __pte_offset_map_lock+0x1d4/0x230 [ 259.728197][T17094] __get_user_pages+0x102a/0x1ed0 [ 259.728231][T17094] __gup_longterm_locked+0x8ef/0xe60 [ 259.728371][T17094] ? exc_page_fault+0x62/0xa0 [ 259.728418][T17094] ? should_fail_ex+0xdb/0x280 [ 259.728473][T17094] pin_user_pages_remote+0x7e/0xb0 [ 259.728516][T17094] process_vm_rw+0x484/0x960 [ 259.728623][T17094] __x64_sys_process_vm_writev+0x78/0x90 [ 259.728665][T17094] x64_sys_call+0x2a80/0x3000 [ 259.728697][T17094] do_syscall_64+0xd2/0x200 [ 259.728727][T17094] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 259.728782][T17094] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 259.728830][T17094] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 259.728861][T17094] RIP: 0033:0x7fa844aff6c9 [ 259.728908][T17094] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 259.728937][T17094] RSP: 002b:00007fa843567038 EFLAGS: 00000246 ORIG_RAX: 0000000000000137 [ 259.728964][T17094] RAX: ffffffffffffffda RBX: 00007fa844d55fa0 RCX: 00007fa844aff6c9 [ 259.729013][T17094] RDX: 0000000000000001 RSI: 0000200000000000 RDI: 00000000000001ad [ 259.729031][T17094] RBP: 00007fa843567090 R08: 000000000000023a R09: 0000000000000000 [ 259.729048][T17094] R10: 0000200000121000 R11: 0000000000000246 R12: 0000000000000001 [ 259.729064][T17094] R13: 00007fa844d56038 R14: 00007fa844d55fa0 R15: 00007fff3edbba38 [ 259.729090][T17094] [ 259.737270][ T29] kauditd_printk_skb: 1215 callbacks suppressed [ 259.737288][ T29] audit: type=1400 audit(2000000269.799:40409): avc: denied { read write } for pid=16576 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 259.740833][T17096] netlink: 28 bytes leftover after parsing attributes in process `syz.6.4783'. [ 259.746140][ T29] audit: type=1400 audit(2000000269.809:40410): avc: denied { prog_load } for pid=17095 comm="syz.6.4783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 259.784683][ T29] audit: type=1400 audit(2000000269.809:40411): avc: denied { prog_load } for pid=17095 comm="syz.6.4783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 259.784715][ T29] audit: type=1400 audit(2000000269.809:40412): avc: denied { create } for pid=17095 comm="syz.6.4783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=0 [ 259.796363][ T29] audit: type=1400 audit(2000000269.809:40413): avc: denied { prog_load } for pid=17095 comm="syz.6.4783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 259.796390][ T29] audit: type=1400 audit(2000000269.809:40414): avc: denied { map_create } for pid=17095 comm="syz.6.4783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 259.796413][ T29] audit: type=1400 audit(2000000269.809:40415): avc: denied { prog_load } for pid=17095 comm="syz.6.4783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 259.804492][T17097] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=17097 comm=syz.6.4783 [ 259.820589][ T29] audit: type=1400 audit(2000000269.809:40416): avc: denied { prog_load } for pid=17095 comm="syz.6.4783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 259.820687][ T29] audit: type=1400 audit(2000000269.839:40417): avc: denied { create } for pid=17095 comm="syz.6.4783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 260.328210][ T29] audit: type=1400 audit(2000000269.839:40418): avc: denied { prog_load } for pid=17095 comm="syz.6.4783" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 260.357327][T17096] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 260.375544][T17100] netlink: 8 bytes leftover after parsing attributes in process `syz.2.4784'. [ 260.658103][T17145] netlink: 'syz.5.4804': attribute type 13 has an invalid length. [ 260.697948][T17145] gretap0: refused to change device tx_queue_len [ 260.704346][T17145] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 261.904242][T10102] Bluetooth: hci0: Frame reassembly failed (-84) [ 261.961356][T17260] netlink: 'syz.0.4852': attribute type 21 has an invalid length. [ 261.969348][T17260] netlink: 128 bytes leftover after parsing attributes in process `syz.0.4852'. [ 261.978639][T17260] netlink: 'syz.0.4852': attribute type 4 has an invalid length. [ 261.986392][T17260] netlink: 'syz.0.4852': attribute type 5 has an invalid length. [ 261.994313][T17260] netlink: 3 bytes leftover after parsing attributes in process `syz.0.4852'. [ 262.084346][T17266] : renamed from veth0_to_bond (while UP) [ 263.917082][ T3510] Bluetooth: hci0: command 0x1003 tx timeout [ 263.917094][T14908] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 263.997488][T17439] FAULT_INJECTION: forcing a failure. [ 263.997488][T17439] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 264.010650][T17439] CPU: 1 UID: 0 PID: 17439 Comm: syz.6.4926 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 264.010685][T17439] Tainted: [W]=WARN [ 264.010692][T17439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 264.010704][T17439] Call Trace: [ 264.010711][T17439] [ 264.010787][T17439] __dump_stack+0x1d/0x30 [ 264.010882][T17439] dump_stack_lvl+0xe8/0x140 [ 264.010909][T17439] dump_stack+0x15/0x1b [ 264.010993][T17439] should_fail_ex+0x265/0x280 [ 264.011035][T17439] should_fail+0xb/0x20 [ 264.011117][T17439] should_fail_usercopy+0x1a/0x20 [ 264.011143][T17439] _copy_from_user+0x1c/0xb0 [ 264.011174][T17439] kstrtouint_from_user+0x69/0xf0 [ 264.011195][T17439] ? 0xffffffff81000000 [ 264.011207][T17439] ? selinux_file_permission+0x1e4/0x320 [ 264.011291][T17439] proc_fail_nth_write+0x50/0x160 [ 264.011329][T17439] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 264.011395][T17439] vfs_write+0x269/0x960 [ 264.011426][T17439] ? vfs_read+0x4e6/0x770 [ 264.011454][T17439] ? __rcu_read_unlock+0x4f/0x70 [ 264.011565][T17439] ? __fget_files+0x184/0x1c0 [ 264.011603][T17439] ksys_write+0xda/0x1a0 [ 264.011685][T17439] __x64_sys_write+0x40/0x50 [ 264.011713][T17439] x64_sys_call+0x2802/0x3000 [ 264.011740][T17439] do_syscall_64+0xd2/0x200 [ 264.011763][T17439] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 264.011815][T17439] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 264.011852][T17439] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 264.011879][T17439] RIP: 0033:0x7f5bf59fe17f [ 264.011946][T17439] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 264.011971][T17439] RSP: 002b:00007f5bf445f030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 264.011995][T17439] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5bf59fe17f [ 264.012012][T17439] RDX: 0000000000000001 RSI: 00007f5bf445f0a0 RDI: 0000000000000003 [ 264.012024][T17439] RBP: 00007f5bf445f090 R08: 0000000000000000 R09: 0000000000000000 [ 264.012036][T17439] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 264.012112][T17439] R13: 00007f5bf5c56038 R14: 00007f5bf5c55fa0 R15: 00007ffdb67d9878 [ 264.012135][T17439] [ 264.372156][T17467] FAULT_INJECTION: forcing a failure. [ 264.372156][T17467] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 264.385471][T17467] CPU: 0 UID: 0 PID: 17467 Comm: syz.2.4937 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 264.385589][T17467] Tainted: [W]=WARN [ 264.385599][T17467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 264.385615][T17467] Call Trace: [ 264.385622][T17467] [ 264.385631][T17467] __dump_stack+0x1d/0x30 [ 264.385659][T17467] dump_stack_lvl+0xe8/0x140 [ 264.385685][T17467] dump_stack+0x15/0x1b [ 264.385754][T17467] should_fail_ex+0x265/0x280 [ 264.385788][T17467] should_fail+0xb/0x20 [ 264.385824][T17467] should_fail_usercopy+0x1a/0x20 [ 264.385919][T17467] _copy_from_user+0x1c/0xb0 [ 264.385954][T17467] __sys_bpf+0x183/0x7c0 [ 264.385987][T17467] __x64_sys_bpf+0x41/0x50 [ 264.386019][T17467] x64_sys_call+0x2aee/0x3000 [ 264.386054][T17467] do_syscall_64+0xd2/0x200 [ 264.386081][T17467] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 264.386165][T17467] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 264.386208][T17467] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 264.386231][T17467] RIP: 0033:0x7f83d3e2f6c9 [ 264.386250][T17467] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 264.386273][T17467] RSP: 002b:00007f83d2897038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 264.386339][T17467] RAX: ffffffffffffffda RBX: 00007f83d4085fa0 RCX: 00007f83d3e2f6c9 [ 264.386355][T17467] RDX: 000000000000000c RSI: 0000200000000ac0 RDI: 0000000000000023 [ 264.386369][T17467] RBP: 00007f83d2897090 R08: 0000000000000000 R09: 0000000000000000 [ 264.386448][T17467] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 264.386483][T17467] R13: 00007f83d4086038 R14: 00007f83d4085fa0 R15: 00007ffe494ed2f8 [ 264.386501][T17467] [ 264.615045][T17476] xt_connbytes: Forcing CT accounting to be enabled [ 264.622230][T17476] Cannot find set identified by id 0 to match [ 264.661974][T17481] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17481 comm=syz.5.4943 [ 264.742048][ T29] kauditd_printk_skb: 1455 callbacks suppressed [ 264.742065][ T29] audit: type=1400 audit(2000000274.829:41874): avc: denied { read write } for pid=16498 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 264.787132][ T29] audit: type=1400 audit(2000000274.839:41875): avc: denied { execute } for pid=17487 comm="syz.2.4946" path="/67/cpu.stat" dev="tmpfs" ino=376 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 264.810243][ T29] audit: type=1400 audit(2000000274.839:41876): avc: denied { create } for pid=17487 comm="syz.2.4946" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 264.831798][ T29] audit: type=1400 audit(2000000274.879:41877): avc: denied { read write } for pid=16498 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 264.857157][ T29] audit: type=1400 audit(2000000274.919:41878): avc: denied { create } for pid=17490 comm="syz.2.4947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 264.878251][ T29] audit: type=1400 audit(2000000274.949:41879): avc: denied { create } for pid=17486 comm="syz.5.4945" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 264.899442][ T29] audit: type=1400 audit(2000000274.969:41880): avc: denied { create } for pid=17486 comm="syz.5.4945" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 264.920130][ T29] audit: type=1400 audit(2000000274.969:41881): avc: denied { prog_load } for pid=17490 comm="syz.2.4947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 264.940329][ T29] audit: type=1400 audit(2000000274.989:41882): avc: denied { map_create } for pid=17490 comm="syz.2.4947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 264.959801][ T29] audit: type=1400 audit(2000000275.029:41883): avc: denied { prog_load } for pid=17490 comm="syz.2.4947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 265.130444][T17501] netlink: 'syz.2.4952': attribute type 1 has an invalid length. [ 265.138302][T17501] netlink: 'syz.2.4952': attribute type 2 has an invalid length. [ 265.828074][T10064] Bluetooth: hci0: Frame reassembly failed (-84) [ 266.140727][T17579] ip_tunnel: non-ECT from 172.20.20.187 with TOS=0x2 [ 266.193404][T17591] x_tables: ip6_tables: mh match: only valid for protocol 135 [ 266.310927][T17611] netlink: 'syz.5.4998': attribute type 1 has an invalid length. [ 266.316321][T17608] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=48656 sclass=netlink_route_socket pid=17608 comm=syz.5.4998 [ 266.341939][T17611] 8021q: adding VLAN 0 to HW filter on device bond1 [ 267.837126][ T3510] Bluetooth: hci0: command 0x1003 tx timeout [ 267.837155][T14908] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 268.310104][T17732] FAULT_INJECTION: forcing a failure. [ 268.310104][T17732] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 268.323285][T17732] CPU: 0 UID: 0 PID: 17732 Comm: syz.4.5047 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 268.323329][T17732] Tainted: [W]=WARN [ 268.323338][T17732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 268.323354][T17732] Call Trace: [ 268.323362][T17732] [ 268.323417][T17732] __dump_stack+0x1d/0x30 [ 268.323440][T17732] dump_stack_lvl+0xe8/0x140 [ 268.323465][T17732] dump_stack+0x15/0x1b [ 268.323488][T17732] should_fail_ex+0x265/0x280 [ 268.323532][T17732] should_fail+0xb/0x20 [ 268.323688][T17732] should_fail_usercopy+0x1a/0x20 [ 268.323735][T17732] _copy_to_user+0x20/0xa0 [ 268.323759][T17732] simple_read_from_buffer+0xb5/0x130 [ 268.323784][T17732] proc_fail_nth_read+0x10e/0x150 [ 268.323825][T17732] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 268.323899][T17732] vfs_read+0x1a8/0x770 [ 268.323922][T17732] ? __fget_files+0x184/0x1c0 [ 268.323956][T17732] ? __rcu_read_unlock+0x4f/0x70 [ 268.323983][T17732] ? __fget_files+0x184/0x1c0 [ 268.324014][T17732] ksys_read+0xda/0x1a0 [ 268.324109][T17732] __x64_sys_read+0x40/0x50 [ 268.324134][T17732] x64_sys_call+0x27c0/0x3000 [ 268.324174][T17732] do_syscall_64+0xd2/0x200 [ 268.324242][T17732] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 268.324326][T17732] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 268.324368][T17732] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 268.324417][T17732] RIP: 0033:0x7fa844afe0dc [ 268.324436][T17732] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 268.324460][T17732] RSP: 002b:00007fa843567030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 268.324486][T17732] RAX: ffffffffffffffda RBX: 00007fa844d55fa0 RCX: 00007fa844afe0dc [ 268.324501][T17732] RDX: 000000000000000f RSI: 00007fa8435670a0 RDI: 0000000000000004 [ 268.324536][T17732] RBP: 00007fa843567090 R08: 0000000000000000 R09: 0000000000000000 [ 268.324548][T17732] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 268.324564][T17732] R13: 00007fa844d56038 R14: 00007fa844d55fa0 R15: 00007fff3edbba38 [ 268.324584][T17732] [ 269.189582][T17815] netlink: 96 bytes leftover after parsing attributes in process `syz.5.5082'. [ 269.484418][T17820] netlink: 8 bytes leftover after parsing attributes in process `syz.4.5084'. [ 269.714706][T17841] bond1: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 269.731674][T17841] bond1 (unregistering): Released all slaves [ 269.748274][ T29] kauditd_printk_skb: 1458 callbacks suppressed [ 269.748337][ T29] audit: type=1400 audit(2000000279.819:43342): avc: denied { prog_load } for pid=17843 comm="syz.0.5094" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 269.774186][ T29] audit: type=1400 audit(2000000279.819:43343): avc: denied { create } for pid=17843 comm="syz.0.5094" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 269.795126][ T29] audit: type=1400 audit(2000000279.819:43344): avc: denied { create } for pid=17843 comm="syz.0.5094" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 269.811797][T17847] bond1: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 269.815994][ T29] audit: type=1400 audit(2000000279.819:43345): avc: denied { map_create } for pid=17843 comm="syz.0.5094" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 269.845682][ T29] audit: type=1400 audit(2000000279.819:43346): avc: denied { create } for pid=17843 comm="syz.0.5094" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 269.845709][ T29] audit: type=1400 audit(2000000279.819:43347): avc: denied { prog_load } for pid=17843 comm="syz.0.5094" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 269.845737][ T29] audit: type=1400 audit(2000000279.829:43348): avc: denied { read write } for pid=16574 comm="syz-executor" name="loop0" dev="devtmpfs" ino=912 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 269.909474][ T29] audit: type=1400 audit(2000000279.839:43349): avc: denied { read write } for pid=14765 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 269.909944][T17847] bond1 (unregistering): Released all slaves [ 269.933957][ T29] audit: type=1400 audit(2000000279.859:43350): avc: denied { prog_load } for pid=17845 comm="syz.0.5095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 269.959597][ T29] audit: type=1400 audit(2000000279.859:43351): avc: denied { map_create } for pid=17845 comm="syz.0.5095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 270.672671][T17889] FAULT_INJECTION: forcing a failure. [ 270.672671][T17889] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 270.685906][T17889] CPU: 0 UID: 0 PID: 17889 Comm: syz.0.5112 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 270.685947][T17889] Tainted: [W]=WARN [ 270.685956][T17889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 270.685973][T17889] Call Trace: [ 270.685982][T17889] [ 270.685991][T17889] __dump_stack+0x1d/0x30 [ 270.686080][T17889] dump_stack_lvl+0xe8/0x140 [ 270.686107][T17889] dump_stack+0x15/0x1b [ 270.686130][T17889] should_fail_ex+0x265/0x280 [ 270.686173][T17889] should_fail+0xb/0x20 [ 270.686218][T17889] should_fail_usercopy+0x1a/0x20 [ 270.686239][T17889] _copy_from_user+0x1c/0xb0 [ 270.686272][T17889] kstrtouint_from_user+0x69/0xf0 [ 270.686299][T17889] ? 0xffffffff81000000 [ 270.686312][T17889] ? selinux_file_permission+0x1e4/0x320 [ 270.686417][T17889] proc_fail_nth_write+0x50/0x160 [ 270.686452][T17889] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 270.686573][T17889] vfs_write+0x269/0x960 [ 270.686674][T17889] ? vfs_read+0x4e6/0x770 [ 270.686702][T17889] ? __rcu_read_unlock+0x4f/0x70 [ 270.686816][T17889] ? __fget_files+0x184/0x1c0 [ 270.686854][T17889] ksys_write+0xda/0x1a0 [ 270.686888][T17889] __x64_sys_write+0x40/0x50 [ 270.686914][T17889] x64_sys_call+0x2802/0x3000 [ 270.687012][T17889] do_syscall_64+0xd2/0x200 [ 270.687044][T17889] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 270.687196][T17889] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 270.687264][T17889] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 270.687295][T17889] RIP: 0033:0x7f9b5e26e17f [ 270.687310][T17889] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 270.687328][T17889] RSP: 002b:00007f9b5cccf030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 270.687346][T17889] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9b5e26e17f [ 270.687359][T17889] RDX: 0000000000000001 RSI: 00007f9b5cccf0a0 RDI: 0000000000000004 [ 270.687425][T17889] RBP: 00007f9b5cccf090 R08: 0000000000000000 R09: 0000000000000000 [ 270.687442][T17889] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 270.687458][T17889] R13: 00007f9b5e4c6038 R14: 00007f9b5e4c5fa0 R15: 00007ffd9c1421c8 [ 270.687570][T17889] [ 271.085691][T17929] bond1: option lacp_rate: invalid value (64) [ 271.093176][T17929] bond1 (unregistering): Released all slaves [ 271.777695][T17944] netlink: 12336 bytes leftover after parsing attributes in process `syz.4.5133'. [ 271.907541][T17963] can0: slcan on ttyS3. [ 271.953695][T10070] Bluetooth: hci0: Frame reassembly failed (-84) [ 271.977274][T17963] can0 (unregistered): slcan off ttyS3. [ 272.937842][T18007] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5159'. [ 272.947268][T18007] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 272.980338][T18007] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 273.137105][T18031] FAULT_INJECTION: forcing a failure. [ 273.137105][T18031] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 273.150411][T18031] CPU: 1 UID: 0 PID: 18031 Comm: syz.0.5169 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 273.150485][T18031] Tainted: [W]=WARN [ 273.150493][T18031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 273.150509][T18031] Call Trace: [ 273.150518][T18031] [ 273.150527][T18031] __dump_stack+0x1d/0x30 [ 273.150554][T18031] dump_stack_lvl+0xe8/0x140 [ 273.150580][T18031] dump_stack+0x15/0x1b [ 273.150663][T18031] should_fail_ex+0x265/0x280 [ 273.150730][T18031] should_fail+0xb/0x20 [ 273.150776][T18031] should_fail_usercopy+0x1a/0x20 [ 273.150798][T18031] _copy_to_user+0x20/0xa0 [ 273.150904][T18031] simple_read_from_buffer+0xb5/0x130 [ 273.150934][T18031] proc_fail_nth_read+0x10e/0x150 [ 273.150978][T18031] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 273.151042][T18031] vfs_read+0x1a8/0x770 [ 273.151072][T18031] ? fdget_pos+0x13f/0x1d0 [ 273.151169][T18031] ? __pfx_mutex_lock+0x10/0x10 [ 273.151213][T18031] ksys_read+0xda/0x1a0 [ 273.151245][T18031] __x64_sys_read+0x40/0x50 [ 273.151303][T18031] x64_sys_call+0x27c0/0x3000 [ 273.151331][T18031] do_syscall_64+0xd2/0x200 [ 273.151356][T18031] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 273.151457][T18031] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 273.151498][T18031] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 273.151546][T18031] RIP: 0033:0x7f9b5e26e0dc [ 273.151565][T18031] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 273.151602][T18031] RSP: 002b:00007f9b5cccf030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 273.151625][T18031] RAX: ffffffffffffffda RBX: 00007f9b5e4c5fa0 RCX: 00007f9b5e26e0dc [ 273.151641][T18031] RDX: 000000000000000f RSI: 00007f9b5cccf0a0 RDI: 0000000000000003 [ 273.151657][T18031] RBP: 00007f9b5cccf090 R08: 0000000000000000 R09: 0000000000000000 [ 273.151673][T18031] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001 [ 273.151756][T18031] R13: 00007f9b5e4c6038 R14: 00007f9b5e4c5fa0 R15: 00007ffd9c1421c8 [ 273.151788][T18031] [ 273.997532][ T3510] Bluetooth: hci0: command 0x1003 tx timeout [ 273.998365][T14908] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 274.043613][T18068] IPv6: NLM_F_CREATE should be specified when creating new route [ 274.072557][T18070] wg2: entered promiscuous mode [ 274.077513][T18070] wg2: entered allmulticast mode [ 274.766924][ T29] kauditd_printk_skb: 1339 callbacks suppressed [ 274.766940][ T29] audit: type=1400 audit(2000000540.850:44691): avc: denied { read write } for pid=16530 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 274.800943][ T29] audit: type=1400 audit(2000000540.880:44692): avc: denied { prog_load } for pid=18110 comm="syz.6.5201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 274.820273][ T29] audit: type=1400 audit(2000000540.880:44693): avc: denied { open } for pid=18110 comm="syz.6.5201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 274.839674][ T29] audit: type=1400 audit(2000000540.880:44694): avc: denied { open } for pid=18110 comm="syz.6.5201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 274.859125][ T29] audit: type=1400 audit(2000000540.890:44695): avc: denied { read } for pid=18110 comm="syz.6.5201" name="sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=0 [ 274.909862][T18126] audit: audit_backlog=65 > audit_backlog_limit=64 [ 274.916436][T18126] audit: audit_lost=10 audit_rate_limit=0 audit_backlog_limit=64 [ 274.924263][T18126] audit: backlog limit exceeded [ 274.929267][ T29] audit: type=1400 audit(2000000540.900:44696): avc: denied { create } for pid=18118 comm="syz.5.5204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 274.949143][ T29] audit: type=1400 audit(2000000540.970:44697): avc: denied { map_create } for pid=18118 comm="syz.5.5204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 275.119032][T18149] FAULT_INJECTION: forcing a failure. [ 275.119032][T18149] name failslab, interval 1, probability 0, space 0, times 0 [ 275.131855][T18149] CPU: 1 UID: 0 PID: 18149 Comm: syz.0.5213 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 275.131886][T18149] Tainted: [W]=WARN [ 275.131892][T18149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 275.131904][T18149] Call Trace: [ 275.131910][T18149] [ 275.131947][T18149] __dump_stack+0x1d/0x30 [ 275.131967][T18149] dump_stack_lvl+0xe8/0x140 [ 275.131986][T18149] dump_stack+0x15/0x1b [ 275.132001][T18149] should_fail_ex+0x265/0x280 [ 275.132045][T18149] should_failslab+0x8c/0xb0 [ 275.132071][T18149] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 275.132142][T18149] ? __alloc_skb+0x101/0x320 [ 275.132169][T18149] __alloc_skb+0x101/0x320 [ 275.132218][T18149] ? audit_log_start+0x342/0x720 [ 275.132238][T18149] audit_log_start+0x3a0/0x720 [ 275.132310][T18149] ? kstrtouint+0x76/0xc0 [ 275.132409][T18149] audit_seccomp+0x48/0x100 [ 275.132504][T18149] ? __seccomp_filter+0x82d/0x1250 [ 275.132587][T18149] __seccomp_filter+0x83e/0x1250 [ 275.132620][T18149] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 275.132649][T18149] ? vfs_write+0x7e8/0x960 [ 275.132757][T18149] ? __rcu_read_unlock+0x4f/0x70 [ 275.132812][T18149] ? __fget_files+0x184/0x1c0 [ 275.132845][T18149] __secure_computing+0x82/0x150 [ 275.132889][T18149] syscall_trace_enter+0xcf/0x1e0 [ 275.132913][T18149] do_syscall_64+0xac/0x200 [ 275.132931][T18149] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 275.132997][T18149] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 275.133026][T18149] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 275.133045][T18149] RIP: 0033:0x7f9b5e26f6c9 [ 275.133098][T18149] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 275.133114][T18149] RSP: 002b:00007f9b5cccf038 EFLAGS: 00000246 ORIG_RAX: 000000000000004c [ 275.133130][T18149] RAX: ffffffffffffffda RBX: 00007f9b5e4c5fa0 RCX: 00007f9b5e26f6c9 [ 275.133141][T18149] RDX: 0000000000000000 RSI: 0000000003000000 RDI: 0000000000000000 [ 275.133190][T18149] RBP: 00007f9b5cccf090 R08: 0000000000000000 R09: 0000000000000000 [ 275.133200][T18149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 275.133263][T18149] R13: 00007f9b5e4c6038 R14: 00007f9b5e4c5fa0 R15: 00007ffd9c1421c8 [ 275.133278][T18149] [ 275.845032][T18199] xt_connbytes: Forcing CT accounting to be enabled [ 275.851822][T18199] Cannot find set identified by id 0 to match [ 275.968660][T18221] netlink: 20 bytes leftover after parsing attributes in process `syz.5.5242'. [ 276.032649][T18229] FAULT_INJECTION: forcing a failure. [ 276.032649][T18229] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 276.045853][T18229] CPU: 0 UID: 0 PID: 18229 Comm: syz.5.5247 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 276.045895][T18229] Tainted: [W]=WARN [ 276.045904][T18229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 276.045920][T18229] Call Trace: [ 276.045935][T18229] [ 276.045945][T18229] __dump_stack+0x1d/0x30 [ 276.045974][T18229] dump_stack_lvl+0xe8/0x140 [ 276.045998][T18229] dump_stack+0x15/0x1b [ 276.046020][T18229] should_fail_ex+0x265/0x280 [ 276.046117][T18229] should_fail+0xb/0x20 [ 276.046213][T18229] should_fail_usercopy+0x1a/0x20 [ 276.046234][T18229] _copy_to_user+0x20/0xa0 [ 276.046284][T18229] simple_read_from_buffer+0xb5/0x130 [ 276.046347][T18229] proc_fail_nth_read+0x10e/0x150 [ 276.046388][T18229] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 276.046486][T18229] vfs_read+0x1a8/0x770 [ 276.046513][T18229] ? __rcu_read_unlock+0x4f/0x70 [ 276.046547][T18229] ? __fget_files+0x184/0x1c0 [ 276.046625][T18229] ksys_read+0xda/0x1a0 [ 276.046652][T18229] __x64_sys_read+0x40/0x50 [ 276.046683][T18229] x64_sys_call+0x27c0/0x3000 [ 276.046712][T18229] do_syscall_64+0xd2/0x200 [ 276.046824][T18229] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 276.046857][T18229] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 276.046891][T18229] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 276.046912][T18229] RIP: 0033:0x7f8afa70e0dc [ 276.046957][T18229] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 276.046981][T18229] RSP: 002b:00007f8af916f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 276.047004][T18229] RAX: ffffffffffffffda RBX: 00007f8afa965fa0 RCX: 00007f8afa70e0dc [ 276.047025][T18229] RDX: 000000000000000f RSI: 00007f8af916f0a0 RDI: 0000000000000005 [ 276.047104][T18229] RBP: 00007f8af916f090 R08: 0000000000000000 R09: 0000000000000000 [ 276.047116][T18229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 276.047128][T18229] R13: 00007f8afa966038 R14: 00007f8afa965fa0 R15: 00007ffcec8538e8 [ 276.047149][T18229] [ 276.528237][T18261] netlink: 'syz.0.5259': attribute type 13 has an invalid length. [ 276.579874][T18261] bridge0: port 2(bridge_slave_1) entered disabled state [ 276.587167][T18261] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.670704][T18261] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 276.746125][T10074] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 276.756170][T18268] netlink: 4 bytes leftover after parsing attributes in process `syz.6.5260'. [ 276.788752][T10074] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 276.801358][T10074] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 276.827378][T10074] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 276.894112][T18280] sch_tbf: peakrate 7 is lower than or equals to rate 6829859379779001161 ! [ 278.670858][T18336] FAULT_INJECTION: forcing a failure. [ 278.670858][T18336] name failslab, interval 1, probability 0, space 0, times 0 [ 278.683739][T18336] CPU: 1 UID: 0 PID: 18336 Comm: wÞ£ÿ Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 278.683798][T18336] Tainted: [W]=WARN [ 278.683806][T18336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 278.683819][T18336] Call Trace: [ 278.683825][T18336] [ 278.683833][T18336] __dump_stack+0x1d/0x30 [ 278.683856][T18336] dump_stack_lvl+0xe8/0x140 [ 278.683954][T18336] dump_stack+0x15/0x1b [ 278.684002][T18336] should_fail_ex+0x265/0x280 [ 278.684046][T18336] should_failslab+0x8c/0xb0 [ 278.684110][T18336] __kmalloc_node_track_caller_noprof+0xa5/0x580 [ 278.684159][T18336] ? sidtab_sid2str_get+0xa0/0x130 [ 278.684200][T18336] kmemdup_noprof+0x2b/0x70 [ 278.684232][T18336] sidtab_sid2str_get+0xa0/0x130 [ 278.684329][T18336] security_sid_to_context_core+0x1eb/0x2e0 [ 278.684432][T18336] security_sid_to_context+0x27/0x40 [ 278.684465][T18336] selinux_lsmprop_to_secctx+0x67/0xf0 [ 278.684495][T18336] security_lsmprop_to_secctx+0x1a3/0x1c0 [ 278.684522][T18336] audit_log_subj_ctx+0xa4/0x3e0 [ 278.684620][T18336] ? skb_put+0xa9/0xf0 [ 278.684719][T18336] audit_log_task_context+0x48/0x70 [ 278.684748][T18336] audit_log_task+0xf4/0x250 [ 278.684781][T18336] ? kstrtouint+0x76/0xc0 [ 278.684868][T18336] audit_seccomp+0x61/0x100 [ 278.684903][T18336] ? __seccomp_filter+0x82d/0x1250 [ 278.684955][T18336] __seccomp_filter+0x83e/0x1250 [ 278.685006][T18336] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 278.685073][T18336] ? vfs_write+0x7e8/0x960 [ 278.685097][T18336] ? __rcu_read_unlock+0x4f/0x70 [ 278.685133][T18336] ? __fget_files+0x184/0x1c0 [ 278.685171][T18336] __secure_computing+0x82/0x150 [ 278.685236][T18336] syscall_trace_enter+0xcf/0x1e0 [ 278.685272][T18336] do_syscall_64+0xac/0x200 [ 278.685300][T18336] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 278.685389][T18336] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 278.685422][T18336] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 278.685462][T18336] RIP: 0033:0x7f8afa70f6c9 [ 278.685483][T18336] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 278.685512][T18336] RSP: 002b:00007f8af916f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 278.685537][T18336] RAX: ffffffffffffffda RBX: 00007f8afa965fa0 RCX: 00007f8afa70f6c9 [ 278.685563][T18336] RDX: 0000000000000001 RSI: 0000200000002a80 RDI: 0000000000000004 [ 278.685575][T18336] RBP: 00007f8af916f090 R08: 0000000000000000 R09: 0000000000000000 [ 278.685587][T18336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 278.685602][T18336] R13: 00007f8afa966038 R14: 00007f8afa965fa0 R15: 00007ffcec8538e8 [ 278.685625][T18336] [ 278.989543][T18341] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=18341 comm=syz.6.5290 [ 279.598598][T18360] netlink: 24 bytes leftover after parsing attributes in process `syz.4.5296'. [ 279.851544][ T29] kauditd_printk_skb: 1151 callbacks suppressed [ 279.851559][ T29] audit: type=1400 audit(2000000545.940:45846): avc: denied { read write } for pid=16498 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 279.890890][ T29] audit: type=1400 audit(2000000545.980:45847): avc: denied { map_create } for pid=18375 comm="syz.2.5302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 279.910365][ T29] audit: type=1400 audit(2000000545.980:45848): avc: denied { prog_load } for pid=18375 comm="syz.2.5302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 279.920824][T18376] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5302'. [ 279.929879][ T29] audit: type=1400 audit(2000000546.010:45849): avc: denied { map_create } for pid=18375 comm="syz.2.5302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 279.958065][ T29] audit: type=1400 audit(2000000546.010:45850): avc: denied { prog_load } for pid=18375 comm="syz.2.5302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 279.977353][ T29] audit: type=1400 audit(2000000546.010:45851): avc: denied { create } for pid=18375 comm="syz.2.5302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 279.997051][ T29] audit: type=1400 audit(2000000546.010:45852): avc: denied { create } for pid=18375 comm="syz.2.5302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 280.016753][ T29] audit: type=1400 audit(2000000546.010:45853): avc: denied { create } for pid=18375 comm="syz.2.5302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 280.036521][ T29] audit: type=1400 audit(2000000546.010:45854): avc: denied { create } for pid=18375 comm="syz.2.5302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 280.056319][ T29] audit: type=1400 audit(2000000546.010:45855): avc: denied { create } for pid=18375 comm="syz.2.5302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 280.585697][T18414] ip6t_rpfilter: unknown options [ 281.138271][T18458] FAULT_INJECTION: forcing a failure. [ 281.138271][T18458] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 281.151663][T18458] CPU: 1 UID: 0 PID: 18458 Comm: syz.4.5336 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 281.151698][T18458] Tainted: [W]=WARN [ 281.151794][T18458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 281.151806][T18458] Call Trace: [ 281.151812][T18458] [ 281.151820][T18458] __dump_stack+0x1d/0x30 [ 281.151841][T18458] dump_stack_lvl+0xe8/0x140 [ 281.151859][T18458] dump_stack+0x15/0x1b [ 281.151875][T18458] should_fail_ex+0x265/0x280 [ 281.151927][T18458] should_fail_alloc_page+0xf2/0x100 [ 281.151955][T18458] __alloc_frozen_pages_noprof+0xff/0x360 [ 281.152063][T18458] alloc_pages_mpol+0xb3/0x260 [ 281.152114][T18458] vma_alloc_folio_noprof+0x1aa/0x300 [ 281.152135][T18458] handle_mm_fault+0xec2/0x2be0 [ 281.152159][T18458] ? vma_start_read+0x141/0x1f0 [ 281.152271][T18458] do_user_addr_fault+0x630/0x1080 [ 281.152337][T18458] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 281.152362][T18458] exc_page_fault+0x62/0xa0 [ 281.152390][T18458] asm_exc_page_fault+0x26/0x30 [ 281.152497][T18458] RIP: 0033:0x7fa844aacbbb [ 281.152511][T18458] Code: c0 8b 87 c0 00 00 00 66 0f 6c c0 85 c0 0f 85 44 01 00 00 c7 87 c0 00 00 00 ff ff ff ff 48 8d 84 24 20 21 00 00 48 8d 7c 24 20 <0f> 29 44 24 40 49 89 e4 48 89 44 24 50 8b 43 74 48 89 9c 24 00 01 [ 281.152527][T18458] RSP: 002b:00007fa843543e10 EFLAGS: 00010246 [ 281.152542][T18458] RAX: 00007fa843545f30 RBX: 00007fa844d27640 RCX: 0000000000000000 [ 281.152553][T18458] RDX: 00007fa843545f78 RSI: 00007fa844b5edf8 RDI: 00007fa843543e30 [ 281.152594][T18458] RBP: 0000000000000009 R08: 0000000000000000 R09: 0000000000000000 [ 281.152605][T18458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 281.152616][T18458] R13: 00007fa844d56128 R14: 00007fa844d56090 R15: 00007fff3edbba38 [ 281.152633][T18458] [ 281.152642][T18458] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 281.831057][T18493] @0Ù: renamed from bond_slave_1 [ 282.322264][T18529] macvlan2: entered promiscuous mode [ 282.327643][T18529] macvlan2: entered allmulticast mode [ 282.333089][T18529] gretap0: entered allmulticast mode [ 283.087660][T18572] FAULT_INJECTION: forcing a failure. [ 283.087660][T18572] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 283.100841][T18572] CPU: 1 UID: 0 PID: 18572 Comm: syz.4.5379 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 283.100878][T18572] Tainted: [W]=WARN [ 283.100884][T18572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 283.100918][T18572] Call Trace: [ 283.100925][T18572] [ 283.100933][T18572] __dump_stack+0x1d/0x30 [ 283.100953][T18572] dump_stack_lvl+0xe8/0x140 [ 283.101008][T18572] dump_stack+0x15/0x1b [ 283.101080][T18572] should_fail_ex+0x265/0x280 [ 283.101117][T18572] should_fail+0xb/0x20 [ 283.101145][T18572] should_fail_usercopy+0x1a/0x20 [ 283.101245][T18572] _copy_to_user+0x20/0xa0 [ 283.101279][T18572] simple_read_from_buffer+0xb5/0x130 [ 283.101303][T18572] proc_fail_nth_read+0x10e/0x150 [ 283.101332][T18572] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 283.101437][T18572] vfs_read+0x1a8/0x770 [ 283.101459][T18572] ? __rcu_read_unlock+0x4f/0x70 [ 283.101482][T18572] ? __fget_files+0x184/0x1c0 [ 283.101508][T18572] ksys_read+0xda/0x1a0 [ 283.101559][T18572] __x64_sys_read+0x40/0x50 [ 283.101581][T18572] x64_sys_call+0x27c0/0x3000 [ 283.101601][T18572] do_syscall_64+0xd2/0x200 [ 283.101620][T18572] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 283.101671][T18572] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 283.101707][T18572] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 283.101734][T18572] RIP: 0033:0x7fa844afe0dc [ 283.101748][T18572] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 283.101765][T18572] RSP: 002b:00007fa843567030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 283.101852][T18572] RAX: ffffffffffffffda RBX: 00007fa844d55fa0 RCX: 00007fa844afe0dc [ 283.101864][T18572] RDX: 000000000000000f RSI: 00007fa8435670a0 RDI: 0000000000000003 [ 283.101875][T18572] RBP: 00007fa843567090 R08: 0000000000000000 R09: 0000000000000000 [ 283.101886][T18572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 283.101897][T18572] R13: 00007fa844d56038 R14: 00007fa844d55fa0 R15: 00007fff3edbba38 [ 283.101913][T18572] [ 283.688081][T18580] netlink: 552 bytes leftover after parsing attributes in process `syz.5.5382'. [ 283.943985][T18611] bridge1: entered allmulticast mode [ 283.962499][T18611] netlink: 'syz.4.5393': attribute type 10 has an invalid length. [ 283.975481][T18611] team0: Port device dummy0 added [ 283.982856][T18611] netlink: 'syz.4.5393': attribute type 10 has an invalid length. [ 283.994961][T18611] team0: Port device dummy0 removed [ 284.002268][T18611] dummy0: entered promiscuous mode [ 284.008067][T18611] $Hÿ: (slave dummy0): Enslaving as an active interface with an up link [ 284.319858][T18619] xfrm0: entered promiscuous mode [ 284.324974][T18619] xfrm0: entered allmulticast mode [ 284.531798][T18638] wireguard0: entered promiscuous mode [ 284.535869][T18632] netlink: 14 bytes leftover after parsing attributes in process `syz.2.5402'. [ 284.537484][T18638] wireguard0: entered allmulticast mode [ 284.564874][T18632] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 284.575608][T18632] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 284.586638][T18632] bond0 (unregistering): Released all slaves [ 284.807392][T18672] sch_tbf: burst 19360 is lower than device lo mtu (65550) ! [ 284.857496][ T29] kauditd_printk_skb: 1322 callbacks suppressed [ 284.857510][ T29] audit: type=1400 audit(2000000550.950:47178): avc: denied { read write } for pid=18679 comm="syz.6.5422" name="sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=0 [ 284.891298][ T29] audit: type=1400 audit(2000000550.950:47179): avc: denied { map_create } for pid=18682 comm="syz.4.5423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 284.910724][ T29] audit: type=1400 audit(2000000550.960:47180): avc: denied { read write } for pid=16574 comm="syz-executor" name="loop0" dev="devtmpfs" ino=912 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 284.934416][ T29] audit: type=1400 audit(2000000550.980:47181): avc: denied { create } for pid=18679 comm="syz.6.5422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 284.941571][T18687] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5424'. [ 284.954854][ T29] audit: type=1400 audit(2000000550.980:47182): avc: denied { map_create } for pid=18679 comm="syz.6.5422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 284.983539][ T29] audit: type=1400 audit(2000000550.980:47183): avc: denied { prog_load } for pid=18679 comm="syz.6.5422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 284.989812][T18687] netlink: 12 bytes leftover after parsing attributes in process `syz.0.5424'. [ 285.002901][ T29] audit: type=1400 audit(2000000550.980:47184): avc: denied { prog_load } for pid=18679 comm="syz.6.5422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 285.031076][ T29] audit: type=1400 audit(2000000550.980:47185): avc: denied { create } for pid=18679 comm="syz.6.5422" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 285.050978][ T29] audit: type=1400 audit(2000000550.990:47186): avc: denied { prog_load } for pid=18682 comm="syz.4.5423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 285.070260][ T29] audit: type=1400 audit(2000000551.010:47187): avc: denied { create } for pid=18685 comm="syz.0.5424" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 285.514555][T18737] netlink: 4 bytes leftover after parsing attributes in process `syz.6.5444'. [ 285.576412][T18732] netlink: 16 bytes leftover after parsing attributes in process `syz.4.5442'. [ 285.601476][T18745] futex_wake_op: syz.6.5447 tries to shift op by -1; fix this program [ 285.676676][T18751] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=18751 comm=syz.5.5450 [ 285.763070][T18745] netlink: 14 bytes leftover after parsing attributes in process `syz.6.5447'. [ 285.808576][T18745] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 285.820878][T18745] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 285.842915][T18745] bond0 (unregistering): Released all slaves [ 285.998562][T18778] serio: Serial port ptm0 [ 286.402654][T18834] netlink: 8 bytes leftover after parsing attributes in process `syz.5.5485'. [ 286.458299][T18840] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 286.976686][T18852] sch_fq: defrate 4294967295 ignored. [ 287.402873][T18907] bond1: entered promiscuous mode [ 287.408088][T18907] bond1: entered allmulticast mode [ 287.414077][T18907] 8021q: adding VLAN 0 to HW filter on device bond1 [ 287.423574][T18907] bond1 (unregistering): Released all slaves [ 287.814314][T18929] netdevsim netdevsim0: Direct firmware load for r failed with error -2 [ 287.847741][T18931] netlink: 'syz.5.5524': attribute type 13 has an invalid length. [ 287.887045][T18931] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.894315][T18931] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.900486][T18932] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18932 comm=syz.5.5524 [ 287.948496][T18931] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 287.959376][T18931] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 288.022153][T10064] netdevsim netdevsim5 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 288.031274][T10064] netdevsim netdevsim5 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 288.040775][T10064] netdevsim netdevsim5 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 288.050019][T10064] netdevsim netdevsim5 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 288.174189][T18960] tc_dump_action: action bad kind [ 288.928550][T18985] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=257 sclass=netlink_route_socket pid=18985 comm=syz.5.5543 [ 289.912653][ T29] kauditd_printk_skb: 1434 callbacks suppressed [ 289.912671][ T29] audit: type=1400 audit(2000000556.000:48622): avc: denied { read write } for pid=16576 comm="syz-executor" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 289.943632][ T29] audit: type=1400 audit(2000000556.010:48623): avc: denied { prog_load } for pid=19038 comm="syz.6.5567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 289.962925][ T29] audit: type=1400 audit(2000000556.010:48624): avc: denied { read write } for pid=19038 comm="syz.6.5567" name="loop6" dev="devtmpfs" ino=106 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 289.987159][ T29] audit: type=1400 audit(2000000556.010:48625): avc: denied { create } for pid=19038 comm="syz.6.5567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=0 [ 290.007828][ T29] audit: type=1400 audit(2000000556.010:48626): avc: denied { allowed } for pid=19038 comm="syz.6.5567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 290.027876][ T29] audit: type=1400 audit(2000000556.010:48627): avc: denied { map_create } for pid=19038 comm="syz.6.5567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 290.047211][ T29] audit: type=1400 audit(2000000556.010:48628): avc: denied { prog_load } for pid=19038 comm="syz.6.5567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 290.066571][ T29] audit: type=1400 audit(2000000556.010:48629): avc: denied { create } for pid=19038 comm="syz.6.5567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 290.087295][ T29] audit: type=1400 audit(2000000556.010:48630): avc: denied { create } for pid=19038 comm="syz.6.5567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 290.108105][ T29] audit: type=1400 audit(2000000556.020:48631): avc: denied { create } for pid=19038 comm="syz.6.5567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 290.446125][T19076] xt_hashlimit: max too large, truncated to 1048576 [ 290.453067][T19076] No such timeout policy "syz1" [ 290.465958][T19076] netlink: 20 bytes leftover after parsing attributes in process `gtp'. [ 290.505552][T19080] netlink: 'syz.5.5583': attribute type 10 has an invalid length. [ 290.515175][T19080] team0: Port device dummy0 added [ 290.755721][T19115] veth0_vlan: left promiscuous mode [ 290.935865][T19126] FAULT_INJECTION: forcing a failure. [ 290.935865][T19126] name failslab, interval 1, probability 0, space 0, times 0 [ 290.948663][T19126] CPU: 0 UID: 0 PID: 19126 Comm: syz.6.5604 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 290.948702][T19126] Tainted: [W]=WARN [ 290.948710][T19126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 290.948736][T19126] Call Trace: [ 290.948743][T19126] [ 290.948753][T19126] __dump_stack+0x1d/0x30 [ 290.948776][T19126] dump_stack_lvl+0xe8/0x140 [ 290.948803][T19126] dump_stack+0x15/0x1b [ 290.948820][T19126] should_fail_ex+0x265/0x280 [ 290.948983][T19126] should_failslab+0x8c/0xb0 [ 290.949022][T19126] kmem_cache_alloc_noprof+0x50/0x480 [ 290.949055][T19126] ? getname_flags+0x80/0x3b0 [ 290.949095][T19126] getname_flags+0x80/0x3b0 [ 290.949237][T19126] __x64_sys_rmdir+0x21/0x40 [ 290.949263][T19126] x64_sys_call+0x2390/0x3000 [ 290.949309][T19126] do_syscall_64+0xd2/0x200 [ 290.949336][T19126] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 290.949494][T19126] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 290.949538][T19126] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 290.949639][T19126] RIP: 0033:0x7f5bf59ff6c9 [ 290.949660][T19126] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 290.949741][T19126] RSP: 002b:00007f5bf445f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000054 [ 290.949765][T19126] RAX: ffffffffffffffda RBX: 00007f5bf5c55fa0 RCX: 00007f5bf59ff6c9 [ 290.949779][T19126] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000100 [ 290.949798][T19126] RBP: 00007f5bf445f090 R08: 0000000000000000 R09: 0000000000000000 [ 290.949813][T19126] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 290.949867][T19126] R13: 00007f5bf5c56038 R14: 00007f5bf5c55fa0 R15: 00007ffdb67d9878 [ 290.949885][T19126] [ 291.203568][T19130] netlink: 27 bytes leftover after parsing attributes in process `syz.2.5606'. [ 291.861313][T19205] FAULT_INJECTION: forcing a failure. [ 291.861313][T19205] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 291.874714][T19205] CPU: 1 UID: 0 PID: 19205 Comm: syz.5.5635 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 291.874757][T19205] Tainted: [W]=WARN [ 291.874767][T19205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 291.874780][T19205] Call Trace: [ 291.874831][T19205] [ 291.874839][T19205] __dump_stack+0x1d/0x30 [ 291.874866][T19205] dump_stack_lvl+0xe8/0x140 [ 291.874892][T19205] dump_stack+0x15/0x1b [ 291.874914][T19205] should_fail_ex+0x265/0x280 [ 291.874978][T19205] should_fail+0xb/0x20 [ 291.875008][T19205] should_fail_usercopy+0x1a/0x20 [ 291.875033][T19205] _copy_from_user+0x1c/0xb0 [ 291.875107][T19205] do_sock_getsockopt+0xf1/0x240 [ 291.875205][T19205] __x64_sys_getsockopt+0x11e/0x1a0 [ 291.875249][T19205] x64_sys_call+0x2bca/0x3000 [ 291.875279][T19205] do_syscall_64+0xd2/0x200 [ 291.875301][T19205] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 291.875367][T19205] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 291.875443][T19205] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 291.875503][T19205] RIP: 0033:0x7f8afa70f6c9 [ 291.875524][T19205] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 291.875549][T19205] RSP: 002b:00007f8af916f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 291.875573][T19205] RAX: ffffffffffffffda RBX: 00007f8afa965fa0 RCX: 00007f8afa70f6c9 [ 291.875590][T19205] RDX: 000000000000006f RSI: 0000000000000084 RDI: 0000000000000003 [ 291.875606][T19205] RBP: 00007f8af916f090 R08: 0000200000000100 R09: 0000000000000000 [ 291.875675][T19205] R10: 00002000000000c0 R11: 0000000000000246 R12: 0000000000000001 [ 291.875700][T19205] R13: 00007f8afa966038 R14: 00007f8afa965fa0 R15: 00007ffcec8538e8 [ 291.875724][T19205] [ 292.432731][T19247] bond0: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 292.451755][T19247] bond0 (unregistering): Released all slaves [ 292.489022][T19254] bond0: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 292.508870][T19254] bond0 (unregistering): Released all slaves [ 292.524884][T19258] x_tables: ip6_tables: mh match: only valid for protocol 135 [ 293.673529][T19330] netlink: 12 bytes leftover after parsing attributes in process `syz.4.5684'. [ 293.737899][T19340] FAULT_INJECTION: forcing a failure. [ 293.737899][T19340] name failslab, interval 1, probability 0, space 0, times 0 [ 293.750641][T19340] CPU: 0 UID: 0 PID: 19340 Comm: syz.4.5689 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 293.750742][T19340] Tainted: [W]=WARN [ 293.750748][T19340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 293.750763][T19340] Call Trace: [ 293.750771][T19340] [ 293.750831][T19340] __dump_stack+0x1d/0x30 [ 293.750858][T19340] dump_stack_lvl+0xe8/0x140 [ 293.750878][T19340] dump_stack+0x15/0x1b [ 293.750905][T19340] should_fail_ex+0x265/0x280 [ 293.750988][T19340] should_failslab+0x8c/0xb0 [ 293.751020][T19340] __kmalloc_noprof+0xa5/0x570 [ 293.751124][T19340] ? sock_kmalloc+0x85/0xc0 [ 293.751150][T19340] sock_kmalloc+0x85/0xc0 [ 293.751175][T19340] ip6_mc_msfilter+0x31e/0x7c0 [ 293.751208][T19340] ipv6_set_mcast_msfilter+0x1ff/0x250 [ 293.751355][T19340] do_ipv6_setsockopt+0xfe6/0x2160 [ 293.751418][T19340] ? kstrtoull+0x111/0x140 [ 293.751541][T19340] ? __rcu_read_unlock+0x4f/0x70 [ 293.751568][T19340] ? avc_has_perm_noaudit+0x1b1/0x200 [ 293.751650][T19340] ? selinux_netlbl_socket_setsockopt+0x1f9/0x2d0 [ 293.751699][T19340] ipv6_setsockopt+0x59/0x130 [ 293.751781][T19340] tcp_setsockopt+0x98/0xb0 [ 293.751804][T19340] sock_common_setsockopt+0x69/0x80 [ 293.751868][T19340] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 293.751928][T19340] __sys_setsockopt+0x184/0x200 [ 293.752048][T19340] __x64_sys_setsockopt+0x64/0x80 [ 293.752164][T19340] x64_sys_call+0x20ec/0x3000 [ 293.752263][T19340] do_syscall_64+0xd2/0x200 [ 293.752284][T19340] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 293.752319][T19340] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 293.752362][T19340] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 293.752465][T19340] RIP: 0033:0x7fa844aff6c9 [ 293.752484][T19340] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 293.752504][T19340] RSP: 002b:00007fa843567038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 293.752527][T19340] RAX: ffffffffffffffda RBX: 00007fa844d55fa0 RCX: 00007fa844aff6c9 [ 293.752543][T19340] RDX: 0000000000000030 RSI: 0000000000000029 RDI: 0000000000000003 [ 293.752558][T19340] RBP: 00007fa843567090 R08: 0000000000000210 R09: 0000000000000000 [ 293.752573][T19340] R10: 0000200000001500 R11: 0000000000000246 R12: 0000000000000001 [ 293.752655][T19340] R13: 00007fa844d56038 R14: 00007fa844d55fa0 R15: 00007fff3edbba38 [ 293.752673][T19340] [ 294.918773][ T29] kauditd_printk_skb: 1835 callbacks suppressed [ 294.918791][ T29] audit: type=1400 audit(2000000561.010:50467): avc: denied { read write } for pid=16498 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 294.959299][T19384] audit: audit_backlog=65 > audit_backlog_limit=64 [ 294.959370][T19383] audit: audit_backlog=66 > audit_backlog_limit=64 [ 294.965980][T19384] audit: audit_lost=12 audit_rate_limit=0 audit_backlog_limit=64 [ 294.972532][T19383] audit: audit_lost=13 audit_rate_limit=0 audit_backlog_limit=64 [ 294.980351][T19384] audit: backlog limit exceeded [ 294.988224][T19383] audit: backlog limit exceeded [ 295.000938][T19386] audit: audit_backlog=66 > audit_backlog_limit=64 [ 295.001911][T19376] audit: audit_backlog=66 > audit_backlog_limit=64 [ 295.007640][T19386] audit: audit_lost=14 audit_rate_limit=0 audit_backlog_limit=64 [ 295.086769][T19395] siw: device registration error -23 [ 295.185321][T19407] loop0: detected capacity change from 0 to 512 [ 295.202947][T19409] loop6: detected capacity change from 0 to 512 [ 295.209867][T19409] FAT-fs (loop6): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 295.226331][T19407] EXT4-fs error (device loop0): ext4_orphan_get:1418: comm syz.0.5713: bad orphan inode 13 [ 295.248076][T19407] ext4_test_bit(bit=12, block=4) = 1 [ 295.253430][T19407] is_bad_inode(inode)=0 [ 295.257658][T19407] NEXT_ORPHAN(inode)=0 [ 295.261857][T19407] max_ino=32 [ 295.265091][T19407] i_nlink=1 [ 295.268813][T19407] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 295.290912][T19407] EXT4-fs warning (device loop0): dx_probe:801: inode #2: comm syz.0.5713: Unrecognised inode hash code 20 [ 295.302476][T19407] EXT4-fs warning (device loop0): dx_probe:934: inode #2: comm syz.0.5713: Corrupt directory, running e2fsck is recommended [ 295.326026][T19407] EXT4-fs error (device loop0): ext4_iget_extra_inode:5075: inode #15: comm syz.0.5713: corrupted in-inode xattr: e_value out of bounds [ 295.349260][T19418] EXT4-fs warning (device loop0): dx_probe:801: inode #2: comm syz.0.5713: Unrecognised inode hash code 20 [ 295.360799][T19418] EXT4-fs warning (device loop0): dx_probe:934: inode #2: comm syz.0.5713: Corrupt directory, running e2fsck is recommended [ 295.374054][T19418] EXT4-fs error (device loop0): ext4_iget_extra_inode:5075: inode #15: comm syz.0.5713: corrupted in-inode xattr: e_value out of bounds [ 295.398134][T19407] EXT4-fs warning (device loop0): dx_probe:801: inode #2: comm syz.0.5713: Unrecognised inode hash code 20 [ 295.409664][T19407] EXT4-fs warning (device loop0): dx_probe:934: inode #2: comm syz.0.5713: Corrupt directory, running e2fsck is recommended [ 295.437262][T19407] EXT4-fs error (device loop0): ext4_iget_extra_inode:5075: inode #15: comm syz.0.5713: corrupted in-inode xattr: e_value out of bounds [ 295.460227][T19425] netlink: 8 bytes leftover after parsing attributes in process `syz.5.5719'. [ 295.474059][T19425] netlink: 16 bytes leftover after parsing attributes in process `syz.5.5719'. [ 295.484417][T16574] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 295.505985][T19427] siw: device registration error -23 [ 296.754939][T19477] siw: device registration error -23 [ 296.796792][ T3370] kernel write not supported for file bpf-prog (pid: 3370 comm: kworker/1:2) [ 296.913667][T19487] loop5: detected capacity change from 0 to 512 [ 296.922699][T19487] EXT4-fs error (device loop5): ext4_orphan_get:1418: comm syz.5.5739: bad orphan inode 13 [ 296.933258][T19487] ext4_test_bit(bit=12, block=4) = 1 [ 296.938661][T19487] is_bad_inode(inode)=0 [ 296.938672][T19487] NEXT_ORPHAN(inode)=0 [ 296.938682][T19487] max_ino=32 [ 296.938692][T19487] i_nlink=1 [ 296.939115][T19487] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 296.949441][T19487] EXT4-fs warning (device loop5): dx_probe:801: inode #2: comm syz.5.5739: Unrecognised inode hash code 20 [ 296.977888][T19487] EXT4-fs warning (device loop5): dx_probe:934: inode #2: comm syz.5.5739: Corrupt directory, running e2fsck is recommended [ 296.991095][T19487] EXT4-fs error (device loop5): ext4_iget_extra_inode:5075: inode #15: comm syz.5.5739: corrupted in-inode xattr: e_value out of bounds [ 297.005779][T19494] EXT4-fs warning (device loop5): dx_probe:801: inode #2: comm syz.5.5739: Unrecognised inode hash code 20 [ 297.017250][T19494] EXT4-fs warning (device loop5): dx_probe:934: inode #2: comm syz.5.5739: Corrupt directory, running e2fsck is recommended [ 297.030385][T19494] EXT4-fs error (device loop5): ext4_iget_extra_inode:5075: inode #15: comm syz.5.5739: corrupted in-inode xattr: e_value out of bounds [ 297.047716][T19487] EXT4-fs warning (device loop5): dx_probe:801: inode #2: comm syz.5.5739: Unrecognised inode hash code 20 [ 297.059223][T19487] EXT4-fs warning (device loop5): dx_probe:934: inode #2: comm syz.5.5739: Corrupt directory, running e2fsck is recommended [ 297.072197][T19487] EXT4-fs error (device loop5): ext4_iget_extra_inode:5075: inode #15: comm syz.5.5739: corrupted in-inode xattr: e_value out of bounds [ 297.100995][T16530] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 297.149413][T19503] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5746'. [ 297.180281][T19503] netlink: 28 bytes leftover after parsing attributes in process `syz.2.5746'. [ 297.554280][T19515] loop0: detected capacity change from 0 to 128 [ 297.569027][T19515] FAT-fs (loop0): bogus sectors per cluster 0 [ 297.575253][T19515] FAT-fs (loop0): Can't find a valid FAT filesystem [ 297.604348][T19515] netlink: 32 bytes leftover after parsing attributes in process `syz.0.5749'. [ 297.661969][T19515] batadv1: entered promiscuous mode [ 297.667379][T19515] batadv1: entered allmulticast mode [ 297.699429][T19511] loop2: detected capacity change from 0 to 32768 [ 297.750471][T19511] loop2: p1 p2 p3 < > p4 < p5 p6 > [ 297.755804][T19511] loop2: p1 start 460800 is beyond EOD, truncated [ 297.762472][T19511] loop2: p2 size 83886080 extends beyond EOD, truncated [ 297.784060][T19511] loop2: p5 start 460800 is beyond EOD, truncated [ 297.790655][T19511] loop2: p6 size 83886080 extends beyond EOD, truncated [ 297.902669][T19522] netlink: 464 bytes leftover after parsing attributes in process `syz.0.5753'. [ 297.971992][T19530] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5757'. [ 297.981477][T19530] netlink: 28 bytes leftover after parsing attributes in process `syz.0.5757'. [ 298.000068][T19533] loop5: detected capacity change from 0 to 512 [ 298.013587][T19532] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5752'. [ 298.037351][T19533] EXT4-fs error (device loop5): ext4_orphan_get:1418: comm syz.5.5756: bad orphan inode 13 [ 298.060207][T19533] ext4_test_bit(bit=12, block=4) = 1 [ 298.065542][T19533] is_bad_inode(inode)=0 [ 298.069803][T19533] NEXT_ORPHAN(inode)=0 [ 298.073876][T19533] max_ino=32 [ 298.077264][T19533] i_nlink=1 [ 298.083171][T19533] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 298.100520][T19533] EXT4-fs warning (device loop5): dx_probe:801: inode #2: comm syz.5.5756: Unrecognised inode hash code 20 [ 298.112091][T19533] EXT4-fs warning (device loop5): dx_probe:934: inode #2: comm syz.5.5756: Corrupt directory, running e2fsck is recommended [ 298.125384][T19533] EXT4-fs error (device loop5): ext4_iget_extra_inode:5075: inode #15: comm syz.5.5756: corrupted in-inode xattr: e_value out of bounds [ 298.126071][T19533] EXT4-fs warning (device loop5): dx_probe:801: inode #2: comm syz.5.5756: Unrecognised inode hash code 20 [ 298.126101][T19533] EXT4-fs warning (device loop5): dx_probe:934: inode #2: comm syz.5.5756: Corrupt directory, running e2fsck is recommended [ 298.126146][T19533] EXT4-fs error (device loop5): ext4_iget_extra_inode:5075: inode #15: comm syz.5.5756: corrupted in-inode xattr: e_value out of bounds [ 298.130253][T19533] EXT4-fs warning (device loop5): dx_probe:801: inode #2: comm syz.5.5756: Unrecognised inode hash code 20 [ 298.130278][T19533] EXT4-fs warning (device loop5): dx_probe:934: inode #2: comm syz.5.5756: Corrupt directory, running e2fsck is recommended [ 298.130324][T19533] EXT4-fs error (device loop5): ext4_iget_extra_inode:5075: inode #15: comm syz.5.5756: corrupted in-inode xattr: e_value out of bounds [ 298.176021][T19546] siw: device registration error -23 [ 298.231636][T16530] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 298.247576][T19544] loop2: detected capacity change from 0 to 512 [ 298.274329][T19544] EXT4-fs error (device loop2): ext4_validate_block_bitmap:441: comm syz.2.5761: bg 0: block 248: padding at end of block bitmap is not set [ 298.296907][T19544] EXT4-fs error (device loop2): ext4_acquire_dquot:6945: comm syz.2.5761: Failed to acquire dquot type 1 [ 298.322293][T19544] EXT4-fs (loop2): 1 truncate cleaned up [ 298.328743][T19544] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 298.341520][T19544] ext4 filesystem being mounted at /234/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 298.395394][T19562] netlink: 464 bytes leftover after parsing attributes in process `syz.0.5768'. [ 298.408488][T19544] EXT4-fs error (device loop2): ext4_lookup:1791: inode #2: comm syz.2.5761: deleted inode referenced: 12 [ 298.425816][T19544] netlink: 'syz.2.5761': attribute type 1 has an invalid length. [ 298.433759][T19544] netlink: 224 bytes leftover after parsing attributes in process `syz.2.5761'. [ 298.523705][T16498] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 298.574083][T19576] delete_channel: no stack [ 298.579140][T19576] delete_channel: no stack [ 298.610299][T19578] siw: device registration error -23 [ 298.794271][T19590] loop4: detected capacity change from 0 to 128 [ 298.799553][T19592] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 298.807467][T19590] EXT4-fs: Ignoring removed nobh option [ 298.814699][T19592] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 298.823436][T19590] EXT4-fs (loop4): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 298.836429][T19590] ext4 filesystem being mounted at mnt:[4026532388] supports timestamps until 2038-01-19 (0x7fffffff) [ 298.848143][T19590] EXT4-fs (loop4): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 298.970884][T19615] siw: device registration error -23 [ 299.294163][T19628] FAULT_INJECTION: forcing a failure. [ 299.294163][T19628] name failslab, interval 1, probability 0, space 0, times 0 [ 299.307152][T19628] CPU: 0 UID: 0 PID: 19628 Comm: syz.5.5790 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 299.307187][T19628] Tainted: [W]=WARN [ 299.307196][T19628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 299.307213][T19628] Call Trace: [ 299.307220][T19628] [ 299.307230][T19628] __dump_stack+0x1d/0x30 [ 299.307258][T19628] dump_stack_lvl+0xe8/0x140 [ 299.307305][T19628] dump_stack+0x15/0x1b [ 299.307328][T19628] should_fail_ex+0x265/0x280 [ 299.307378][T19628] ? __request_module+0x1c4/0x3e0 [ 299.307404][T19628] should_failslab+0x8c/0xb0 [ 299.307500][T19628] ? xt_request_find_table_lock+0x4c/0xa0 [ 299.307526][T19628] __kmalloc_cache_noprof+0x4c/0x4a0 [ 299.307634][T19628] ? xt_request_find_table_lock+0x4c/0xa0 [ 299.307658][T19628] __request_module+0x1c4/0x3e0 [ 299.307738][T19628] xt_request_find_table_lock+0x4c/0xa0 [ 299.307765][T19628] __do_replace+0x67/0x570 [ 299.307792][T19628] ? _copy_from_user+0x89/0xb0 [ 299.307827][T19628] do_ipt_set_ctl+0x6ea/0x820 [ 299.307852][T19628] ? lock_sock_nested+0x112/0x140 [ 299.307901][T19628] nf_setsockopt+0x199/0x1b0 [ 299.307940][T19628] ip_setsockopt+0x102/0x110 [ 299.307981][T19628] udp_setsockopt+0x99/0xb0 [ 299.308013][T19628] sock_common_setsockopt+0x69/0x80 [ 299.308122][T19628] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 299.308223][T19628] __sys_setsockopt+0x184/0x200 [ 299.308257][T19628] __x64_sys_setsockopt+0x64/0x80 [ 299.308322][T19628] x64_sys_call+0x20ec/0x3000 [ 299.308352][T19628] do_syscall_64+0xd2/0x200 [ 299.308377][T19628] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 299.308491][T19628] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 299.308528][T19628] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 299.308622][T19628] RIP: 0033:0x7f8afa70f6c9 [ 299.308642][T19628] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 299.308665][T19628] RSP: 002b:00007f8af916f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 299.308689][T19628] RAX: ffffffffffffffda RBX: 00007f8afa965fa0 RCX: 00007f8afa70f6c9 [ 299.308767][T19628] RDX: 0000000000000040 RSI: 0004000000000000 RDI: 0000000000000004 [ 299.308781][T19628] RBP: 00007f8af916f090 R08: 0000000000000268 R09: 0000000000000000 [ 299.308849][T19628] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 299.308864][T19628] R13: 00007f8afa966038 R14: 00007f8afa965fa0 R15: 00007ffcec8538e8 [ 299.308934][T19628] [ 300.049905][ T29] kauditd_printk_skb: 529 callbacks suppressed [ 300.049970][ T29] audit: type=1400 audit(2000000566.140:50987): avc: denied { mount } for pid=19652 comm="syz.5.5800" name="/" dev="ramfs" ino=71990 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 300.096061][ T29] audit: type=1400 audit(2000000566.180:50988): avc: denied { create } for pid=19654 comm="syz.0.5801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 300.131509][ T29] audit: type=1400 audit(2000000566.200:50989): avc: denied { setopt } for pid=19654 comm="syz.0.5801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 300.151353][ T29] audit: type=1400 audit(2000000566.210:50990): avc: denied { ioctl } for pid=19654 comm="syz.0.5801" path="socket:[71597]" dev="sockfs" ino=71597 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 300.190353][ T29] audit: type=1400 audit(2000000566.280:50991): avc: denied { bind } for pid=19639 comm="syz.2.5795" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 300.328760][T19666] sch_fq: defrate 4294967295 ignored. [ 300.350592][T19640] loop2: detected capacity change from 0 to 1024 [ 300.362359][T19640] EXT4-fs (loop2): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 300.373564][T19640] EXT4-fs (loop2): ext4_check_descriptors: Checksum for group 0 failed (51554!=20869) [ 300.379268][ T29] audit: type=1400 audit(2000000566.460:50992): avc: denied { ioctl } for pid=19662 comm="syz.6.5802" path="socket:[71631]" dev="sockfs" ino=71631 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 300.408626][T19663] veth0_vlan: left promiscuous mode [ 300.411240][ T29] audit: type=1326 audit(2000000566.500:50993): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19670 comm="syz.0.5805" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f9b5e26f6c9 code=0x0 [ 300.440473][T19640] JBD2: no valid journal superblock found [ 300.446240][T19640] EXT4-fs (loop2): Could not load journal inode [ 300.457739][T19640] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 300.477965][T19640] IPv6: Can't replace route, no match found [ 300.488488][ T29] audit: type=1326 audit(2000000566.560:50994): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19678 comm="syz.6.5808" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5bf59ff6c9 code=0x7ffc0000 [ 300.512219][ T29] audit: type=1326 audit(2000000566.560:50995): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19678 comm="syz.6.5808" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5bf59ff6c9 code=0x7ffc0000 [ 300.535894][ T29] audit: type=1326 audit(2000000566.570:50996): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19678 comm="syz.6.5808" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5bf59ff6c9 code=0x7ffc0000 [ 300.560761][T19681] __nla_validate_parse: 7 callbacks suppressed [ 300.560778][T19681] netlink: 8 bytes leftover after parsing attributes in process `syz.5.5807'. [ 300.587951][T19681] netlink: 28 bytes leftover after parsing attributes in process `syz.5.5807'. [ 300.639456][T19688] FAULT_INJECTION: forcing a failure. [ 300.639456][T19688] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 300.652688][T19688] CPU: 1 UID: 0 PID: 19688 Comm: syz.5.5810 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 300.652731][T19688] Tainted: [W]=WARN [ 300.652739][T19688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 300.652755][T19688] Call Trace: [ 300.652763][T19688] [ 300.652772][T19688] __dump_stack+0x1d/0x30 [ 300.652799][T19688] dump_stack_lvl+0xe8/0x140 [ 300.652824][T19688] dump_stack+0x15/0x1b [ 300.652848][T19688] should_fail_ex+0x265/0x280 [ 300.652895][T19688] should_fail+0xb/0x20 [ 300.652936][T19688] should_fail_usercopy+0x1a/0x20 [ 300.652972][T19688] _copy_to_user+0x20/0xa0 [ 300.653001][T19688] copy_siginfo_to_user+0x22/0xb0 [ 300.653026][T19688] x64_setup_rt_frame+0x2b5/0x580 [ 300.653049][T19688] arch_do_signal_or_restart+0x23e/0x440 [ 300.653162][T19688] exit_to_user_mode_loop+0x77/0x110 [ 300.653227][T19688] do_syscall_64+0x1d6/0x200 [ 300.653256][T19688] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 300.653353][T19688] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 300.653398][T19688] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 300.653451][T19688] RIP: 0033:0x7f8afa70f6c7 [ 300.653467][T19688] Code: ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 <0f> 05 48 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 [ 300.653565][T19688] RSP: 002b:00007f8af916f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 300.653589][T19688] RAX: 0000000000000113 RBX: 00007f8afa965fa0 RCX: 00007f8afa70f6c9 [ 300.653605][T19688] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 300.653622][T19688] RBP: 00007f8af916f090 R08: 0000000000000007 R09: 0000000000000009 [ 300.653664][T19688] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 300.653680][T19688] R13: 00007f8afa966038 R14: 00007f8afa965fa0 R15: 00007ffcec8538e8 [ 300.653735][T19688] [ 300.654121][ T3298] ================================================================== [ 300.843476][ T3298] BUG: KCSAN: data-race in virtqueue_disable_cb / virtqueue_disable_cb [ 300.851727][ T3298] [ 300.854136][ T3298] write to 0xffff888101511e78 of 2 bytes by interrupt on cpu 1: [ 300.861764][ T3298] virtqueue_disable_cb+0x7a/0x150 [ 300.866883][ T3298] skb_xmit_done+0x65/0x140 [ 300.871389][ T3298] vring_interrupt+0x155/0x180 [ 300.876156][ T3298] __handle_irq_event_percpu+0x9d/0x540 [ 300.881712][ T3298] handle_irq_event+0x64/0xf0 [ 300.886488][ T3298] handle_edge_irq+0x154/0x470 [ 300.891265][ T3298] __common_interrupt+0x60/0xb0 [ 300.896128][ T3298] common_interrupt+0x7e/0x90 [ 300.900831][ T3298] asm_common_interrupt+0x26/0x40 [ 300.905867][ T3298] copy_from_kernel_nofault+0x1b3/0x200 [ 300.911413][ T3298] bpf_probe_read_compat+0xdb/0x130 [ 300.916618][ T3298] bpf_prog_3e462b45c88f2064+0x46/0x4c [ 300.922083][ T3298] bpf_trace_run3+0x10f/0x1d0 [ 300.926793][ T3298] kmem_cache_free+0x329/0x3d0 [ 300.931575][ T3298] inode_free_by_rcu+0x36/0x70 [ 300.936343][ T3298] rcu_core+0x5aa/0xc30 [ 300.940510][ T3298] rcu_core_si+0xd/0x20 [ 300.944707][ T3298] handle_softirqs+0xba/0x290 [ 300.949402][ T3298] run_ksoftirqd+0x1c/0x30 [ 300.953861][ T3298] smpboot_thread_fn+0x32b/0x530 [ 300.958805][ T3298] kthread+0x489/0x510 [ 300.962890][ T3298] ret_from_fork+0x122/0x1b0 [ 300.967486][ T3298] ret_from_fork_asm+0x1a/0x30 [ 300.972265][ T3298] [ 300.974588][ T3298] read to 0xffff888101511e78 of 2 bytes by task 3298 on cpu 0: [ 300.982132][ T3298] virtqueue_disable_cb+0x58/0x150 [ 300.987249][ T3298] start_xmit+0x10e/0x17a0 [ 300.991689][ T3298] dev_hard_start_xmit+0x125/0x3e0 [ 300.996813][ T3298] sch_direct_xmit+0x192/0x550 [ 301.001612][ T3298] __dev_queue_xmit+0xe9a/0x2000 [ 301.006548][ T3298] ip_finish_output2+0x77f/0x8b0 [ 301.011527][ T3298] ip_finish_output+0x114/0x2a0 [ 301.016377][ T3298] ip_output+0xbd/0x190 [ 301.020536][ T3298] __ip_queue_xmit+0xbbf/0xc00 [ 301.025333][ T3298] ip_queue_xmit+0x39/0x50 [ 301.029752][ T3298] __tcp_transmit_skb+0x17fd/0x1c10 [ 301.034965][ T3298] __tcp_send_ack+0x288/0x3b0 [ 301.039647][ T3298] tcp_send_ack+0x29/0x30 [ 301.043990][ T3298] __tcp_cleanup_rbuf+0xd3/0x2c0 [ 301.048938][ T3298] tcp_recvmsg_locked+0x1adb/0x1fe0 [ 301.054164][ T3298] tcp_recvmsg+0x128/0x480 [ 301.058599][ T3298] inet_recvmsg+0xb7/0x290 [ 301.063037][ T3298] sock_recvmsg+0xf6/0x170 [ 301.067467][ T3298] sock_read_iter+0x152/0x1a0 [ 301.072161][ T3298] vfs_read+0x64c/0x770 [ 301.076322][ T3298] ksys_read+0xda/0x1a0 [ 301.080480][ T3298] __x64_sys_read+0x40/0x50 [ 301.084997][ T3298] x64_sys_call+0x27c0/0x3000 [ 301.089697][ T3298] do_syscall_64+0xd2/0x200 [ 301.094225][ T3298] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 301.100159][ T3298] [ 301.102501][ T3298] value changed: 0x0000 -> 0x0001 [ 301.107538][ T3298] [ 301.109902][ T3298] Reported by Kernel Concurrency Sanitizer on: [ 301.116071][ T3298] CPU: 0 UID: 0 PID: 3298 Comm: syz-executor Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 301.127547][ T3298] Tainted: [W]=WARN [ 301.131363][ T3298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 301.141429][ T3298] ================================================================== [ 305.561409][T10063] bridge_slave_1: left allmulticast mode [ 305.567224][T10063] bridge_slave_1: left promiscuous mode [ 305.573272][T10063] bridge0: port 2(bridge_slave_1) entered disabled state [ 305.580991][T10063] bridge_slave_0: left allmulticast mode [ 305.586637][T10063] bridge_slave_0: left promiscuous mode [ 305.592370][T10063] bridge0: port 1(bridge_slave_0) entered disabled state [ 305.748976][T10063] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 305.758271][T10063] bond0 (unregistering): (slave c@0Ù): Releasing backup interface [ 305.767089][T10063] bond0 (unregistering): Released all slaves [ 305.775571][T10063] bond1 (unregistering): Released all slaves [ 305.839389][T10063] tipc: Disabling bearer [ 305.844747][T10063] tipc: Left network mode [ 305.852051][T10063] hsr_slave_0: left promiscuous mode [ 305.857775][T10063] hsr_slave_1: left promiscuous mode [ 305.863406][T10063] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 305.870932][T10063] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 305.904143][T10063] team0 (unregistering): Port device team_slave_1 removed [ 305.914201][T10063] team0 (unregistering): Port device team_slave_0 removed [ 310.483987][T10063] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 310.520122][T10063] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 310.570034][T10063] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 310.610116][T10063] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 310.661041][T10063] bridge_slave_1: left allmulticast mode [ 310.666715][T10063] bridge_slave_1: left promiscuous mode [ 310.672494][T10063] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.680274][T10063] bridge_slave_0: left allmulticast mode [ 310.685952][T10063] bridge_slave_0: left promiscuous mode [ 310.691782][T10063] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.780967][T10063] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 310.791007][T10063] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 310.800743][T10063] bond0 (unregistering): Released all slaves