last executing test programs: 5m45.401443092s ago: executing program 32 (id=87): r0 = accept4$x25(0xffffffffffffffff, &(0x7f0000000540), &(0x7f0000000580)=0x12, 0x100800) fstat(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl_fd$Q_QUOTAOFF(r0, 0xffffffff80000300, r1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vxcan1\x00'}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0100180000000000000090000000900000000300000008000000000000010000000053003102000000000700000d0000000000000000040000000f000000040000000c00000000000000000000000100000002000000020000000e0000000500000006000000010000000000000000000003f3ffffff0300000002000000ffff0000080000000000000a00000000000000000000000300000000050000000500000008000000003000"], &(0x7f0000000440)=""/225, 0xab, 0xe1, 0x0, 0x10001, 0x0, @void, @value}, 0x28) r2 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) r3 = fsmount(r2, 0x1, 0x8) fchdir(r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r4}, &(0x7f0000000000), &(0x7f00000005c0)=r5}, 0x20) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x3) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000007c0)='./file1\x00', 0x1014004, &(0x7f00000001c0), 0x1, 0x7a0, &(0x7f0000002440)="$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") 5m40.276939571s ago: executing program 33 (id=161): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) unlinkat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="500000001000010400"/20, @ANYRES32, @ANYBLOB="0000000000000000300012800b00010065727370616e00002000028004001200050016000200000005001700"], 0x50}, 0x1, 0x0, 0x0, 0x4000}, 0x4080) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r3}, 0x18) r4 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$selinux_access(r4, &(0x7f00000004c0)=ANY=[@ANYBLOB="73797374656d5f683a6f626a6563745f723a7570647077645f657865635f742073797374656d5f753a73797374656d5f723afaffffffffffffff3a73302030"], 0x56) r5 = socket$nl_route(0x10, 0x3, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) uname(&(0x7f0000000000)=""/174) sendmsg$nl_route(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="a000000010003704000002000000000000000000", @ANYRES32=0x0], 0xa0}}, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f0000000480)={0x3, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000009c0)=@newlink={0x34, 0x10, 0xc362e63b3f31ba5f, 0x6000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x80e1}, [@IFLA_GROUP={0x8}, @IFLA_BROADCAST={0xa, 0x2, @broadcast}]}, 0x34}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x4, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) syz_open_dev$usbmon(0x0, 0x2, 0x4000) r8 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r8, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c01803003a000b12d25a80648c2594f90124fc60100c034002560100053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) getsockopt$inet_mreq(r1, 0x0, 0x24, 0x0, &(0x7f0000000100)) ioctl$X86_IOC_RDMSR_REGS(0xffffffffffffffff, 0xc02063a0, 0x0) r9 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r9, &(0x7f0000000180)={0x7, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="020100090a000000007fffffff0000000200100000e9200000e900000000000003"], 0x50}}, 0x0) 5m37.229808889s ago: executing program 34 (id=204): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r0, 0x0, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0), 0x4) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x8, 0xc220, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_config_ext={0x2, 0x7}, 0x2400, 0xcc, 0x52, 0x5, 0x0, 0x5, 0xb, 0x0, 0x0, 0x0, 0xa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000001001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) syz_clone(0x80000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000bc0)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="180300000005000000000000000000001801000011af000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000d5030000020000838500000071000000180100002020752500000000806020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) ioprio_set$pid(0x2, 0x0, 0x0) 5m37.18755743s ago: executing program 35 (id=205): r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xb, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f00000000c0)=0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6000000000000000, 0x3, 0x0, &(0x7f0000000800)="920955", &(0x7f0000000540)}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0xf, 0xf, &(0x7f0000000440)=ANY=[@ANYRES8=0x0, @ANYRESOCT=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000f054090100000000009500000400000045146d875ece4c8800b7020000fc6814bd73384a56918251f0010000008500000084000000b7000000d2f91a73608ffd5989cef64c6f544477b6dbd65e277830f4a1a85547358e1085ac9e38ac0e7d6ec16bef7ec90e349d782748748045a2e0a2936e924e0a3d693c703ba5633e578a2419cb7e2942ca29c12cdeb1ec71050e1b7b372c89ff5561e2e29fb91e61401a79"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x50436d8c6b776bb3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r8}, 0x10) sendmsg$inet(r6, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000005c0)='F', 0x1}], 0x1}, 0x0) recvmsg(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=""/251, 0x2}], 0x1}, 0x40000100) sendmsg$inet(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001300)="d3", 0x1}]}, 0x8850) io_uring_enter(0xffffffffffffffff, 0x3516, 0x0, 0x0, 0x0, 0x0) sendmsg$NFC_CMD_DEV_UP(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r5, @ANYBLOB="010028bd7000fedbdf250200000008000100", @ANYRES32=r3, @ANYBLOB="ff0be3299a3bf3596cb23c4c8478a6929f5300000000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x8004) write$nci(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="414601", @ANYRES32=r4], 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) flock(0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1, 0x800000000003}, 0x1173c0, 0xffffffff, 0x3, 0x5, 0x4, 0x9, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) setresuid(0x0, 0x0, 0xffffffffffffffff) syz_clone(0x72b80180, 0x0, 0x0, 0x0, 0x0, 0x0) r9 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x3c, 0x24, 0xf0b, 0x70bd2b, 0x0, {0x0, 0x0, 0x12, r10, {0xfff1}, {0x1, 0xffff}, {0x2, 0xb}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0xc, 0x2, [@TCA_TAPRIO_ATTR_FLAGS={0x8, 0xa, 0xf}]}}]}, 0x3c}}, 0x0) fcntl$dupfd(r0, 0x0, r0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200130002000000da16c167d803f1f805000600200000000a00060000000000ff0000000000000000001ffeff0001000003f1dc7f7c6e7c0200010000000000004000020000000005000500000000000a"], 0x80}}, 0x0) 5m25.60804842s ago: executing program 7 (id=418): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x75, 0x109301) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r3}, 0x0, &(0x7f0000000340)=r4}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r5}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=ANY=[@ANYBLOB="3400000010001fff000000000800000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001400"], 0x34}}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000640)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x700, 0x0, [@sadb_key={0x2, 0x9, 0x40, 0x0, "e925051abca75b82"}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @private}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd, 0xfffffffb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}}]}, 0x60}, 0x1, 0x7}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file2\x00', 0x2000410, &(0x7f0000000080), 0x81, 0x7a5, &(0x7f0000000f80)="$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") r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x143042, 0x0) r10 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r1) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f00000007c0)={0x1a4, r10, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x190, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xfc, 0x3, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/ptmx\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffeb}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '.\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/ptmx\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/ptmx\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, '*&:\xd1+(\\)#%[-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '-}!2+!*)(\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffff95}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, ',*:)/[)$%\x00'}]}]}, @ETHTOOL_A_BITSET_VALUE={0x45, 0x4, "8d0a737ec30a53d3daf4e5d6e49ed4c231b9bfe1a352a66a376d21d5a842e5e6ed59c6366bcaf99b342e9599267396c5aaa8da6d46bef02aff91cfb81d75b43060"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x3d, 0x4, "34301628cc9064fb8ff36f861de7b4fac0174e7a2b9e5aabc1ce842a5ccb9dbde135f550836573641aaed95b96bc4081713086b542e4d6e047"}]}]}, 0x1a4}}, 0x80) sendfile(r9, r9, 0x0, 0x7a680000) truncate(&(0x7f0000000200)='./file2\x00', 0x7) bind$netlink(r8, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r8, 0x1, 0x8, &(0x7f0000000000), 0x4) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000006c0)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x70, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x20cb3a, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) 5m25.313109415s ago: executing program 7 (id=422): syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xb, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000000c0)=0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6000000000000000, 0x3, 0x0, &(0x7f0000000800)="920955", &(0x7f0000000540)}, 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0xf, 0xf, &(0x7f0000000440)=ANY=[@ANYRES8=0x0, @ANYRESOCT=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000f054090100000000009500000400000045146d875ece4c8800b7020000fc6814bd73384a56918251f0010000008500000084000000b7000000d2f91a73608ffd5989cef64c6f544477b6dbd65e277830f4a1a85547358e1085ac9e38ac0e7d6ec16bef7ec90e349d782748748045a2e0a2936e924e0a3d693c703ba5633e578a2419cb7e2942ca29c12cdeb1ec71050e1b7b372c89ff5561e2e29fb91e61401a79"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x50436d8c6b776bb3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r7}, 0x10) sendmsg$inet(r5, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000005c0)='F', 0x1}], 0x1}, 0x0) recvmsg(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=""/251, 0x2}], 0x1}, 0x40000100) sendmsg$inet(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001300)="d3", 0x1}]}, 0x8850) io_uring_enter(0xffffffffffffffff, 0x3516, 0x0, 0x0, 0x0, 0x0) sendmsg$NFC_CMD_DEV_UP(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="010028bd7000fedbdf250200000008000100", @ANYRES32=r2, @ANYBLOB="ff0be3299a3bf3596cb23c4c8478a6929f5300000000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x8004) write$nci(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="414601", @ANYRES32=r3], 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) flock(0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1, 0x800000000003}, 0x1173c0, 0xffffffff, 0x3, 0x5, 0x4, 0x9, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) setresuid(0x0, 0x0, 0xffffffffffffffff) syz_clone(0x72b80180, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x3c, 0x24, 0xf0b, 0x70bd2b, 0x0, {0x0, 0x0, 0x12, 0x0, {0xfff1}, {0x1, 0xffff}, {0x2, 0xb}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0xc, 0x2, [@TCA_TAPRIO_ATTR_FLAGS={0x8, 0xa, 0xf}]}}]}, 0x3c}}, 0x0) r8 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r8, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200130002000000da16c167d803f1f805000600200000000a00060000000000ff0000000000000000001ffeff0001000003f1dc7f7c6e7c0200010000000000004000020000000005000500000000000a"], 0x80}}, 0x0) 5m24.687951385s ago: executing program 36 (id=429): r0 = syz_open_procfs(0x0, &(0x7f00000191c0)='net/dev_mcast\x00') pread64(r0, &(0x7f0000000080)=""/102356, 0x18fd4, 0x2a) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$key(0xf, 0x3, 0x2) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7020000140000e0b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) write$cgroup_subtree(r5, 0x0, 0xfdef) sendmsg$key(r2, &(0x7f00000007c0)={0x300, 0x0, &(0x7f0000000780)={&(0x7f0000000b00)=ANY=[@ANYBLOB="020a060003"], 0x18}}, 0x40) r6 = open_tree(r0, &(0x7f0000000000)='./file0\x00', 0x200) openat$cgroup_freezer_state(r6, &(0x7f00000190c0), 0x2, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000ffffffff000000000000000018110000", @ANYRES32, @ANYBLOB="0400000000000000b7080000000000007b8af80007020000f8ffff000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r7) ptrace$setregs(0xd, r7, 0x0, &(0x7f00000003c0)="18607651149d7b10b4024fbbdc08899b8f589df2dbb5d7a8d1b36cfab675cb3976ee8100e2878c9cfa178cac130eb046eda93df39ed4b41924dc225ad4028dd63defb87d698be5c749450b350a789dcfc6b2d6a696b5026d1e52f19274566d1da0f353dd65e330ebf71c5e823f2753c5fd76724828ef31b353e71805205c3dceb44cc4c7b3664e29fb") sendmsg$IPSET_CMD_ADD(r6, &(0x7f0000019200)={&(0x7f0000019080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000019180)={&(0x7f0000019240)=ANY=[@ANYBLOB="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"], 0xa8}, 0x1, 0x0, 0x0, 0x4451}, 0x4000840) creat(&(0x7f0000000000)='./file0\x00', 0xecf86c37d53049cc) r8 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x1a1) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r9}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) fcntl$setlease(r8, 0x400, 0x1) sendmsg$nl_route_sched(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000800)=@newtaction={0x68, 0x30, 0x871a15abc695fb3d, 0x0, 0x0, {}, [{0x54, 0x1, [@m_tunnel_key={0x50, 0x1, 0x0, 0x0, {{0xf}, {0x20, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x1d91, 0x9, 0x5, 0x65be, 0x1}, 0x2}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) 5m24.275797451s ago: executing program 7 (id=434): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x10) fchmodat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x28) 5m24.224055272s ago: executing program 7 (id=435): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000010000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0}, &(0x7f0000000080), &(0x7f0000000180)=r1}, 0x20) syz_io_uring_complete(0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000640)='./file1\x00', 0x3014850, &(0x7f00000001c0)={[{@quota}, {@barrier_val={'barrier', 0x3d, 0x1000}}, {@grpjquota}, {@norecovery}, {@dioread_lock}]}, 0x3, 0x4c1, &(0x7f0000000680)="$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") quotactl$Q_QUOTAOFF(0xffffffff80000301, &(0x7f0000000200)=@loop={'/dev/loop', 0x0}, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2018c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x7, 0x1}, 0x0, 0x0, 0x1, 0xb, 0x94da}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xa3500, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x8, 0x3, 0x4d8, 0x340, 0x11, 0x148, 0x340, 0x0, 0x440, 0x2a8, 0x2a8, 0x440, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x88000000, 0x3, 0x7}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@quota={{0x38}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538) 5m23.912962267s ago: executing program 7 (id=436): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, 0x0, &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffb, r2, 0x0) 5m23.825931968s ago: executing program 4 (id=438): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socket$kcm(0xa, 0x1, 0x106) symlink(&(0x7f0000001780)='./file0/../file0\x00', &(0x7f00000017c0)='./file0\x00') r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0, 0x0, 0x9}, 0x18) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000180)={'sit0\x00', &(0x7f0000000140)={'gretap0\x00', 0x0, 0x467ce670db5adc3c, 0xf, 0x3, 0x1, {{0x6, 0x4, 0x3, 0x3, 0x18, 0x64, 0x0, 0x89, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x35}, @dev={0xac, 0x14, 0x14, 0x3e}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'tunl0\x00'}) socket$netlink(0x10, 0x3, 0x0) r1 = memfd_create(&(0x7f0000000580)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\xd2q#\xc6\xca\x97\x9d\xcb\x1e\x80\xd6\xd5%N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec=\x9e\xc3\xfd\x85d\x0fl5\xf3\xbe\" 6\r<\xea\x8dz\xcf6\x99\x91\xear8p\xaaR\xd5\xa6\xab#N>\x9a\xdf\xea\x009\xfbB\xc1\xd0_\xc0\'Z\xeb\xd8\xaf\xf0\'J\xe2\xff\xe5x*;(p\xf7p\xce\xbb\xa7\xfe\x04\xd0t\x81\x1a\x1b?m/\x1ex\xf8\x88^\xbaU\xb9\xa6\xab\x8d\a\xa6\"\xd9\x13\xeb\xe2\rh\x8dsx\xaa!\xd5Q\xf8\xce*\x95\x0es\xfaZ\x94t\x19\xdc\xdc\xcf\x0f\x9a\xa2O>\xb9\xfc\x01\fW\xee\xffh\xbd\xb2\xb4z\xeb\x84\x13\x13u\x8f', 0x0) write$bt_hci(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="01"], 0x2b) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 5m23.774528529s ago: executing program 4 (id=440): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) write$P9_RVERSION(r2, &(0x7f0000000180)=ANY=[@ANYBLOB="1300000065fffff9ffffff060039503230ddbfb75418b7e31493d25588f2d5c59d352d2ee43e498dfe2ebead44a4"], 0x13) socket$can_j1939(0x1d, 0x2, 0x7) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000800000000000000000000040000"], 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f00000003c0)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000001c0)=ANY=[], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70200001400f400b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x2d) syz_clone3(&(0x7f0000000940)={0x107821100, 0x0, 0x0, 0x0, {0x2d}, 0x0, 0x0, 0x0, 0x0}, 0x58) r8 = syz_open_procfs(0x0, &(0x7f00000005c0)='smaps_rollup\x00') lseek(r8, 0x2000, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), r8) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r9}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000010000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x64, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=@ipv4_delroute={0x34, 0x19, 0x901, 0x0, 0x0, {0x2, 0x18, 0x0, 0x0, 0x0, 0x0, 0xfd, 0x1}, [@RTA_DST={0x8, 0x1, @dev}, @RTA_OIF={0x8, 0x4, r1}, @RTA_GATEWAY={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x34}}, 0x0) timer_gettime(0x0, 0x0) 5m23.507228083s ago: executing program 7 (id=441): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001140)={'syztnl1\x00', &(0x7f00000010c0)={'ip6tnl0\x00', 0x0, 0x2f, 0xf5, 0x2, 0x4, 0x10, @loopback, @private1, 0x7, 0x20, 0x8001, 0x6}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180), 0x4) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000080)=ANY=[@ANYBLOB="540000001400b5950000", @ANYRES32, @ANYBLOB="14000100"], 0x54}, 0x1, 0x0, 0x0, 0x800}, 0x80) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000140)=ANY=[], 0x50}}, 0x0) sendmmsg(r0, &(0x7f0000000000), 0x4000000000001f2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @erspan={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_IFLAGS={0x6}]}}}]}, 0x3c}}, 0x0) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'netdevsim0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x0, 0x9, 0x2261, 0x2, 0x0, r2, 0x0, '\x00', r4, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300001e880000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) syz_clone(0x80000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000bc0)) ioprio_set$pid(0x2, 0x0, 0x0) 5m23.506686453s ago: executing program 37 (id=441): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000001140)={'syztnl1\x00', &(0x7f00000010c0)={'ip6tnl0\x00', 0x0, 0x2f, 0xf5, 0x2, 0x4, 0x10, @loopback, @private1, 0x7, 0x20, 0x8001, 0x6}}) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001180), 0x4) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000080)=ANY=[@ANYBLOB="540000001400b5950000", @ANYRES32, @ANYBLOB="14000100"], 0x54}, 0x1, 0x0, 0x0, 0x800}, 0x80) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000140)=ANY=[], 0x50}}, 0x0) sendmmsg(r0, &(0x7f0000000000), 0x4000000000001f2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @erspan={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_IFLAGS={0x6}]}}}]}, 0x3c}}, 0x0) r2 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'netdevsim0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x0, 0x9, 0x2261, 0x2, 0x0, r2, 0x0, '\x00', r4, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300001e880000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) syz_clone(0x80000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000bc0)) ioprio_set$pid(0x2, 0x0, 0x0) 5m22.726282405s ago: executing program 4 (id=445): bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) getpid() r2 = socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000080)={0x3c, r3, 0x2, 0x70bd25, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}]}, 0x3c}}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) r5 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280), 0x1, 0x0) accept$packet(r5, 0x0, &(0x7f0000000280)) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x7041, 0x0) write$UHID_DESTROY(r6, &(0x7f0000000000), 0x4) r7 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_INIT(r7, 0x29, 0xc8, &(0x7f0000000340), 0x4) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x1}, 0xc) 5m22.514582819s ago: executing program 4 (id=446): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000010000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0}, &(0x7f0000000080), &(0x7f0000000180)=r1}, 0x20) syz_io_uring_complete(0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000640)='./file1\x00', 0x3014850, &(0x7f00000001c0)={[{@quota}, {@barrier_val={'barrier', 0x3d, 0x1000}}, {@grpjquota}, {@norecovery}, {@dioread_lock}]}, 0x3, 0x4c1, &(0x7f0000000680)="$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") quotactl$Q_QUOTAOFF(0xffffffff80000301, &(0x7f0000000200)=@loop={'/dev/loop', 0x0}, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2018c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x7, 0x1}, 0x0, 0x0, 0x1, 0xb, 0x94da}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xa3500, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x8, 0x3, 0x4d8, 0x340, 0x11, 0x148, 0x340, 0x0, 0x440, 0x2a8, 0x2a8, 0x440, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x88000000, 0x3, 0x7}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@quota={{0x38}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538) 5m22.351342641s ago: executing program 4 (id=450): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r0, 0x0, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0), 0x4) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x8, 0xc220, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_config_ext={0x2, 0x7}, 0x2400, 0xcc, 0x52, 0x5, 0x0, 0x5, 0xb, 0x0, 0x0, 0x0, 0xa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000001001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100020, 0x0, 0x0, 0x6, 0x3, 0x0, 0xa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={0xffffffffffffffff, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000007940)={0x0, 0x0, &(0x7f0000007900)={&(0x7f0000000680)=@newtaction={0xac, 0x30, 0x216822a75a8bdd29, 0xffe4, 0x0, {}, [{0x98, 0x1, [@m_connmark={0x50, 0x2, 0x0, 0x0, {{0xd}, {0x20, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x3, 0xa, 0x20000000, 0x0, 0x3}, 0x8}}]}, {0x4}, {0xc}, {0xc}}}, @m_ct={0x44, 0x1, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xac}}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="180300000005000000000000000000001801000011af000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000d5030000020000838500000071000000180100002020752500000000806020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r4}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$tcp_congestion(0xffffffffffffffff, &(0x7f0000000180)='cdg\x00', 0x4) ioctl$SIOCSIFHWADDR(r7, 0x8923, &(0x7f0000000000)={'vlan1\x00', @broadcast}) 5m21.667796792s ago: executing program 4 (id=456): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00', r1}, 0x9) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000040)={0x34, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x8}, @ETHTOOL_A_RINGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}]}, 0x34}}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340), 0xfffffffffffffe19, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x42) bpf$BPF_LINK_CREATE(0xa, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x10, 0x0, @val=@iter={&(0x7f0000001a40)=@cgroup, 0x10}}, 0x40) 5m21.654462842s ago: executing program 38 (id=456): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00', r1}, 0x9) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000040)={0x34, 0x0, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0x8}, @ETHTOOL_A_RINGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}]}]}, 0x34}}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340), 0xfffffffffffffe19, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x42) bpf$BPF_LINK_CREATE(0xa, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x10, 0x0, @val=@iter={&(0x7f0000001a40)=@cgroup, 0x10}}, 0x40) 5m20.318417753s ago: executing program 9 (id=430): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[], 0x38}}, 0x4000) r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000040)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x2, 0x41001, &(0x7f00000000c0)=""/81}, &(0x7f0000000380)="259374c96ee3", 0x0, 0x0, 0x0, 0x0, 0x0}) 5m20.276757104s ago: executing program 9 (id=473): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00', r1}, 0x9) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340), 0xfffffffffffffe19, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x42) bpf$BPF_LINK_CREATE(0xa, &(0x7f0000000040)={r2, 0xffffffffffffffff, 0x10, 0x0, @val=@iter={&(0x7f0000001a40)=@cgroup, 0x10}}, 0x40) 5m20.184885635s ago: executing program 9 (id=475): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000010000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0}, &(0x7f0000000080), &(0x7f0000000180)=r1}, 0x20) syz_io_uring_complete(0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000640)='./file1\x00', 0x3014850, &(0x7f00000001c0)={[{@quota}, {@barrier_val={'barrier', 0x3d, 0x1000}}, {@grpjquota}, {@norecovery}, {@dioread_lock}]}, 0x3, 0x4c1, &(0x7f0000000680)="$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") quotactl$Q_QUOTAOFF(0xffffffff80000301, &(0x7f0000000200)=@loop={'/dev/loop', 0x0}, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2018c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x7, 0x1}, 0x0, 0x0, 0x1, 0xb, 0x94da}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x8, 0x3, 0x4d8, 0x340, 0x11, 0x148, 0x340, 0x0, 0x440, 0x2a8, 0x2a8, 0x440, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x88000000, 0x3, 0x7}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@quota={{0x38}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538) 5m19.790344441s ago: executing program 9 (id=480): syz_usb_connect(0x0, 0x5f, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) capset(&(0x7f0000000080)={0x20080522}, &(0x7f0000000000)={0x4, 0x7, 0x0, 0x0, 0x0, 0x4}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) unshare(0x22020400) r1 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'hsr0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="640000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="ffc30000000000003c0012800c0001006d6163766c616e002c0002800a000900ffffbfffffff00000a000400aaaaaaaaaabb00000600020001000000440003000000000008000500", @ANYRES32=r2], 0x64}, 0x1, 0x0, 0x0, 0x10}, 0x0) 5m17.461523667s ago: executing program 9 (id=499): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x6, 0x12, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x9}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x4d1caf58, 0x0, 0x0, 0x0, 0x6e9}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x72}}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x3}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff}]}, &(0x7f00000000c0)='syzkaller\x00', 0x401, 0x0, 0x0, 0x61680, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000100)={0x3, 0x3, 0x0, 0xffffffff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000140)=[0x1, 0xffffffffffffffff], 0x0, 0x10, 0xa, @void, @value}, 0x94) (async) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x6, 0x12, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x9}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x4d1caf58, 0x0, 0x0, 0x0, 0x6e9}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x72}}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x3}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff}]}, &(0x7f00000000c0)='syzkaller\x00', 0x401, 0x0, 0x0, 0x61680, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000100)={0x3, 0x3, 0x0, 0xffffffff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000140)=[0x1, 0xffffffffffffffff], 0x0, 0x10, 0xa, @void, @value}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={@cgroup, 0x32, 0x0, 0x6, &(0x7f0000000240)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={@cgroup=0xffffffffffffffff, 0x32, 0x0, 0x6, &(0x7f0000000240)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000003c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000400)=[0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0], 0x0, 0x17, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0xa4, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000380)={@ifindex=r3, r0, 0x17, 0x4, 0x0, @void, @value, @void, @void, r2}, 0x20) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)=@delchain={0x4c, 0x65, 0x8, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x0, r5, {0x0, 0xa}, {0x7, 0xfff3}, {0x0, 0xf}}, [@filter_kind_options=@f_flower={{0xb}, {0x1c, 0x2, [@TCA_FLOWER_KEY_TCP_DST={0x6}, @TCA_FLOWER_KEY_VLAN_ID={0x6, 0x17, 0x6ea}, @TCA_FLOWER_KEY_ENC_IP_TOS={0x5, 0x50, 0x9}]}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4081}, 0x24000850) r6 = openat$cgroup_devices(r1, &(0x7f0000000840)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r6, &(0x7f0000000880)={'c', ' *:* ', 'rw\x00'}, 0x9) r7 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000900), &(0x7f0000000940)=0x4) (async) getsockopt$inet_sctp6_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000900), &(0x7f0000000940)=0x4) getsockopt$inet_sctp_SCTP_RTOINFO(r7, 0x84, 0x0, &(0x7f0000000980)={0x0, 0x100, 0x834, 0x8000}, &(0x7f00000009c0)=0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r7, 0x84, 0x7b, &(0x7f0000000a00)={r8, 0x1}, 0x8) (async) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r7, 0x84, 0x7b, &(0x7f0000000a00)={r8, 0x1}, 0x8) setsockopt$MRT_ADD_MFC(r7, 0x0, 0xcc, &(0x7f0000000a40)={@empty, @broadcast, 0xffffffffffffffff, "a82c01e56c66133d0d7fa24907047c9e0ecb0a7a5e02f7d931c613dd82aff3a1", 0xf3d, 0xffffffff, 0x4, 0xc}, 0x3c) ioctl$AUTOFS_DEV_IOCTL_READY(r7, 0xc0189376, &(0x7f0000000a80)={{0x1, 0x1, 0x18, r7, {0x3}}, './file0\x00'}) io_uring_enter(r9, 0x1158, 0xd0ea, 0x4, &(0x7f0000000ac0)={[0x8001]}, 0x8) socket$inet_sctp(0x2, 0x1, 0x84) (async) r10 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_CONTEXT(r10, 0x84, 0x11, &(0x7f0000000b00)={r8, 0x2}, &(0x7f0000000b40)=0x8) (async) getsockopt$inet_sctp_SCTP_CONTEXT(r10, 0x84, 0x11, &(0x7f0000000b00)={r8, 0x2}, &(0x7f0000000b40)=0x8) get_mempolicy(&(0x7f0000000b80), &(0x7f0000000bc0), 0x40, &(0x7f0000fee000/0x12000)=nil, 0x4) setsockopt$MRT_DEL_MFC_PROXY(r7, 0x0, 0xd3, &(0x7f0000000c00)={@private=0xa010100, @remote, 0x1, "fd846d32ca7e8d1969a2ada4026434c4de9ef9890441de0dc3fd3d013b3018a5", 0xff, 0x6, 0xd3, 0x2}, 0x3c) (async) setsockopt$MRT_DEL_MFC_PROXY(r7, 0x0, 0xd3, &(0x7f0000000c00)={@private=0xa010100, @remote, 0x1, "fd846d32ca7e8d1969a2ada4026434c4de9ef9890441de0dc3fd3d013b3018a5", 0xff, 0x6, 0xd3, 0x2}, 0x3c) setsockopt$MRT_DEL_MFC_PROXY(r7, 0x0, 0xd3, &(0x7f0000000c40)={@empty, @local, 0x0, "bd8d24b91164b03ca79d2e8139d88826f4949cd3a50306c0ca73bdc3a4586531", 0xa, 0x9, 0x2, 0x2}, 0x3c) r11 = syz_clone(0x40048100, &(0x7f0000000c80)="14d3e55140675c7c9a9b74e9d600c2fad7f5ffed4c4b191ebfbe66be0f5ade1c0119302198563aa34c60016c74597348fc0b60b3becbe549f490dcbb090ddce7be7d2ae7531f8f3b9cce2f99eb4cc4e46a7a9ad5eb1ea83886f81417a721e64b371cd9e5bde39d00536406466d6a38266a054a84ff4f0cf0893e5fa18ecc950b3b387f40bf386b0d31b63015fff4d1ba92100f1e6b64830a52f115026d83e14e7e4522d9aaabd6", 0xa7, &(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)="71998cfda4ae4e74b4af93b8c6b4afdecd8480268508b287ec72d5c6dd770994287708752d68ed89a12f054532a249c0c2f27ff4746d376d7972a39a3d4c65e3fcddbc83aebebeeed3719ff645ae6d95e04e62de6bccfe50169989870eb092a98c73a48f14faa418d179194daeb73327bcb92505d75b6c71d84cecd860167810f474d3684689b1b6d0fadfd1330b6ad690fe4611b1a0a428a20bf084ad8996c1dea67abeb6a89f8b84e59fd54e1e3fe7f04f73675624822b7b62c343cbbcc43fae748bdae09915ca5d2bf229cc65082a5c5795a6d0") sched_setscheduler(r11, 0x3, &(0x7f0000000ec0)) r12 = syz_open_dev$vcsa(&(0x7f0000000f00), 0xaace, 0x20081) setsockopt$packet_int(r12, 0x107, 0xc, &(0x7f0000000f40), 0x4) (async) setsockopt$packet_int(r12, 0x107, 0xc, &(0x7f0000000f40), 0x4) setsockopt$packet_int(r12, 0x107, 0xb, &(0x7f0000000f80), 0x4) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r9, 0x8982, &(0x7f0000000fc0)={0x3, 'geneve0\x00', {0x2}, 0x10}) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r9, 0x84, 0x20, &(0x7f0000001000), &(0x7f0000001040)=0x4) setsockopt$inet_tcp_TCP_REPAIR(r9, 0x6, 0x13, &(0x7f0000001080)=0x1, 0x4) (async) setsockopt$inet_tcp_TCP_REPAIR(r9, 0x6, 0x13, &(0x7f0000001080)=0x1, 0x4) socket$inet_tcp(0x2, 0x1, 0x0) (async) socket$inet_tcp(0x2, 0x1, 0x0) 5m17.370616999s ago: executing program 39 (id=499): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x6, 0x12, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x9}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x4d1caf58, 0x0, 0x0, 0x0, 0x6e9}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x72}}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x3}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff}]}, &(0x7f00000000c0)='syzkaller\x00', 0x401, 0x0, 0x0, 0x61680, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000100)={0x3, 0x3, 0x0, 0xffffffff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000140)=[0x1, 0xffffffffffffffff], 0x0, 0x10, 0xa, @void, @value}, 0x94) (async) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x6, 0x12, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x9}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x4d1caf58, 0x0, 0x0, 0x0, 0x6e9}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x72}}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x3}, @map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7fffffff}]}, &(0x7f00000000c0)='syzkaller\x00', 0x401, 0x0, 0x0, 0x61680, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000100)={0x3, 0x3, 0x0, 0xffffffff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000140)=[0x1, 0xffffffffffffffff], 0x0, 0x10, 0xa, @void, @value}, 0x94) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={@cgroup, 0x32, 0x0, 0x6, &(0x7f0000000240)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={@cgroup=0xffffffffffffffff, 0x32, 0x0, 0x6, &(0x7f0000000240)=[0x0, 0x0], 0x2, 0x0, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000003c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000400)=[0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0], 0x0, 0x17, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0xa4, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000380)={@ifindex=r3, r0, 0x17, 0x4, 0x0, @void, @value, @void, @void, r2}, 0x20) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'team0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f0000000800)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000740)=@delchain={0x4c, 0x65, 0x8, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x0, r5, {0x0, 0xa}, {0x7, 0xfff3}, {0x0, 0xf}}, [@filter_kind_options=@f_flower={{0xb}, {0x1c, 0x2, [@TCA_FLOWER_KEY_TCP_DST={0x6}, @TCA_FLOWER_KEY_VLAN_ID={0x6, 0x17, 0x6ea}, @TCA_FLOWER_KEY_ENC_IP_TOS={0x5, 0x50, 0x9}]}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4081}, 0x24000850) r6 = openat$cgroup_devices(r1, &(0x7f0000000840)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r6, &(0x7f0000000880)={'c', ' *:* ', 'rw\x00'}, 0x9) r7 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000008c0), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000900), &(0x7f0000000940)=0x4) (async) getsockopt$inet_sctp6_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000900), &(0x7f0000000940)=0x4) getsockopt$inet_sctp_SCTP_RTOINFO(r7, 0x84, 0x0, &(0x7f0000000980)={0x0, 0x100, 0x834, 0x8000}, &(0x7f00000009c0)=0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r7, 0x84, 0x7b, &(0x7f0000000a00)={r8, 0x1}, 0x8) (async) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r7, 0x84, 0x7b, &(0x7f0000000a00)={r8, 0x1}, 0x8) setsockopt$MRT_ADD_MFC(r7, 0x0, 0xcc, &(0x7f0000000a40)={@empty, @broadcast, 0xffffffffffffffff, "a82c01e56c66133d0d7fa24907047c9e0ecb0a7a5e02f7d931c613dd82aff3a1", 0xf3d, 0xffffffff, 0x4, 0xc}, 0x3c) ioctl$AUTOFS_DEV_IOCTL_READY(r7, 0xc0189376, &(0x7f0000000a80)={{0x1, 0x1, 0x18, r7, {0x3}}, './file0\x00'}) io_uring_enter(r9, 0x1158, 0xd0ea, 0x4, &(0x7f0000000ac0)={[0x8001]}, 0x8) socket$inet_sctp(0x2, 0x1, 0x84) (async) r10 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_CONTEXT(r10, 0x84, 0x11, &(0x7f0000000b00)={r8, 0x2}, &(0x7f0000000b40)=0x8) (async) getsockopt$inet_sctp_SCTP_CONTEXT(r10, 0x84, 0x11, &(0x7f0000000b00)={r8, 0x2}, &(0x7f0000000b40)=0x8) get_mempolicy(&(0x7f0000000b80), &(0x7f0000000bc0), 0x40, &(0x7f0000fee000/0x12000)=nil, 0x4) setsockopt$MRT_DEL_MFC_PROXY(r7, 0x0, 0xd3, &(0x7f0000000c00)={@private=0xa010100, @remote, 0x1, "fd846d32ca7e8d1969a2ada4026434c4de9ef9890441de0dc3fd3d013b3018a5", 0xff, 0x6, 0xd3, 0x2}, 0x3c) (async) setsockopt$MRT_DEL_MFC_PROXY(r7, 0x0, 0xd3, &(0x7f0000000c00)={@private=0xa010100, @remote, 0x1, "fd846d32ca7e8d1969a2ada4026434c4de9ef9890441de0dc3fd3d013b3018a5", 0xff, 0x6, 0xd3, 0x2}, 0x3c) setsockopt$MRT_DEL_MFC_PROXY(r7, 0x0, 0xd3, &(0x7f0000000c40)={@empty, @local, 0x0, "bd8d24b91164b03ca79d2e8139d88826f4949cd3a50306c0ca73bdc3a4586531", 0xa, 0x9, 0x2, 0x2}, 0x3c) r11 = syz_clone(0x40048100, &(0x7f0000000c80)="14d3e55140675c7c9a9b74e9d600c2fad7f5ffed4c4b191ebfbe66be0f5ade1c0119302198563aa34c60016c74597348fc0b60b3becbe549f490dcbb090ddce7be7d2ae7531f8f3b9cce2f99eb4cc4e46a7a9ad5eb1ea83886f81417a721e64b371cd9e5bde39d00536406466d6a38266a054a84ff4f0cf0893e5fa18ecc950b3b387f40bf386b0d31b63015fff4d1ba92100f1e6b64830a52f115026d83e14e7e4522d9aaabd6", 0xa7, &(0x7f0000000d40), &(0x7f0000000d80), &(0x7f0000000dc0)="71998cfda4ae4e74b4af93b8c6b4afdecd8480268508b287ec72d5c6dd770994287708752d68ed89a12f054532a249c0c2f27ff4746d376d7972a39a3d4c65e3fcddbc83aebebeeed3719ff645ae6d95e04e62de6bccfe50169989870eb092a98c73a48f14faa418d179194daeb73327bcb92505d75b6c71d84cecd860167810f474d3684689b1b6d0fadfd1330b6ad690fe4611b1a0a428a20bf084ad8996c1dea67abeb6a89f8b84e59fd54e1e3fe7f04f73675624822b7b62c343cbbcc43fae748bdae09915ca5d2bf229cc65082a5c5795a6d0") sched_setscheduler(r11, 0x3, &(0x7f0000000ec0)) r12 = syz_open_dev$vcsa(&(0x7f0000000f00), 0xaace, 0x20081) setsockopt$packet_int(r12, 0x107, 0xc, &(0x7f0000000f40), 0x4) (async) setsockopt$packet_int(r12, 0x107, 0xc, &(0x7f0000000f40), 0x4) setsockopt$packet_int(r12, 0x107, 0xb, &(0x7f0000000f80), 0x4) ioctl$sock_SIOCGIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r9, 0x8982, &(0x7f0000000fc0)={0x3, 'geneve0\x00', {0x2}, 0x10}) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r9, 0x84, 0x20, &(0x7f0000001000), &(0x7f0000001040)=0x4) setsockopt$inet_tcp_TCP_REPAIR(r9, 0x6, 0x13, &(0x7f0000001080)=0x1, 0x4) (async) setsockopt$inet_tcp_TCP_REPAIR(r9, 0x6, 0x13, &(0x7f0000001080)=0x1, 0x4) socket$inet_tcp(0x2, 0x1, 0x0) (async) socket$inet_tcp(0x2, 0x1, 0x0) 4m55.631527158s ago: executing program 3 (id=1039): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a000000020000000110000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r2}, 0x10) socketpair(0x0, 0x0, 0x4, &(0x7f0000000280)) 4m55.590405999s ago: executing program 3 (id=1043): syz_emit_ethernet(0x2a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaa66aa270045d70000fe08060001080006040002aaaaaaaaaaaaac1414bbaaaaaaaaaa00ac"], 0x0) 4m55.563202939s ago: executing program 3 (id=1046): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a000000020000"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r1}, 0x10) socketpair(0x0, 0x0, 0x4, &(0x7f0000000280)) 4m55.539199269s ago: executing program 3 (id=1048): mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000040)=0x8, 0x4) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r3, 0xf502, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x17, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0xfffffffe}, [@call={0x85, 0x0, 0x0, 0x7d}, @printk={@ld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xbd6f}}]}, 0x0, 0xfffffffe, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000080)='block_bio_remap\x00', r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000001c0)='nilfs2_mdt_submit_block\x00', r4, 0x0, 0xfffffffbfffffffd}, 0x18) quotactl$Q_SYNC(0xffffffff80000100, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000240)={'syzkaller1\x00', @link_local}) write$tun(r2, &(0x7f0000001100)=ANY=[@ANYBLOB="0e806005ffffffffffffaaaa78e15ed00800450000280000000000049078000000000000000045000000001490788bf0d6204c881db68f34d04d"], 0x3a) syz_mount_image$vfat(&(0x7f00000005c0), &(0x7f00000002c0)='./file0\x00', 0xc80, &(0x7f0000000180)=ANY=[@ANYBLOB="00631dda01aef2456795dd9b26209f1c0f624854ea3dd5a00bd6df44035f5c3ae796fec6d633a0ffad0569794acfef7da01767fd4175f2cd82df769aa2ee7bfe3640554507d2e660c9f9e222a72e1e3e71145c480657d2864e5e276f028d64701ae31cde0ceaf408fdb05c0f4142da00e900000100000149e6d308cbe315789f4baffe39bbced9b1d421d2e290e9fc563b62225f002ee310e1fa7321000000000000d6231001a4b2d467825f3abb0c167e129cf1fa0e7854103f4bf2d3a0194983bc86cbd3d75ccef3c8ac4516dac102"], 0x1, 0x266, &(0x7f0000000340)="$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") r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r6, 0x4030582a, &(0x7f0000000300)={0x113e, 0x2, 0x0, 0x10002}) mknodat$null(0xffffffffffffff9c, 0x0, 0x0, 0x103) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)=""/44) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800"/14, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r7}, 0x10) fremovexattr(r8, &(0x7f0000000000)=@known='user.incfs.metadata\x00') syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r9 = shmget$private(0x0, 0x3000, 0x54001800, &(0x7f000010d000/0x3000)=nil) shmat(r9, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYRESOCT=r1], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000400)='kfree\x00', r10}, 0x10) 4m55.347645253s ago: executing program 3 (id=1050): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socket$kcm(0xa, 0x1, 0x106) symlink(&(0x7f0000001780)='./file0/../file0\x00', &(0x7f00000017c0)='./file0\x00') r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0, 0x0, 0x9}, 0x18) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000180)={'sit0\x00', &(0x7f0000000140)={'gretap0\x00', 0x0, 0x467ce670db5adc3c, 0xf, 0x3, 0x1, {{0x6, 0x4, 0x3, 0x3, 0x18, 0x64, 0x0, 0x89, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x35}, @dev={0xac, 0x14, 0x14, 0x3e}, {[@ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'tunl0\x00'}) socket$netlink(0x10, 0x3, 0x0) r1 = memfd_create(&(0x7f0000000580)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\xd2q#\xc6\xca\x97\x9d\xcb\x1e\x80\xd6\xd5%N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec=\x9e\xc3\xfd\x85d\x0fl5\xf3\xbe\" 6\r<\xea\x8dz\xcf6\x99\x91\xear8p\xaaR\xd5\xa6\xab#N>\x9a\xdf\xea\x009\xfbB\xc1\xd0_\xc0\'Z\xeb\xd8\xaf\xf0\'J\xe2\xff\xe5x*;(p\xf7p\xce\xbb\xa7\xfe\x04\xd0t\x81\x1a\x1b?m/\x1ex\xf8\x88^\xbaU\xb9\xa6\xab\x8d\a\xa6\"\xd9\x13\xeb\xe2\rh\x8dsx\xaa!\xd5Q\xf8\xce*\x95\x0es\xfaZ\x94t\x19\xdc\xdc\xcf\x0f\x9a\xa2O>\xb9\xfc\x01\fW\xee\xffh\xbd\xb2\xb4z\xeb\x84\x13\x13u\x8f', 0x0) write$bt_hci(r1, &(0x7f0000000080)=ANY=[], 0x2b) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 4m55.129693326s ago: executing program 3 (id=1053): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000200)}, 0x20) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000180)='f2fs_fallocate\x00', r2, 0x0, 0x3}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = socket$netlink(0x10, 0x3, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r6, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) writev(r5, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a11820fffff5bab4e210000000058000b4824ca945f6400940f6a0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a0c100000000100224e0000", 0x58}], 0x1) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3a0, 0x118, 0x0, 0x330, 0x298, 0x330, 0x3f0, 0x3f0, 0x3f0, 0x3f0, 0x3f0, 0x6, 0x0, {[{{@ip={@multicast1, @remote, 0x0, 0x0, 'ip6erspan0\x00', 'pimreg0\x00'}, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38}}, {{@ip={@multicast2, @dev, 0x0, 0x0, 'veth0_to_bond\x00', 'syzkaller1\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, 0x0, 0x0, 'vlan0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x400) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000580)={'ip6_vti0\x00', &(0x7f0000000500)={'ip6_vti0\x00', r7, 0x2f, 0x81, 0x0, 0x800, 0x29, @mcast2, @remote, 0x1, 0x8000, 0x7ff, 0xe}}) sendmsg$DCCPDIAG_GETSOCK(r8, &(0x7f0000000840)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000740)={&(0x7f00000005c0)={0x170, 0x13, 0x200, 0x70bd26, 0x25dfdbfd, {0x5, 0x9c, 0x0, 0x97, {0x4e20, 0x4e22, [0x40, 0x3, 0x3, 0xe], [0xffffffff, 0x6, 0x8, 0x6], r9, [0x8, 0xfffffffc]}, 0xf, 0x6}, [@INET_DIAG_REQ_BYTECODE={0xbf, 0x1, "7f8891a3ea14dd4bf63621af5ba93740136ca41552fd63e5c17023220eb5a16daa02c5515f0741f30142ceb679d3e895dc557c312f6b7fd54bc15777821ca1e84cd8d770d2acb3a811ff4c3f5753f82962b4aa73d5d41721bbfca18016ffef0af95094f00843f809f1e1fec0f815338686d1a50796169863a73c81e2dabfb5fd2bbf237f831012e6465ee8d2c0d91bdedfc51cffc72f889d5dafa8cab846c6022d9a445d795d32b36fd9097e58d7f0ca5dc5d789d051429831d850"}, @INET_DIAG_REQ_BYTECODE={0x62, 0x1, "119cd1c482bf0a0f0bb67d8ae27f7dea0e1ce65f19d9d2a23c06bd1cd2bb13df13ae8f6ebb3966b9f2dc98c24cae9dbacdf43ddad314cf56e222302bba826e1060978059d6f4919e945480682c2b328f53c7cfc15c45086c56e9ab68ae3b"}]}, 0x170}, 0x1, 0x0, 0x0, 0x80}, 0x20044004) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r10, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="b8000000190001000000000000000000dc020078000000000000000000000000ff02000000000000e26ea7250000000100000000000000000a"], 0xb8}}, 0x0) sendmsg$nl_xfrm(r10, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)=ANY=[@ANYBLOB="650100001b"], 0x188}}, 0x0) sendmsg$nl_xfrm(r4, &(0x7f0000000480)={0x0, 0x2500, &(0x7f0000000440)={&(0x7f0000000000)=ANY=[@ANYBLOB="6501000014"], 0x188}}, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYRES32=r3], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000b7080000000000007baaf8ff00000000b5080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r12, @ANYBLOB="0000000000000000b70500000800000085000000a700000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r13}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000200)='fib_table_lookup\x00', r11}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r14, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 4m55.106978146s ago: executing program 40 (id=1053): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000200)}, 0x20) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000180)='f2fs_fallocate\x00', r2, 0x0, 0x3}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = socket$netlink(0x10, 0x3, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r6, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) writev(r5, &(0x7f0000000080)=[{&(0x7f0000000180)="580000001400192340834b80040d8c560a11820fffff5bab4e210000000058000b4824ca945f6400940f6a0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100001000a0c100000000100224e0000", 0x58}], 0x1) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x3a0, 0x118, 0x0, 0x330, 0x298, 0x330, 0x3f0, 0x3f0, 0x3f0, 0x3f0, 0x3f0, 0x6, 0x0, {[{{@ip={@multicast1, @remote, 0x0, 0x0, 'ip6erspan0\x00', 'pimreg0\x00'}, 0x0, 0x70, 0xa8}, @common=@inet=@SET3={0x38}}, {{@ip={@multicast2, @dev, 0x0, 0x0, 'veth0_to_bond\x00', 'syzkaller1\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, 0x0, 0x0, 'vlan0\x00', 'veth1_to_bridge\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @ECN={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x400) r8 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f0000000580)={'ip6_vti0\x00', &(0x7f0000000500)={'ip6_vti0\x00', r7, 0x2f, 0x81, 0x0, 0x800, 0x29, @mcast2, @remote, 0x1, 0x8000, 0x7ff, 0xe}}) sendmsg$DCCPDIAG_GETSOCK(r8, &(0x7f0000000840)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000740)={&(0x7f00000005c0)={0x170, 0x13, 0x200, 0x70bd26, 0x25dfdbfd, {0x5, 0x9c, 0x0, 0x97, {0x4e20, 0x4e22, [0x40, 0x3, 0x3, 0xe], [0xffffffff, 0x6, 0x8, 0x6], r9, [0x8, 0xfffffffc]}, 0xf, 0x6}, [@INET_DIAG_REQ_BYTECODE={0xbf, 0x1, "7f8891a3ea14dd4bf63621af5ba93740136ca41552fd63e5c17023220eb5a16daa02c5515f0741f30142ceb679d3e895dc557c312f6b7fd54bc15777821ca1e84cd8d770d2acb3a811ff4c3f5753f82962b4aa73d5d41721bbfca18016ffef0af95094f00843f809f1e1fec0f815338686d1a50796169863a73c81e2dabfb5fd2bbf237f831012e6465ee8d2c0d91bdedfc51cffc72f889d5dafa8cab846c6022d9a445d795d32b36fd9097e58d7f0ca5dc5d789d051429831d850"}, @INET_DIAG_REQ_BYTECODE={0x62, 0x1, "119cd1c482bf0a0f0bb67d8ae27f7dea0e1ce65f19d9d2a23c06bd1cd2bb13df13ae8f6ebb3966b9f2dc98c24cae9dbacdf43ddad314cf56e222302bba826e1060978059d6f4919e945480682c2b328f53c7cfc15c45086c56e9ab68ae3b"}]}, 0x170}, 0x1, 0x0, 0x0, 0x80}, 0x20044004) r10 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r10, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="b8000000190001000000000000000000dc020078000000000000000000000000ff02000000000000e26ea7250000000100000000000000000a"], 0xb8}}, 0x0) sendmsg$nl_xfrm(r10, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000000)=ANY=[@ANYBLOB="650100001b"], 0x188}}, 0x0) sendmsg$nl_xfrm(r4, &(0x7f0000000480)={0x0, 0x2500, &(0x7f0000000440)={&(0x7f0000000000)=ANY=[@ANYBLOB="6501000014"], 0x188}}, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYRES32=r3], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000b7080000000000007baaf8ff00000000b5080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r12, @ANYBLOB="0000000000000000b70500000800000085000000a700000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r13}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000200)='fib_table_lookup\x00', r11}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r14, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 4m0.548690367s ago: executing program 1 (id=2355): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=0xffffffffffffffff], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0x3f, &(0x7f0000000600)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES64=0x0, @ANYRESOCT=r1, @ANYRESOCT=r2, @ANYRESDEC=r1, @ANYRES8=r0, @ANYRES64], 0x0, 0x1, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x51, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) unshare(0x44040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb, 0x8031, 0xffffffffffffffff, 0xc6ed4000) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000000)='./file0\x00', 0x1018000, &(0x7f00000003c0)=ANY=[@ANYRES8=0x0, @ANYRES16, @ANYRES16=0x0, @ANYRESOCT, @ANYRES32, @ANYRESDEC], 0x4, 0x2ee, &(0x7f00000006c0)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040), 0x208e24b) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x1, 0x0) socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r5, 0x0) fdatasync(r5) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) getrandom(&(0x7f0000000240)=""/286, 0xffffff9a, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000031c0)=[{{&(0x7f0000000040)={0xa, 0x4e23, 0xfffffff7, @loopback={0xfeffffffffffffff}, 0xce02}, 0x1c, 0x0}}], 0x1, 0x4000000) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd\x00') 3m59.407211035s ago: executing program 1 (id=2368): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x2, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) fspick(0xffffffffffffffff, &(0x7f0000000000)='.\x00', 0x10000000) 3m59.290868207s ago: executing program 1 (id=2371): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa1", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kmem_cache_free\x00', r1, 0x0, 0xf7}, 0x18) syz_emit_ethernet(0x22, &(0x7f00000002c0)={@broadcast, @random="f5ab325f8d63", @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x1, 0x38, 0x14, 0x65, 0x0, 0xef, 0x2b, 0x0, @loopback, @loopback}}}}}, 0x0) 3m59.289529617s ago: executing program 1 (id=2373): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x48) r1 = syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000200)='./file2\x00', 0x1000410, &(0x7f0000000100)={[{@barrier_val={'barrier', 0x3d, 0x8000}}, {@i_version}]}, 0x6, 0x504, &(0x7f0000019940)="$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") bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB='\v\x00\x00\x00\b\x00\x00'], 0x48) r2 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FD_FRAMES(r2, 0x65, 0x5, &(0x7f0000000040)=0x1, 0x4) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'veth0_virt_wifi\x00', 0x0}) sendmsg$can_raw(r2, &(0x7f0000000000)={&(0x7f0000000580)={0x1d, r4}, 0x10, &(0x7f0000000780)={&(0x7f0000000440)=@canfd={{}, 0x4c, 0x3, 0x0, 0x0, "0e7692fddc9d8ba5a0ac79669b0e47a81f2e3c8973fc2af2a7fa10b9126ea28baed9b57d82ab23db557c307ae88da9c6c68d8ceae8e69b06707297b87f8c925a"}, 0x48}, 0x2, 0x0, 0x0, 0x8180}, 0x20044010) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r3, {0x3}}, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b70400000000000085000000010000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r4, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mremap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1000, 0x0, &(0x7f00008b5000/0x1000)=nil) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000440)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) r7 = open$dir(&(0x7f0000000040)='./file0/../file0\x00', 0x580, 0x40) move_mount(r7, &(0x7f00000002c0)='.\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x102) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000300)=@newlink={0x34, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x115}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}]}, 0x34}}, 0x804) r9 = io_uring_setup(0x51d2, &(0x7f0000000400)={0x0, 0x631b, 0x2000, 0x1, 0x2d6, 0x0, r5}) io_uring_register$IORING_REGISTER_BUFFERS2(r9, 0xf, &(0x7f0000002700)={0x119f, 0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000480)=""/264, 0xf9}, {&(0x7f00000015c0)=""/4096, 0x400400}, {&(0x7f0000002a00)=""/88, 0x8}], 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r11 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)=@o_path={&(0x7f0000000180)='./file0\x00', 0x0, 0x2000, r10}, 0x18) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffe2f, 0x0, 0x0, 0x0, 0x0, r11, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r12}, 0x10) 3m59.219703888s ago: executing program 1 (id=2374): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a000000020000000110000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x0, 0x0, 0x4, &(0x7f0000000280)) 3m59.044122461s ago: executing program 1 (id=2375): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000009c0)='kfree\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x1c, 0x3, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24040800}, 0x8d0) 3m59.022189191s ago: executing program 41 (id=2375): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000009c0)='kfree\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x1c, 0x3, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24040800}, 0x8d0) 4.068986266s ago: executing program 0 (id=6190): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x3b, &(0x7f00000001c0)={0x0, 0x2, 0x10100}, &(0x7f0000000140), &(0x7f0000000100)) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000140)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x20812, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x82, 0x0, 0x0, 0x0, 0x8}) 3.986226798s ago: executing program 0 (id=6193): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000078000000090a010400000000000000000100000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000253c0011800a0001006c696d69740000002c0002800c"], 0xc0}, 0x1, 0x0, 0x0, 0x810}, 0xc4) 3.955062528s ago: executing program 0 (id=6195): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'netpci0\x00', 0x2}) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000380)=ANY=[@ANYBLOB="01000004"]) 3.82479449s ago: executing program 0 (id=6198): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000006c0)='kfree\x00', r1}, 0x18) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000030500"/20, @ANYRES32, @ANYBLOB="0000000000000000280012800b0001006d61637365630000180002800c0004000100000100c2800005"], 0x48}}, 0x40000) 3.743762031s ago: executing program 0 (id=6202): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000002e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x41, 0x0) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000200)='./file0\x00', 0x800, &(0x7f00000005c0)=ANY=[@ANYRES16, @ANYRESOCT=0x0, @ANYRESHEX=r0, @ANYRES16], 0x1, 0x36e, &(0x7f0000000c00)="$eJzs3c9rI2UYwPEnaZpMumyTgygK0ge96GVoq2c1yC6IAZfuRtwVhNntREPGpMyESERsPXkVb/4DgsseFzwsqP9AL97WixdP9iIIuog4Mr/SJJ00aTZL0/b7gTZP8r7PzPvmF88byJuD9776uFn3zLrVkayhkhEReSRSlqwkMtFFXlLsycuX/nz4/PWbt96uVKtXtlSvVm68sqmqq2s/fPJZMe72oCD75Q8OxPht/+n9Zw/+u/FRw9OGp612Ry293f61Y912bN1ueE1T9ZpjW56tjZZnu1F7O2qvO+2dnZ5are3LKzuu7XlqtXratHvaaWvH7an1odVoqWmaenklbbjnmDFDTu3u1pZVmfGEd2bMw7z94/v+Mc2uW7GWRMzikZba3Sc6LgAAsJBG6v9vkhqhLNl+QZmJ1wL5MB5eBgT1fxKH9X+wWDis/++98FPn0rv3V+P6/0E+rf5/9Zcof6j+D84+9/r/u5HrRyuiM2/3JJ0fq/7HYlgbfkX+frhijwX1f/Bq6K/ov3j/3noYUP8DAAAAAAAAAAAAAAAAAAAAAHAWPPL9ku/7peQy+Tv8CkF8Pbl23BeNceaMe/wL8Y4C/ecDzqXrN2+JEX5xL7cq4nzZrXVr0WXcnnRcl5L8Gz4fYtGGE3thowbK8qOz260txwlL4f+KiIojtmxIScpD+WF89a3qlQ2NRPnh+Xe7tUxuJcivSyPM35SSPJWev5man5eXXhzIN6UkP9+RtjiyHb+PJfmfb6i++U51JL8Y9kvz+pN9SAAAAAAAmDtT1YiXz+Xh9W+0fjdN1bT2YC0vg+vzo58P9NfX66nr81zpudzpzh0AAAAAgIvCy3/atBzHdr3e2KAok/oU4qONNOVkwpGDIDdFn6HgYRgsH9dnaWCG0x45H/+CxrTDcL2eTD3mJPirIKl3ZrKF61CTkX6vThkk85+is3HSh8D1siefu+16a8F4dKbpDATJx0bj+si1WY88Lkh2zp3U+Zmvv/17tlNk4l17B5teu29MmGkYZEZu2ZvwpP3D9yeOZzn93eL7WX5kBgAAAMCCSIr+opfc8sbpDggAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAtortukjQlOe44AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAovg/AAD//5h69bA=") r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) io_setup(0x7d, &(0x7f0000000600)=0x0) io_submit(r2, 0x2, &(0x7f0000001d00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000)="96", 0xffffff20}, &(0x7f0000000740)={0x0, 0x0, 0x41, 0x3, 0x0, r1, 0x0, 0x0, 0xffffffffffffffff}]) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) io_pgetevents(r2, 0x2, 0x8, &(0x7f0000001080)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000380)={0x0, 0x3938700}, &(0x7f00000011c0)={&(0x7f0000001180)={[0x7f]}, 0x8}) 3.544374854s ago: executing program 0 (id=6207): getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x10000000000030, 0x0, 0x0) prctl$PR_SET_NAME(0xf, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) getpid() socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000002c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_DELFLOWTABLE={0x20, 0x18, 0xa, 0x5, 0x0, 0x0, {0x2}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x3}}}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x20008000) 1.628043564s ago: executing program 8 (id=6242): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffe}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r2}, 0x10) fsetxattr$system_posix_acl(r1, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000"], 0xfe44, 0x0) 1.547617455s ago: executing program 8 (id=6243): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f00000007c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x2, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x10100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) ioctl$SG_GET_PACK_ID(r1, 0x227c, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r2) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB='ya\x00\x00\x00\x00\x00\x00\x00\x00~'], 0x1c}}, 0x4000054) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000d00)=ANY=[@ANYBLOB="b70000008100003bbfa30000000000000703000000feffff720af0fff8ffffff71a4f0ff0000000071105400000000001d400500000000004704000001ed00000f030000000000001d440000000000006b0a00fe000000007313000000000000b5000000000000009500000000000000023bc065b58111c6dfa041b63af4a3912435f1a864a710aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168c50000000190f32050e436fe275daf51efd601b6bf01c8e8b1b526375ec4dd6fcd82e4fee5bef7af9aa0d7d600c095199fe3ff31a8fd3c0fd8b7ff831028e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646c0200000000000000020000e35208b0bb0d2cd829e654400e2438ec649dc76128610643a98d9ec21ead2ed51b104d4d91af25b845d8a7925c3109b151b8b9f75dd08d123deda82fc9c4d7ecc7a803bf28bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31af9612f2460d0b11008e59a5923906f88b53987ad1714f62ba7a54f0c33d39000d0bfed3a6a59ff616236fd8f2477184bdef728d236619074d6ebdfd1f5089048ddff6da40f9411fe722631cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10746443d6438e959532e0617d419c6bc6ea9f2bca4464f56e24e6d2105bd901204a1deeed4155617572652d950ad31928b0b0c3dc2869f478341d02d0f5ad94b081fcd507acb4b9c65fee9d5a17f48a7382f13d000000225d85ae49cee383dc5049076b989b40000000000000da60d2ae20cfb91d6a49964757cdf538f9ce2bdb1ab062cd54e67011d355d84ce97bb0c6b4a595e487efbb2d71cde2c140952f9a0f0bc6980fe78683ac5c0c31032599ddd71063be9261b2e1aab1675b34a22048ef8c126aeef5f510a8f1aded94a129e4aec6f8d9ab06fa2e04cfe0649226c697d9e8eaade69d0540059fe6c7fe7cd8697502c7596566d674e425da5e87e59602a9f6590521d31d3804b3e0a1053abdc31282dfb15eb6841bb64a1b304502dda787343ce3c953992e4a982f3c48153baae244e7bf37548c7f1a4cad2422ee965a38f7defbd2160242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44028d6112a0c2d21b2dc98816106dec28eaeb883418f562ae00023ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc4e95dd2d18383117c039862198899b212c55318294270a1ad10c80fef7c24d47afce829ba0f85da6d888f18ea40ab959f6074ab2a40d85d15017ab513cdc6c0e57fb1c1ca571380d7b4ead35a385e0b4a26b702396df7e0c1e02b6e4114f244a9bf93f04bf072f0861f7580e69db384ac7eeedcf2ba1a9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba34015ea5aacb1188883ad2a3b1832371fe5bc621426d1ed0a4a99702cc1b6912a1e717d29135753208165b9cdbae2ed9dc7358f0ebadde0b727f27feeb744ddcc536cbae315c7d1fe1399562ba6824840bd2951680f6f2f9a6a83469620c6e74e1f46132559c4f8700a350845ffa0d829e4f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010aec0e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00000000c95265b2bd83d64a532869d701723fedcbada1ee7baa5b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2f52c8785fe0721719b3d654026c6ea08b83b123145ab5703dad844ceb201ddeb6dc5f6a903792283c42efc54fa84323afc4c10eff462c8843187f1dd48ef3fa293774d582956ff0f40b10ca94f6feeb2893c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88f15efaaeea831555877f9538d6ee6ba65893ff1f908ba7554ba583fef3ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738012e4fee18a22da19fcdb4c2890cda1f96b952511e3a69d694d625e0b2f808890205f3a6da2819d2f9e77c7c64affa54fec0136cbafa5f6f096753b639a920099c1f69219927ea5301fff0a6063d427f0688430754c02180d61542c2571f983e9673560000000000000000005a7b57f03ca91a01ba2e30ca99e8ebc15ecb4d91675767999d146aef7799738b292fd640dfef6b04d086f737a159d7e0c6e4d81ad64a8bbca48568325b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a7bce14c6de4e7c0660d80010f5c653d22d49030a8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2867b91b7d120617d12d91db2633d6864da40fc5d2f55ff07c53147de202ce517b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e1661061173f359e9052a4cecd89008f70314a0bdd491ec86a4555d89fe0120f64c62e8e3ed8bcb45202c3d4bbec8d722824c0ebca8db1ea4a003d2fbdc1f9be78537756ab5bbe4fe9af5d785d0128171c90d9900ce2532b0f9d01c4b45294fbba468df3e1b393cb4e62e754598e47df6bd06431c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addb7b9aee813df534aac4b3093c91b8068cd84990453f006694d461b76a58d88cf0f520310a1e9fdc18cde98d662eee077515d0a8811922929e085392ab3d1311b8243266d87047f601fa88a0da36b9f302e8262395174328f2482d14008de83070744f143fdec90ba5a82668d5fac114c13955ad6dca5db2231d8ba14c54c47ed04a4b4ace17e357e1d6432399f87a7a14245bbd796a09313b247b95d37ff40a404bdad74bd20000000000000000000099fef7cd7af3ce64a92f95d89d125b1e641240d7e5e27a3d1f7684448c3e3822d617e205061298b939a191be4b48e169bde2cae3accc5bd40a2968b59c93d35f8e42366fdef9a2abae1cf01ce68abff26b61aac8aaa54ebbcefd23f21ce8153b9926e12e925cb56119df72c7533a48d028ad0c74e2a9478fa3ba18a1a2b65079cc1c7bc46dd12305a1ae9dd19e8d525206c0a728cfd42193abe8130bc01a2d69841f3d7799ac04bdc590bb1c89b9c695f163e57343c9bfb59909433c9001c5f8b23e26534a538fc933cac6c2a92d038df638a0f226df9fb857bd414c2cd69985e8053e3dfa41614d7c74d04d8c2471041d17c730fad28395f8d4688898cd58b9d600c851626529bb58aa364b55e73f053450665e7b94ad1012fd7a8139166fd5e59c84f4ab279b1b99c028db4cb9680c8035f967db18de738844da7e260a830c1ffa49f5af3c15423a0e315acb82a3e89218cb314e68fda4d94aa1d815babc13b9fd336dfaa6d5d164301190bc2d4c04087729033342045804a28082abc3b4762302a271722fb515f31e0dd115a292f1e68481a62c49d15ea5460a29c60b1058fb7aa9bf4ee3cbe11b03711a15d730646b72d074dab1e8c429339f3460d324c17a4a8bfc7d7eab45bef00664d6dc82300000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x200, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETSTEERINGEBPF(r7, 0x800454e0, &(0x7f0000000080)=r6) close(r7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r5}, 0x18) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r8, 0x0) 1.398961728s ago: executing program 8 (id=6248): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) io_uring_setup(0x192, &(0x7f0000000300)={0x0, 0x4178, 0x400, 0x8000002, 0x3d7}) r0 = syz_clone(0x48000, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) 1.306604559s ago: executing program 8 (id=6250): faccessat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x5) 1.305836899s ago: executing program 8 (id=6252): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=0xffffffffffffffff], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0x3f, &(0x7f0000000600)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES64=0x0, @ANYRESOCT=r2, @ANYRESDEC=r1, @ANYRES8=r0, @ANYRES64], 0x0, 0x1, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x51, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) unshare(0x44040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb, 0x8031, 0xffffffffffffffff, 0xc6ed4000) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000000)='./file0\x00', 0x1018000, &(0x7f00000003c0)=ANY=[@ANYRES8=0x0, @ANYRES16, @ANYRES16=0x0, @ANYRESOCT, @ANYRES32, @ANYRESDEC], 0x4, 0x2ee, &(0x7f00000006c0)="$eJzs3M9PE1sUwPHTH5S2BMri5b28l7xwoxvdTKC6VhoDibGJBKnxR2IywFSbji2ZaTA1RnTl1vhHuCAs2ZEo/wAbd7px446NiQtZGMd0OkNpGUBKaRG+n4TMYe49nXtnBnLuhGHzzuvHxbyt5fWKhONKQiIiWyLDEhZfyNuG3TgmO72QiwPfPv5/6+69G5lsdmJaqcnMzKW0Umpo5N2TZwmv21q/bAw/2Pya/rLx98a/mz9nHhVsVbBVqVxRupotf67os6ah5gt2UVNqyjR021CFkm1Y9fZyvT1vlhcWqkovzQ8mFyzDtpVeqqqiUVWVsqpYVRV5qBdKStM0NZgUHCS3PD2tZ9pMnuvwYHBMLCujR0Qksaslt9yTAQEAgJ5qrf/DojpZ/6+cW68M3F4d8ur/tVhQ/X/5U/2zmur/uIgE1v/+8QPrf/1w9f/uiuhsOVL9j5NhJLZrV6gR1hqtjJ70fn5dL++vjLoB9T8AAAAAAAAAAAAAAAAAAAAAAH+CLcdJOY6T8rf+V7+IxEXE/z4gNSIiV3swZHTQEa4/ToHGi3vRIRHz1WJuMVffeh3WRcQUQ0YlJT/c+8FTi/03j1TNsLw3l7z8pcVcxG3J5KXg5o9Jqk9a8x1n8np2YkzVNef3SXJnflpS8ldwfjowPyYXzu/I1yQlH+akLKbMu+No5D8fU+razWxLfsLtBwAAAADAaaCpbYHrd03bq72ev72+bn0+EGmsr0cD1+dR+S/a27kDAAAAAHBW2NWnRd00DWufICEH92k/iB7TJ/sz/N0s/28Zjm+m+wT+wZua4t7Ojp+W0CFOyx5BWNrJGqnNRh11Fv5jo736yNR4965g0zD+efP2e+cOcWU1fsBM2w8i+98AfV37BQQAAACgaxpFv79nvLcDAgAAAAAAAAAAAAAAAAAAAAAAAAAAAADgDOrGv0nr9RwBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAk+JXAAAA//+qDgR1") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040), 0x208e24b) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x1, 0x0) socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r5, 0x0) fdatasync(r5) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) getrandom(&(0x7f0000000240)=""/286, 0xffffff9a, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0x61, '\x00', r7, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000031c0)=[{{&(0x7f0000000040)={0xa, 0x4e23, 0xfffffff7, @loopback={0xfeffffffffffffff}, 0xce02}, 0x1c, 0x0}}], 0x1, 0x4000000) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd\x00') 1.169011831s ago: executing program 6 (id=6256): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x75, 0x109301) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[], 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r3}, 0x0, &(0x7f0000000340)=r4}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r5}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)=ANY=[@ANYBLOB="4400000010004b0400000000000000007a000000", @ANYRES32=0x0, @ANYBLOB="00000000f0816f385c65c600000040240012800b000443d21d1613fcf1f0ff00010808040000000000707da791071540a66f02664d8d40b6125c903752ff6452f4c4d80a0b74a1f80476cd71d370b3b4b7cc"], 0x44}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=ANY=[@ANYBLOB="3400000010001fff000000000800000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800900010076657468"], 0x34}}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000640)={0x2, 0x3, 0x0, 0x3, 0xd, 0x0, 0x700, 0x0, [@sadb_key={0x3, 0x9, 0x80, 0x0, "e925051abca75b82aed73e97b853c160"}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @private}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd, 0xfffffffb}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xd}}}]}, 0x68}, 0x1, 0x7}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file2\x00', 0x2000410, &(0x7f0000000080), 0x81, 0x7a5, &(0x7f0000000f80)="$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") r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x143042, 0x0) r10 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), r1) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f00000007c0)={0x178, r10, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x164, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xd0, 0x3, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/ptmx\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffeb}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '.\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/ptmx\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '/dev/ptmx\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x11, 0x2, '*&:\xd1+(\\)#%[-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '-}!2+!*)(\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffff95}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_VALUE={0x45, 0x4, "8d0a737ec30a53d3daf4e5d6e49ed4c231b9bfe1a352a66a376d21d5a842e5e6ed59c6366bcaf99b342e9599267396c5aaa8da6d46bef02aff91cfb81d75b43060"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x3d, 0x4, "34301628cc9064fb8ff36f861de7b4fac0174e7a2b9e5aabc1ce842a5ccb9dbde135f550836573641aaed95b96bc4081713086b542e4d6e047"}]}]}, 0x178}}, 0x80) sendfile(r9, r9, 0x0, 0x7a680000) truncate(&(0x7f0000000200)='./file2\x00', 0x7) bind$netlink(r8, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r8, 0x1, 0x8, &(0x7f0000000000), 0x4) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000006c0)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x70, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x20cb3a, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1.062183213s ago: executing program 2 (id=6258): r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x32}}, 0x10) r1 = socket$igmp(0x2, 0x3, 0x2) bind$tipc(0xffffffffffffffff, &(0x7f0000000100)=@name={0x1e, 0x2, 0x0, {{0x42}}}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0x4, &(0x7f0000000240)=ANY=[@ANYRES8], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x44, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r4 = socket(0x40000000015, 0x5, 0x0) r5 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x100000, 0x0, 0xbf, 0x6, 0x3, 0x10, 0x60ea, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x80}, 0x1, 0x7}, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_LNSMODE(r4, 0x111, 0x4, 0x0, 0x4) getresuid(&(0x7f0000000380), &(0x7f00000001c0), &(0x7f0000000400)=0x0) quotactl$Q_QUOTAON(0xffffffff80000200, &(0x7f0000000040)=@nullb, r7, &(0x7f0000000280)='./file0\x00') setsockopt$SO_RDS_TRANSPORT(r4, 0x114, 0x8, &(0x7f00000008c0), 0x4) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c500000001f0ffff95"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000440)='mm_page_free\x00', r8, 0x0, 0x1000}, 0x18) syz_emit_ethernet(0xfdef, &(0x7f0000000640)=ANY=[@ANYRES16=r1, @ANYRESDEC=r7, @ANYBLOB="f96a73cedc5af3e4abc4e3660073fd7c71acc71e55b765ed14336c7e90560c7a39ae", @ANYRESHEX=r0, @ANYBLOB="eaf65ce6b103d7d5761c78e6fa8a0f03d81ab5bb93a7", @ANYRES8=r2, @ANYRES16=r3, @ANYRESHEX, @ANYRES64=r5], 0x0) r9 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$FIONREAD(r9, 0x541b, &(0x7f0000000080)) openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000de0000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x9, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r10}, 0x10) r11 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000005000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000440)={'bond_slave_0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000300)='kfree\x00', r12}, 0x18) r13 = ioctl$LOOP_CTL_GET_FREE(r11, 0x4c82) ioctl$LOOP_CTL_REMOVE(r11, 0x4c81, r13) 1.007113664s ago: executing program 2 (id=6260): ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x80, {0x0, 0x0, 0x0, 0x0, 0x1503}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r0}, @IFLA_MASTER={0x8, 0xa, r0}]}, 0x44}, 0x1, 0x0, 0x0, 0x4001}, 0x0) 935.584075ms ago: executing program 2 (id=6262): move_pages(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x2) 906.035885ms ago: executing program 6 (id=6263): faccessat(0xffffffffffffffff, 0x0, 0x5) 889.905145ms ago: executing program 2 (id=6264): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000fb"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)=ANY=[@ANYBLOB="440000001000090600"/20, @ANYRES32=0x0, @ANYBLOB="adffa888000000001c00128009000100626f6e64000000000c000280050001000600000008000a0079"], 0x44}}, 0x0) 807.128567ms ago: executing program 6 (id=6265): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000002e00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002d80)}}], 0x1, 0x41, 0x0) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000200)='./file0\x00', 0x800, &(0x7f00000005c0)=ANY=[@ANYRES16, @ANYRESOCT=0x0, @ANYRESHEX=r0, @ANYRES16], 0x1, 0x36e, &(0x7f0000000c00)="$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") r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) io_setup(0x7d, &(0x7f0000000600)=0x0) io_submit(r2, 0x2, &(0x7f0000001d00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000)="96", 0xffffff20}, &(0x7f0000000740)={0x0, 0x0, 0x41, 0x3, 0x0, r1, 0x0, 0x0, 0xffffffffffffffff}]) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) io_pgetevents(r2, 0x2, 0x8, &(0x7f0000001080)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000380)={0x0, 0x3938700}, &(0x7f00000011c0)={&(0x7f0000001180)={[0x7f]}, 0x8}) 622.29874ms ago: executing program 2 (id=6266): r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0xa, r0, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000000)='id:cb2e') 600.70272ms ago: executing program 6 (id=6267): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000006c0)='kfree\x00', r1}, 0x18) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="480000001000030500"/20, @ANYBLOB="0000000000000000280012800b0001006d61637365630000180002800c0004000100000100c28000050003"], 0x48}}, 0x40000) 579.38476ms ago: executing program 2 (id=6268): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=0xffffffffffffffff], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0x3f, &(0x7f0000000600)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES64=0x0, @ANYRESOCT=r2, @ANYRESDEC=r1, @ANYRES8=r0, @ANYRES64], 0x0, 0x1, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x51, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) unshare(0x44040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb, 0x8031, 0xffffffffffffffff, 0xc6ed4000) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000000)='./file0\x00', 0x1018000, &(0x7f00000003c0)=ANY=[@ANYRES8=0x0, @ANYRES16, @ANYRES16=0x0, @ANYRESOCT, @ANYRES32, @ANYRESDEC], 0x4, 0x2ee, &(0x7f00000006c0)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000040), 0x208e24b) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x1, 0x0) socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r5, 0x0) fdatasync(r5) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) getrandom(&(0x7f0000000240)=""/286, 0xffffff9a, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0x61, '\x00', r7, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r9 = socket$inet6(0xa, 0x80002, 0x0) sendmmsg$inet6(r9, &(0x7f00000031c0)=[{{&(0x7f0000000040)={0xa, 0x4e23, 0xfffffff7, @loopback={0xfeffffffffffffff}, 0xce02}, 0x1c, 0x0}}], 0x1, 0x4000000) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='fd\x00') 501.736352ms ago: executing program 6 (id=6269): pipe2$9p(0x0, 0x80080) rt_sigprocmask(0x0, &(0x7f0000000200)={[0xfffff7feffff7ffb]}, 0x0, 0x8) r0 = gettid() tkill(r0, 0x32) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f0000000300)={&(0x7f0000000100), 0x8}) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @loopback}, 0x62) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000ee1c73dfd9094bbc7744fefebaec04d5869f29cd05912147e7ae09517937fcaa5e28f33e5baa1556a52e0f2de5c5ae14af6d90d1da22404fffa5477757118955d9df52b17f47c5ea02a7755c80157a349786a8d18ea111f0970269344efc334859da098ee47431f75c23d1a420"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000000)=0x9, 0x8, 0x0) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000180)=r0) 441.813212ms ago: executing program 6 (id=6270): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000240)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x69, 0x7ffc0005}]}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x121301, 0x0) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[], 0xff2e) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f00000003c0), 0x5, r2}, 0x38) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount$cgroup(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0), 0x2010042, &(0x7f0000000000)={[{@subsystem='hugetlb'}, {@subsystem='memory'}, {@subsystem='cpuacct'}]}) mount(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2026020, &(0x7f0000000000)) r3 = getpid() syz_open_procfs(r3, &(0x7f0000000080)='fdinfo/3\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00'}, 0x10) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0xfffffffe, 0x6, 0x0, 0x0, "000038d4583b2e1e63a22300"}) r4 = syz_open_pts(r0, 0x0) ioctl$TCFLSH(r4, 0x540b, 0x2) 441.068873ms ago: executing program 5 (id=6271): socket$inet_udp(0x2, 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000003940)=ANY=[@ANYBLOB="210000000000000000000000000010000004"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r1}, &(0x7f0000000000), &(0x7f00000005c0)=r2}, 0x20) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x2000003, 0x51, r0, 0x21cb9000) r3 = fsopen(&(0x7f0000001340)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) r4 = fsmount(r3, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) openat$cgroup_procs(r4, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_COMPAT={0x2c, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_IPV4={0x8, 0x1, 0x1, 0x0, 0x5e}, @NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0x88be}, @NFTA_RULE_COMPAT_PROTO_IPV4={0x8, 0x1, 0x1, 0x0, 0x6c}, @NFTA_RULE_COMPAT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_RULE_COMPAT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x3}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x40000) 367.181074ms ago: executing program 5 (id=6272): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a0000000400ff0f000000", @ANYRES32, @ANYBLOB="0300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0x20000000000000f4, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r2, &(0x7f0000000140)='Q', 0x1, 0x200980) ioctl$KDADDIO(r2, 0x4b34, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r3}, &(0x7f0000000000), &(0x7f00000005c0)=r4}, 0x20) r5 = inotify_init() r6 = creat(&(0x7f0000000100)='./file0\x00', 0xd931d3864d39dcca) r7 = inotify_add_watch(r5, &(0x7f0000000240)='./file0\x00', 0x8c7) write$binfmt_elf32(r6, &(0x7f0000000040)=ANY=[@ANYRES64=r7], 0x69) close(r6) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 224.700986ms ago: executing program 5 (id=6273): ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x80, {0x0, 0x0, 0x0, 0x0, 0x1503}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r0}, @IFLA_MASTER={0x8, 0xa, r0}]}, 0x44}, 0x1, 0x0, 0x0, 0x4001}, 0x0) 110.987308ms ago: executing program 5 (id=6274): move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) 90.187588ms ago: executing program 5 (id=6275): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'sit0\x00', 0x0}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000480), r4) sendmsg$NL80211_CMD_GET_WIPHY(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="59bb22bd7000000020001100000008002b01"], 0x28}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, r2, {0x0, 0x6}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9}, {0x14, 0x2, [@TCA_GRED_DPS={0x10, 0x3, {0x10, 0x1}}]}}, @TCA_RATE={0x6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000801}, 0x0) 27.750869ms ago: executing program 8 (id=6276): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)=ANY=[@ANYBLOB="440000001000090600"/20, @ANYRES32=0x0, @ANYBLOB="adffa888000000001c00128009000100626f6e64000000000c000280050001000600000008000a0079"], 0x44}}, 0x0) 0s ago: executing program 5 (id=6277): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000002e00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002d80)=[@cred={{0x1c}}], 0x20}}], 0x1, 0x41, 0x0) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000200)='./file0\x00', 0x800, &(0x7f00000005c0)=ANY=[@ANYRES16, @ANYRESOCT=0x0, @ANYRESHEX=r0, @ANYRES16], 0x1, 0x36e, &(0x7f0000000c00)="$eJzs3c9rI2UYwPEnaZpMumyTgygK0ge96GVoq2c1yC6IAZfuRtwVhNntREPGpMyESERsPXkVb/4DgsseFzwsqP9AL97WixdP9iIIuog4Mr/SJJ00aTZL0/b7gTZP8r7PzPvmF88byJuD9776uFn3zLrVkayhkhEReSRSlqwkMtFFXlLsycuX/nz4/PWbt96uVKtXtlSvVm68sqmqq2s/fPJZMe72oCD75Q8OxPht/+n9Zw/+u/FRw9OGp612Ry293f61Y912bN1ueE1T9ZpjW56tjZZnu1F7O2qvO+2dnZ5are3LKzuu7XlqtXratHvaaWvH7an1odVoqWmaenklbbjnmDFDTu3u1pZVmfGEd2bMw7z94/v+Mc2uW7GWRMzikZba3Sc6LgAAsJBG6v9vkhqhLNl+QZmJ1wL5MB5eBgT1fxKH9X+wWDis/++98FPn0rv3V+P6/0E+rf5/9Zcof6j+D84+9/r/u5HrRyuiM2/3JJ0fq/7HYlgbfkX+frhijwX1f/Bq6K/ov3j/3noYUP8DAAAAAAAAAAAAAAAAAAAAAHAWPPL9ku/7peQy+Tv8CkF8Pbl23BeNceaMe/wL8Y4C/ecDzqXrN2+JEX5xL7cq4nzZrXVr0WXcnnRcl5L8Gz4fYtGGE3thowbK8qOz260txwlL4f+KiIojtmxIScpD+WF89a3qlQ2NRPnh+Xe7tUxuJcivSyPM35SSPJWev5man5eXXhzIN6UkP9+RtjiyHb+PJfmfb6i++U51JL8Y9kvz+pN9SAAAAAAAmDtT1YiXz+Xh9W+0fjdN1bT2YC0vg+vzo58P9NfX66nr81zpudzpzh0AAAAAgIvCy3/atBzHdr3e2KAok/oU4qONNOVkwpGDIDdFn6HgYRgsH9dnaWCG0x45H/+CxrTDcL2eTD3mJPirIKl3ZrKF61CTkX6vThkk85+is3HSh8D1siefu+16a8F4dKbpDATJx0bj+si1WY88Lkh2zp3U+Zmvv/17tlNk4l17B5teu29MmGkYZEZu2ZvwpP3D9yeOZzn93eL7WX5kBgAAAMCCSIr+opfc8sbpDggAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAtortukjQlOe44AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAovg/AAD//5h69bA=") r1 = creat(0x0, 0x0) io_setup(0x7d, &(0x7f0000000600)=0x0) io_submit(r2, 0x2, &(0x7f0000001d00)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000)="96", 0xffffff20}, &(0x7f0000000740)={0x0, 0x0, 0x41, 0x3, 0x0, r1, 0x0, 0x0, 0xffffffffffffffff}]) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) io_pgetevents(r2, 0x2, 0x8, &(0x7f0000001080)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000380)={0x0, 0x3938700}, &(0x7f00000011c0)={&(0x7f0000001180)={[0x7f]}, 0x8}) kernel console output (not intermixed with test programs): DX: 0000000000000000 RSI: 000000000000033c RDI: 0000000000000010 [ 334.535574][T18117] RBP: 00007fb36909f090 R08: 0000000000000000 R09: 0000000000000000 [ 334.535622][T18117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 334.535633][T18117] R13: 0000000000000000 R14: 00007fb36ac55fa0 R15: 00007ffd94a018f8 [ 334.535650][T18117] [ 334.812244][T18131] __nla_validate_parse: 2 callbacks suppressed [ 334.812264][T18131] netlink: 36 bytes leftover after parsing attributes in process `syz.5.5427'. [ 334.828100][T18131] netlink: 4 bytes leftover after parsing attributes in process `syz.5.5427'. [ 334.861159][T18131] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18131 comm=syz.5.5427 [ 335.420707][T18143] A link change request failed with some changes committed already. Interface dummy0 may have been left with an inconsistent configuration, please check. [ 335.885351][T18161] netlink: 36 bytes leftover after parsing attributes in process `syz.6.5438'. [ 335.897962][T18161] netlink: 4 bytes leftover after parsing attributes in process `syz.6.5438'. [ 335.942579][T18161] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18161 comm=syz.6.5438 [ 336.006411][T18167] smc: net device bond0 applied user defined pnetid SYZ0 [ 336.014124][T18167] smc: net device bond0 erased user defined pnetid SYZ0 [ 336.103593][T18068] netdevsim netdevsim8 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 336.122941][T18068] netdevsim netdevsim8 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 336.142431][T18165] bond1: entered promiscuous mode [ 336.148756][T18165] bond1: entered allmulticast mode [ 336.154351][T18165] 8021q: adding VLAN 0 to HW filter on device bond1 [ 336.165978][T18165] bond1 (unregistering): Released all slaves [ 336.178005][T18068] netdevsim netdevsim8 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 336.186753][T18174] netlink: 'syz.6.5444': attribute type 15 has an invalid length. [ 336.198127][T18068] netdevsim netdevsim8 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 336.333044][T18187] xt_socket: unknown flags 0xc [ 336.346833][T18187] netlink: 28 bytes leftover after parsing attributes in process `syz.5.5450'. [ 336.413521][T18197] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 336.460418][T18201] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 336.479032][T18197] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 336.548173][T18197] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 336.576164][T18199] bond1: entered promiscuous mode [ 336.581305][T18199] bond1: entered allmulticast mode [ 336.586927][T18199] 8021q: adding VLAN 0 to HW filter on device bond1 [ 336.598439][T18199] bond1 (unregistering): Released all slaves [ 336.610150][T18197] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 336.700063][T18197] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 336.725133][T18197] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 336.737837][T18197] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 336.757909][T18218] FAULT_INJECTION: forcing a failure. [ 336.757909][T18218] name failslab, interval 1, probability 0, space 0, times 0 [ 336.770466][T18197] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 336.773433][T18218] CPU: 1 UID: 0 PID: 18218 Comm: syz.2.5463 Not tainted 6.14.0-syzkaller-09584-g7d06015d936c #0 PREEMPT(voluntary) [ 336.773471][T18218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 336.773488][T18218] Call Trace: [ 336.773496][T18218] [ 336.773504][T18218] dump_stack_lvl+0xf6/0x150 [ 336.773560][T18218] dump_stack+0x15/0x1a [ 336.773582][T18218] should_fail_ex+0x261/0x270 [ 336.773623][T18218] should_failslab+0x8f/0xb0 [ 336.773729][T18218] kmem_cache_alloc_node_noprof+0x5c/0x340 [ 336.773773][T18218] ? __alloc_skb+0x10d/0x320 [ 336.773807][T18218] __alloc_skb+0x10d/0x320 [ 336.773837][T18218] netlink_alloc_large_skb+0xad/0xe0 [ 336.773866][T18218] netlink_sendmsg+0x3da/0x720 [ 336.773963][T18218] ? __pfx_netlink_sendmsg+0x10/0x10 [ 336.773995][T18218] __sock_sendmsg+0x140/0x180 [ 336.774019][T18218] ____sys_sendmsg+0x350/0x4e0 [ 336.774058][T18218] __sys_sendmsg+0x1a0/0x240 [ 336.774101][T18218] __x64_sys_sendmsg+0x46/0x50 [ 336.774127][T18218] x64_sys_call+0x26f3/0x2e10 [ 336.774226][T18218] do_syscall_64+0xc9/0x1c0 [ 336.774261][T18218] ? clear_bhb_loop+0x25/0x80 [ 336.774289][T18218] ? clear_bhb_loop+0x25/0x80 [ 336.774317][T18218] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 336.774351][T18218] RIP: 0033:0x7fb36aa3d169 [ 336.774440][T18218] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 336.774464][T18218] RSP: 002b:00007fb36909f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 336.774487][T18218] RAX: ffffffffffffffda RBX: 00007fb36ac55fa0 RCX: 00007fb36aa3d169 [ 336.774504][T18218] RDX: 0000000000000000 RSI: 000020000000c2c0 RDI: 0000000000000007 [ 336.774519][T18218] RBP: 00007fb36909f090 R08: 0000000000000000 R09: 0000000000000000 [ 336.774534][T18218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 336.774549][T18218] R13: 0000000000000000 R14: 00007fb36ac55fa0 R15: 00007ffd94a018f8 [ 336.774572][T18218] [ 337.362370][T18236] bond1: entered promiscuous mode [ 337.367529][T18236] bond1: entered allmulticast mode [ 337.373275][T18236] 8021q: adding VLAN 0 to HW filter on device bond1 [ 337.393869][T18247] FAULT_INJECTION: forcing a failure. [ 337.393869][T18247] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 337.398454][T18236] bond1 (unregistering): Released all slaves [ 337.407159][T18247] CPU: 1 UID: 0 PID: 18247 Comm: syz.8.5474 Not tainted 6.14.0-syzkaller-09584-g7d06015d936c #0 PREEMPT(voluntary) [ 337.407196][T18247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 337.407212][T18247] Call Trace: [ 337.407218][T18247] [ 337.407225][T18247] dump_stack_lvl+0xf6/0x150 [ 337.407247][T18247] dump_stack+0x15/0x1a [ 337.407338][T18247] should_fail_ex+0x261/0x270 [ 337.407378][T18247] should_fail+0xb/0x10 [ 337.407412][T18247] should_fail_usercopy+0x1a/0x20 [ 337.407467][T18247] _copy_from_user+0x1c/0xa0 [ 337.407495][T18247] do_ipv6_setsockopt+0x1d6/0x2240 [ 337.407529][T18247] ? kstrtoull+0x115/0x140 [ 337.407585][T18247] ? kstrtouint+0x7b/0xc0 [ 337.407619][T18247] ? __rcu_read_unlock+0x4e/0x70 [ 337.407652][T18247] ? avc_has_perm_noaudit+0x1cc/0x210 [ 337.407696][T18247] ? selinux_netlbl_socket_setsockopt+0xea/0x2d0 [ 337.407755][T18247] ? avc_has_perm+0xd6/0x150 [ 337.407798][T18247] ipv6_setsockopt+0x57/0x130 [ 337.407832][T18247] rawv6_setsockopt+0x23d/0x460 [ 337.407870][T18247] sock_common_setsockopt+0x64/0x80 [ 337.407898][T18247] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 337.407927][T18247] __sys_setsockopt+0x187/0x200 [ 337.407962][T18247] __x64_sys_setsockopt+0x66/0x80 [ 337.408010][T18247] x64_sys_call+0x2a09/0x2e10 [ 337.408065][T18247] do_syscall_64+0xc9/0x1c0 [ 337.408179][T18247] ? clear_bhb_loop+0x25/0x80 [ 337.408207][T18247] ? clear_bhb_loop+0x25/0x80 [ 337.408235][T18247] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 337.408298][T18247] RIP: 0033:0x7fddfef3d169 [ 337.408317][T18247] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 337.408341][T18247] RSP: 002b:00007fddfd59f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 337.408389][T18247] RAX: ffffffffffffffda RBX: 00007fddff155fa0 RCX: 00007fddfef3d169 [ 337.408405][T18247] RDX: 0000000000000039 RSI: 0000000000000029 RDI: 0000000000000003 [ 337.408420][T18247] RBP: 00007fddfd59f090 R08: 0000000000000080 R09: 0000000000000000 [ 337.408436][T18247] R10: 00002000000001c0 R11: 0000000000000246 R12: 0000000000000001 [ 337.408452][T18247] R13: 0000000000000000 R14: 00007fddff155fa0 R15: 00007ffe8a5ffa58 [ 337.408476][T18247] [ 337.663662][T18252] netdevsim netdevsim8 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 337.709454][T18252] netdevsim netdevsim8 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 337.786075][T18252] netdevsim netdevsim8 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 337.869415][T18267] FAULT_INJECTION: forcing a failure. [ 337.869415][T18267] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 337.882612][T18267] CPU: 0 UID: 0 PID: 18267 Comm: syz.0.5483 Not tainted 6.14.0-syzkaller-09584-g7d06015d936c #0 PREEMPT(voluntary) [ 337.882646][T18267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 337.882680][T18267] Call Trace: [ 337.882688][T18267] [ 337.882696][T18267] dump_stack_lvl+0xf6/0x150 [ 337.882787][T18267] dump_stack+0x15/0x1a [ 337.882803][T18267] should_fail_ex+0x261/0x270 [ 337.882833][T18267] should_fail+0xb/0x10 [ 337.882865][T18267] should_fail_usercopy+0x1a/0x20 [ 337.882946][T18267] _copy_from_user+0x1c/0xa0 [ 337.882972][T18267] simple_transaction_get+0xef/0x130 [ 337.883004][T18267] selinux_transaction_write+0x86/0x100 [ 337.883059][T18267] ? __pfx_selinux_transaction_write+0x10/0x10 [ 337.883091][T18267] vfs_write+0x295/0x950 [ 337.883125][T18267] ? __fget_files+0x186/0x1c0 [ 337.883148][T18267] ? __fget_files+0x186/0x1c0 [ 337.883176][T18267] __x64_sys_pwrite64+0xfb/0x150 [ 337.883201][T18267] x64_sys_call+0xab9/0x2e10 [ 337.883222][T18267] do_syscall_64+0xc9/0x1c0 [ 337.883296][T18267] ? clear_bhb_loop+0x25/0x80 [ 337.883322][T18267] ? clear_bhb_loop+0x25/0x80 [ 337.883349][T18267] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 337.883467][T18267] RIP: 0033:0x7f7fbbdbd169 [ 337.883486][T18267] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 337.883508][T18267] RSP: 002b:00007f7fba427038 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 337.883529][T18267] RAX: ffffffffffffffda RBX: 00007f7fbbfd5fa0 RCX: 00007f7fbbdbd169 [ 337.883546][T18267] RDX: 000000000000003f RSI: 0000200000000000 RDI: 0000000000000005 [ 337.883557][T18267] RBP: 00007f7fba427090 R08: 0000000000000000 R09: 0000000000000000 [ 337.883595][T18267] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001 [ 337.883610][T18267] R13: 0000000000000000 R14: 00007f7fbbfd5fa0 R15: 00007fffab734158 [ 337.883633][T18267] [ 337.887280][T18252] netdevsim netdevsim8 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 338.142601][T18271] ip6gre1: entered allmulticast mode [ 338.238852][T18280] FAULT_INJECTION: forcing a failure. [ 338.238852][T18280] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 338.252106][T18280] CPU: 1 UID: 0 PID: 18280 Comm: syz.6.5486 Not tainted 6.14.0-syzkaller-09584-g7d06015d936c #0 PREEMPT(voluntary) [ 338.252140][T18280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 338.252155][T18280] Call Trace: [ 338.252164][T18280] [ 338.252173][T18280] dump_stack_lvl+0xf6/0x150 [ 338.252201][T18280] dump_stack+0x15/0x1a [ 338.252282][T18280] should_fail_ex+0x261/0x270 [ 338.252321][T18280] should_fail+0xb/0x10 [ 338.252354][T18280] should_fail_usercopy+0x1a/0x20 [ 338.252386][T18280] _copy_from_user+0x1c/0xa0 [ 338.252486][T18280] sctp_getsockopt_connectx3+0x193/0x350 [ 338.252527][T18280] sctp_getsockopt+0x805/0xab0 [ 338.252551][T18280] sock_common_getsockopt+0x5b/0x70 [ 338.252646][T18280] ? __pfx_sock_common_getsockopt+0x10/0x10 [ 338.252669][T18280] do_sock_getsockopt+0x1fc/0x290 [ 338.252698][T18280] __x64_sys_getsockopt+0x191/0x210 [ 338.252787][T18280] x64_sys_call+0x128f/0x2e10 [ 338.252813][T18280] do_syscall_64+0xc9/0x1c0 [ 338.252842][T18280] ? clear_bhb_loop+0x25/0x80 [ 338.252865][T18280] ? clear_bhb_loop+0x25/0x80 [ 338.252959][T18280] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 338.252983][T18280] RIP: 0033:0x7f4c6593d169 [ 338.253035][T18280] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 338.253072][T18280] RSP: 002b:00007f4c63f86038 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 338.253156][T18280] RAX: ffffffffffffffda RBX: 00007f4c65b56080 RCX: 00007f4c6593d169 [ 338.253168][T18280] RDX: 000000000000006f RSI: 0000000000000084 RDI: 0000000000000003 [ 338.253182][T18280] RBP: 00007f4c63f86090 R08: 0000200000000180 R09: 0000000000000000 [ 338.253254][T18280] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 338.253267][T18280] R13: 0000000000000000 R14: 00007f4c65b56080 R15: 00007fff327bc9a8 [ 338.253290][T18280] [ 338.453557][T18279] atomic_op ffff88815b86e128 conn xmit_atomic 0000000000000000 [ 338.570264][T18290] netlink: 28 bytes leftover after parsing attributes in process `syz.2.5493'. [ 338.668428][T18297] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 338.958967][T18309] IPv6: NLM_F_CREATE should be specified when creating new route [ 339.018496][ T29] kauditd_printk_skb: 258 callbacks suppressed [ 339.018514][ T29] audit: type=1326 audit(2000000004.546:13282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18312 comm="syz.5.5500" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7800d5d169 code=0x7ffc0000 [ 339.053565][ T29] audit: type=1326 audit(2000000004.546:13283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18312 comm="syz.5.5500" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7800d5d169 code=0x7ffc0000 [ 339.077464][ T29] audit: type=1326 audit(2000000004.546:13284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18312 comm="syz.5.5500" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7800d5d169 code=0x7ffc0000 [ 339.101506][ T29] audit: type=1326 audit(2000000004.546:13285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18312 comm="syz.5.5500" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7800d5d169 code=0x7ffc0000 [ 339.125201][ T29] audit: type=1326 audit(2000000004.546:13286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18312 comm="syz.5.5500" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7800d5d169 code=0x7ffc0000 [ 339.149221][ T29] audit: type=1326 audit(2000000004.546:13287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18312 comm="syz.5.5500" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7800d5d169 code=0x7ffc0000 [ 339.173183][ T29] audit: type=1326 audit(2000000004.546:13288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18312 comm="syz.5.5500" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7800d5d169 code=0x7ffc0000 [ 339.197069][ T29] audit: type=1326 audit(2000000004.546:13289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18312 comm="syz.5.5500" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7800d5d169 code=0x7ffc0000 [ 339.220826][ T29] audit: type=1326 audit(2000000004.546:13290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18312 comm="syz.5.5500" exe="/root/syz-executor" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f7800d5d169 code=0x7ffc0000 [ 339.244333][ T29] audit: type=1326 audit(2000000004.546:13291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18312 comm="syz.5.5500" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7800d5d169 code=0x7ffc0000 [ 339.469929][T18325] xt_socket: unknown flags 0xc [ 339.532237][ T9] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 339.541417][ T9] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz1] on syz0 [ 339.983299][T18352] xt_socket: unknown flags 0xc [ 340.474962][T18376] smc: net device bond0 applied user defined pnetid SYZ0 [ 340.483009][T18376] smc: net device bond0 erased user defined pnetid SYZ0 [ 340.523170][T18378] xt_socket: unknown flags 0xc [ 340.865491][T18389] netlink: 8 bytes leftover after parsing attributes in process `syz.6.5534'. [ 340.943707][T18252] netdevsim netdevsim8 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 340.983243][T18252] netdevsim netdevsim8 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 341.027469][T18252] netdevsim netdevsim8 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 341.067673][T18252] netdevsim netdevsim8 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 341.131510][T18395] netlink: 36 bytes leftover after parsing attributes in process `syz.6.5537'. [ 341.185505][T18395] netlink: 4 bytes leftover after parsing attributes in process `syz.6.5537'. [ 341.247621][T18395] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18395 comm=syz.6.5537 [ 341.284079][T18399] FAULT_INJECTION: forcing a failure. [ 341.284079][T18399] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 341.297361][T18399] CPU: 0 UID: 0 PID: 18399 Comm: syz.8.5540 Not tainted 6.14.0-syzkaller-09584-g7d06015d936c #0 PREEMPT(voluntary) [ 341.297393][T18399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 341.297409][T18399] Call Trace: [ 341.297416][T18399] [ 341.297424][T18399] dump_stack_lvl+0xf6/0x150 [ 341.297517][T18399] dump_stack+0x15/0x1a [ 341.297534][T18399] should_fail_ex+0x261/0x270 [ 341.297566][T18399] should_fail+0xb/0x10 [ 341.297593][T18399] should_fail_usercopy+0x1a/0x20 [ 341.297626][T18399] _copy_from_user+0x1c/0xa0 [ 341.297719][T18399] sg_new_write+0x7bd/0x930 [ 341.297762][T18399] sg_ioctl+0xd71/0x18a0 [ 341.297866][T18399] ? __fget_files+0x186/0x1c0 [ 341.297892][T18399] ? __pfx_sg_ioctl+0x10/0x10 [ 341.297920][T18399] __se_sys_ioctl+0xc9/0x140 [ 341.297978][T18399] __x64_sys_ioctl+0x43/0x50 [ 341.298009][T18399] x64_sys_call+0x168d/0x2e10 [ 341.298072][T18399] do_syscall_64+0xc9/0x1c0 [ 341.298101][T18399] ? clear_bhb_loop+0x25/0x80 [ 341.298122][T18399] ? clear_bhb_loop+0x25/0x80 [ 341.298223][T18399] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 341.298243][T18399] RIP: 0033:0x7fddfef3d169 [ 341.298258][T18399] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 341.298275][T18399] RSP: 002b:00007fddfd59f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 341.298315][T18399] RAX: ffffffffffffffda RBX: 00007fddff155fa0 RCX: 00007fddfef3d169 [ 341.298327][T18399] RDX: 0000200000000040 RSI: 0000000000002285 RDI: 0000000000000006 [ 341.298345][T18399] RBP: 00007fddfd59f090 R08: 0000000000000000 R09: 0000000000000000 [ 341.298357][T18399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 341.298369][T18399] R13: 0000000000000000 R14: 00007fddff155fa0 R15: 00007ffe8a5ffa58 [ 341.298387][T18399] [ 341.538232][T18411] netlink: 8 bytes leftover after parsing attributes in process `syz.8.5543'. [ 341.564438][T18411] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 341.621865][T18418] smc: net device bond0 applied user defined pnetid SYZ0 [ 341.629812][T18418] smc: net device bond0 erased user defined pnetid SYZ0 [ 341.721473][T18425] netdevsim netdevsim2 eth3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 341.731456][T18425] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 341.839608][T18425] netdevsim netdevsim2 eth2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 341.849543][T18425] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 341.903965][T18425] netdevsim netdevsim2 eth1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 341.914009][T18425] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 341.997293][T18425] netdevsim netdevsim2 eth0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 342.007118][T18425] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 342.103761][T18425] netdevsim netdevsim2 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 342.112126][T18425] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 342.128208][T18425] netdevsim netdevsim2 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 342.136508][T18425] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 342.152002][T18425] netdevsim netdevsim2 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 342.161615][T18425] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 342.184108][T18425] netdevsim netdevsim2 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 342.193649][T18425] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 342.385455][T18444] netlink: 12 bytes leftover after parsing attributes in process `syz.6.5553'. [ 342.395940][T18442] syzkaller0: entered allmulticast mode [ 342.401985][T18442] syzkaller0: entered promiscuous mode [ 342.409590][T18442] syzkaller0 (unregistering): left promiscuous mode [ 342.416270][T18442] syzkaller0 (unregistering): left allmulticast mode [ 342.507236][T18447] syzkaller0: entered allmulticast mode [ 342.520236][T18447] syzkaller0: entered promiscuous mode [ 342.526366][T18447] FAULT_INJECTION: forcing a failure. [ 342.526366][T18447] name failslab, interval 1, probability 0, space 0, times 0 [ 342.539067][T18447] CPU: 0 UID: 0 PID: 18447 Comm: syz.0.5555 Not tainted 6.14.0-syzkaller-09584-g7d06015d936c #0 PREEMPT(voluntary) [ 342.539099][T18447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 342.539113][T18447] Call Trace: [ 342.539121][T18447] [ 342.539130][T18447] dump_stack_lvl+0xf6/0x150 [ 342.539187][T18447] dump_stack+0x15/0x1a [ 342.539207][T18447] should_fail_ex+0x261/0x270 [ 342.539243][T18447] should_failslab+0x8f/0xb0 [ 342.539264][T18447] kmem_cache_alloc_node_noprof+0x5c/0x340 [ 342.539292][T18447] ? __alloc_skb+0x10d/0x320 [ 342.539357][T18447] __alloc_skb+0x10d/0x320 [ 342.539412][T18447] fdb_notify+0x70/0x120 [ 342.539447][T18447] fdb_delete+0x6c8/0x860 [ 342.539482][T18447] fdb_delete_local+0x225/0x2e0 [ 342.539575][T18447] br_fdb_delete_by_port+0x16c/0x240 [ 342.539609][T18447] br_dev_delete+0x86/0xe0 [ 342.539708][T18447] br_del_bridge+0x99/0xc0 [ 342.539785][T18447] br_ioctl_stub+0x484/0x7d0 [ 342.539806][T18447] ? do_vfs_ioctl+0x977/0x1570 [ 342.539877][T18447] ? __pfx_br_ioctl_stub+0x10/0x10 [ 342.539904][T18447] sock_ioctl+0x330/0x630 [ 342.539992][T18447] ? __pfx_sock_ioctl+0x10/0x10 [ 342.540022][T18447] __se_sys_ioctl+0xc9/0x140 [ 342.540113][T18447] __x64_sys_ioctl+0x43/0x50 [ 342.540152][T18447] x64_sys_call+0x168d/0x2e10 [ 342.540226][T18447] do_syscall_64+0xc9/0x1c0 [ 342.540310][T18447] ? clear_bhb_loop+0x25/0x80 [ 342.540342][T18447] ? clear_bhb_loop+0x25/0x80 [ 342.540364][T18447] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 342.540390][T18447] RIP: 0033:0x7f7fbbdbd169 [ 342.540408][T18447] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 342.540425][T18447] RSP: 002b:00007f7fba427038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 342.540443][T18447] RAX: ffffffffffffffda RBX: 00007f7fbbfd5fa0 RCX: 00007f7fbbdbd169 [ 342.540507][T18447] RDX: 0000200000000040 RSI: 00000000000089a1 RDI: 0000000000000006 [ 342.540519][T18447] RBP: 00007f7fba427090 R08: 0000000000000000 R09: 0000000000000000 [ 342.540530][T18447] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 342.540541][T18447] R13: 0000000000000000 R14: 00007f7fbbfd5fa0 R15: 00007fffab734158 [ 342.540559][T18447] [ 342.915859][T18447] syzkaller0 (unregistering): left promiscuous mode [ 342.922576][T18447] syzkaller0 (unregistering): left allmulticast mode [ 343.091998][T18454] smc: net device bond0 applied user defined pnetid SYZ0 [ 343.099946][T18454] smc: net device bond0 erased user defined pnetid SYZ0 [ 343.116539][T18458] nfs: Unexpected value for 'acl' [ 343.179911][T18462] netdevsim netdevsim2 eth3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 343.190031][T18462] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 343.306994][T18462] netdevsim netdevsim2 eth2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 343.316948][T18462] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 343.439835][T18462] netdevsim netdevsim2 eth1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 343.449723][T18462] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 343.570335][T18462] netdevsim netdevsim2 eth0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 343.580239][T18462] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 344.071978][T18485] FAULT_INJECTION: forcing a failure. [ 344.071978][T18485] name failslab, interval 1, probability 0, space 0, times 0 [ 344.084695][T18485] CPU: 1 UID: 0 PID: 18485 Comm: syz.6.5570 Not tainted 6.14.0-syzkaller-09584-g7d06015d936c #0 PREEMPT(voluntary) [ 344.084721][T18485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 344.084733][T18485] Call Trace: [ 344.084740][T18485] [ 344.084748][T18485] dump_stack_lvl+0xf6/0x150 [ 344.084775][T18485] dump_stack+0x15/0x1a [ 344.084791][T18485] should_fail_ex+0x261/0x270 [ 344.084953][T18485] should_failslab+0x8f/0xb0 [ 344.084978][T18485] __kmalloc_cache_noprof+0x55/0x320 [ 344.085118][T18485] ? sel_netport_sid+0x1e0/0x420 [ 344.085145][T18485] sel_netport_sid+0x1e0/0x420 [ 344.085226][T18485] selinux_socket_connect_helper+0x38b/0x4c0 [ 344.085266][T18485] selinux_socket_connect+0x31/0x70 [ 344.085291][T18485] security_socket_connect+0x47/0x80 [ 344.085316][T18485] __sys_connect+0x123/0x1b0 [ 344.085351][T18485] __x64_sys_connect+0x41/0x50 [ 344.085421][T18485] x64_sys_call+0x2030/0x2e10 [ 344.085455][T18485] do_syscall_64+0xc9/0x1c0 [ 344.085487][T18485] ? clear_bhb_loop+0x25/0x80 [ 344.085529][T18485] ? clear_bhb_loop+0x25/0x80 [ 344.085549][T18485] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 344.085572][T18485] RIP: 0033:0x7f4c6593d169 [ 344.085589][T18485] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 344.085611][T18485] RSP: 002b:00007f4c63fa7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 344.085634][T18485] RAX: ffffffffffffffda RBX: 00007f4c65b55fa0 RCX: 00007f4c6593d169 [ 344.085670][T18485] RDX: 0000000000000058 RSI: 00002000000001c0 RDI: 000000000000000a [ 344.085685][T18485] RBP: 00007f4c63fa7090 R08: 0000000000000000 R09: 0000000000000000 [ 344.085700][T18485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 344.085714][T18485] R13: 0000000000000000 R14: 00007f4c65b55fa0 R15: 00007fff327bc9a8 [ 344.085732][T18485] [ 344.129920][T18486] geneve2: entered promiscuous mode [ 344.289342][T18486] geneve2: entered allmulticast mode [ 344.302862][T18489] netlink: 44 bytes leftover after parsing attributes in process `syz.6.5570'. [ 344.346875][T18488] netlink: 48 bytes leftover after parsing attributes in process `syz.8.5571'. [ 344.472098][ T29] kauditd_printk_skb: 435 callbacks suppressed [ 344.472192][ T29] audit: type=1400 audit(2000000009.643:13727): avc: denied { unmount } for pid=18498 comm="syz.5.5576" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 344.520354][ T29] audit: type=1326 audit(2000000009.700:13728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18500 comm="syz.5.5577" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7800d5d169 code=0x7ffc0000 [ 344.570936][ T29] audit: type=1326 audit(2000000009.718:13729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18500 comm="syz.5.5577" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7800d5d169 code=0x7ffc0000 [ 344.594749][ T29] audit: type=1326 audit(2000000009.718:13730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18500 comm="syz.5.5577" exe="/root/syz-executor" sig=0 arch=c000003e syscall=440 compat=0 ip=0x7f7800d5d169 code=0x7ffc0000 [ 344.618469][ T29] audit: type=1326 audit(2000000009.718:13731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18500 comm="syz.5.5577" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7800d5d169 code=0x7ffc0000 [ 344.642170][ T29] audit: type=1400 audit(2000000009.737:13732): avc: denied { create } for pid=18502 comm="syz.5.5579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 344.661941][ T29] audit: type=1400 audit(2000000009.737:13733): avc: denied { create } for pid=18502 comm="syz.5.5579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 344.681661][ T29] audit: type=1400 audit(2000000009.737:13734): avc: denied { write } for pid=18502 comm="syz.5.5579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 344.701254][ T29] audit: type=1400 audit(2000000009.737:13735): avc: denied { setopt } for pid=18502 comm="syz.5.5579" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 344.737909][ T29] audit: type=1400 audit(2000000009.896:13736): avc: denied { ioctl } for pid=18502 comm="syz.5.5579" path="socket:[69398]" dev="sockfs" ino=69398 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 344.959985][T18513] netlink: 48 bytes leftover after parsing attributes in process `syz.6.5582'. [ 345.199353][T18523] program syz.6.5586 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 345.321355][T18527] FAULT_INJECTION: forcing a failure. [ 345.321355][T18527] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 345.334559][T18527] CPU: 1 UID: 0 PID: 18527 Comm: syz.6.5587 Not tainted 6.14.0-syzkaller-09584-g7d06015d936c #0 PREEMPT(voluntary) [ 345.334627][T18527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 345.334642][T18527] Call Trace: [ 345.334649][T18527] [ 345.334658][T18527] dump_stack_lvl+0xf6/0x150 [ 345.334687][T18527] dump_stack+0x15/0x1a [ 345.334763][T18527] should_fail_ex+0x261/0x270 [ 345.334934][T18527] should_fail+0xb/0x10 [ 345.334966][T18527] should_fail_usercopy+0x1a/0x20 [ 345.335004][T18527] _copy_to_user+0x20/0xa0 [ 345.335036][T18527] simple_read_from_buffer+0xb2/0x130 [ 345.335057][T18527] proc_fail_nth_read+0x103/0x140 [ 345.335154][T18527] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 345.335183][T18527] vfs_read+0x1b2/0x710 [ 345.335219][T18527] ? __rcu_read_unlock+0x4e/0x70 [ 345.335244][T18527] ? __fget_files+0x186/0x1c0 [ 345.335327][T18527] ksys_read+0xeb/0x1b0 [ 345.335349][T18527] __x64_sys_read+0x42/0x50 [ 345.335367][T18527] x64_sys_call+0x2a3b/0x2e10 [ 345.335387][T18527] do_syscall_64+0xc9/0x1c0 [ 345.335450][T18527] ? clear_bhb_loop+0x25/0x80 [ 345.335474][T18527] ? clear_bhb_loop+0x25/0x80 [ 345.335500][T18527] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 345.335525][T18527] RIP: 0033:0x7f4c6593bb7c [ 345.335542][T18527] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 345.335574][T18527] RSP: 002b:00007f4c63fa7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 345.335593][T18527] RAX: ffffffffffffffda RBX: 00007f4c65b55fa0 RCX: 00007f4c6593bb7c [ 345.335604][T18527] RDX: 000000000000000f RSI: 00007f4c63fa70a0 RDI: 0000000000000008 [ 345.335615][T18527] RBP: 00007f4c63fa7090 R08: 0000000000000000 R09: 0000000000000000 [ 345.335626][T18527] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 345.335670][T18527] R13: 0000000000000000 R14: 00007f4c65b55fa0 R15: 00007fff327bc9a8 [ 345.335693][T18527] [ 345.581263][T18529] FAULT_INJECTION: forcing a failure. [ 345.581263][T18529] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 345.594574][T18529] CPU: 0 UID: 0 PID: 18529 Comm: syz.6.5588 Not tainted 6.14.0-syzkaller-09584-g7d06015d936c #0 PREEMPT(voluntary) [ 345.594602][T18529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 345.594674][T18529] Call Trace: [ 345.594682][T18529] [ 345.594691][T18529] dump_stack_lvl+0xf6/0x150 [ 345.594719][T18529] dump_stack+0x15/0x1a [ 345.594739][T18529] should_fail_ex+0x261/0x270 [ 345.594776][T18529] should_fail+0xb/0x10 [ 345.594808][T18529] should_fail_usercopy+0x1a/0x20 [ 345.594898][T18529] _copy_from_user+0x1c/0xa0 [ 345.594923][T18529] simple_transaction_get+0xef/0x130 [ 345.594971][T18529] selinux_transaction_write+0x86/0x100 [ 345.595009][T18529] ? __pfx_selinux_transaction_write+0x10/0x10 [ 345.595051][T18529] vfs_write+0x295/0x950 [ 345.595071][T18529] ? __fget_files+0x186/0x1c0 [ 345.595102][T18529] ? __fget_files+0x186/0x1c0 [ 345.595127][T18529] __x64_sys_pwrite64+0xfb/0x150 [ 345.595151][T18529] x64_sys_call+0xab9/0x2e10 [ 345.595171][T18529] do_syscall_64+0xc9/0x1c0 [ 345.595202][T18529] ? clear_bhb_loop+0x25/0x80 [ 345.595300][T18529] ? clear_bhb_loop+0x25/0x80 [ 345.595326][T18529] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 345.595397][T18529] RIP: 0033:0x7f4c6593d169 [ 345.595448][T18529] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 345.595465][T18529] RSP: 002b:00007f4c63fa7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000012 [ 345.595486][T18529] RAX: ffffffffffffffda RBX: 00007f4c65b55fa0 RCX: 00007f4c6593d169 [ 345.595501][T18529] RDX: 000000000000003e RSI: 0000200000000000 RDI: 0000000000000003 [ 345.595516][T18529] RBP: 00007f4c63fa7090 R08: 0000000000000000 R09: 0000000000000000 [ 345.595530][T18529] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001 [ 345.595551][T18529] R13: 0000000000000000 R14: 00007f4c65b55fa0 R15: 00007fff327bc9a8 [ 345.595573][T18529] [ 345.932576][T18533] xt_socket: unknown flags 0xc [ 345.950840][T18533] netlink: 28 bytes leftover after parsing attributes in process `syz.6.5590'. [ 346.631639][T18557] FAULT_INJECTION: forcing a failure. [ 346.631639][T18557] name failslab, interval 1, probability 0, space 0, times 0 [ 346.644338][T18557] CPU: 0 UID: 0 PID: 18557 Comm: syz.8.5599 Not tainted 6.14.0-syzkaller-09584-g7d06015d936c #0 PREEMPT(voluntary) [ 346.644425][T18557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 346.644439][T18557] Call Trace: [ 346.644447][T18557] [ 346.644456][T18557] dump_stack_lvl+0xf6/0x150 [ 346.644485][T18557] dump_stack+0x15/0x1a [ 346.644505][T18557] should_fail_ex+0x261/0x270 [ 346.644620][T18557] should_failslab+0x8f/0xb0 [ 346.644646][T18557] kmem_cache_alloc_noprof+0x59/0x340 [ 346.644679][T18557] ? sk_prot_alloc+0x41/0x190 [ 346.644718][T18557] sk_prot_alloc+0x41/0x190 [ 346.644749][T18557] sk_alloc+0x33/0x360 [ 346.644783][T18557] ? inet_create+0x39c/0x750 [ 346.644814][T18557] inet_create+0x3b8/0x750 [ 346.644938][T18557] __sock_create+0x2e9/0x5a0 [ 346.644966][T18557] sock_create_kern+0x38/0x50 [ 346.644991][T18557] udp_sock_create4+0x6c/0x2a0 [ 346.645094][T18557] fou_nl_add_doit+0xf4/0x430 [ 346.645122][T18557] genl_rcv_msg+0x69b/0x6f0 [ 346.645239][T18557] ? __pfx_fou_nl_add_doit+0x10/0x10 [ 346.645263][T18557] ? __dev_queue_xmit+0xb76/0x20b0 [ 346.645306][T18557] netlink_rcv_skb+0x12f/0x230 [ 346.645328][T18557] ? __pfx_genl_rcv_msg+0x10/0x10 [ 346.645420][T18557] genl_rcv+0x28/0x40 [ 346.645491][T18557] netlink_unicast+0x605/0x6c0 [ 346.645533][T18557] netlink_sendmsg+0x609/0x720 [ 346.645568][T18557] ? __pfx_netlink_sendmsg+0x10/0x10 [ 346.645599][T18557] __sock_sendmsg+0x140/0x180 [ 346.645674][T18557] ____sys_sendmsg+0x350/0x4e0 [ 346.645709][T18557] __sys_sendmsg+0x1a0/0x240 [ 346.645751][T18557] __x64_sys_sendmsg+0x46/0x50 [ 346.645827][T18557] x64_sys_call+0x26f3/0x2e10 [ 346.645847][T18557] do_syscall_64+0xc9/0x1c0 [ 346.645877][T18557] ? clear_bhb_loop+0x25/0x80 [ 346.645902][T18557] ? clear_bhb_loop+0x25/0x80 [ 346.646041][T18557] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 346.646132][T18557] RIP: 0033:0x7fddfef3d169 [ 346.646150][T18557] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 346.646172][T18557] RSP: 002b:00007fddfd59f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 346.646191][T18557] RAX: ffffffffffffffda RBX: 00007fddff155fa0 RCX: 00007fddfef3d169 [ 346.646202][T18557] RDX: 0000000020000070 RSI: 0000200000000180 RDI: 0000000000000006 [ 346.646213][T18557] RBP: 00007fddfd59f090 R08: 0000000000000000 R09: 0000000000000000 [ 346.646224][T18557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 346.646238][T18557] R13: 0000000000000000 R14: 00007fddff155fa0 R15: 00007ffe8a5ffa58 [ 346.646315][T18557] [ 346.912540][ T3406] unregister_netdevice: waiting for batadv0 to become free. Usage count = 3 [ 347.176982][T18567] netlink: 'syz.0.5603': attribute type 3 has an invalid length. [ 347.218549][T18569] netlink: 28 bytes leftover after parsing attributes in process `syz.0.5604'. [ 347.383366][T18581] smc: net device bond0 applied user defined pnetid SYZ0 [ 347.391257][T18581] smc: net device bond0 erased user defined pnetid SYZ0 [ 347.455073][T18585] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5612'. [ 347.481389][T18585] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 347.660805][T18592] netlink: 36 bytes leftover after parsing attributes in process `syz.6.5616'. [ 347.677461][T18592] netlink: 4 bytes leftover after parsing attributes in process `syz.6.5616'. [ 347.758379][T18592] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18592 comm=syz.6.5616 [ 347.774586][T18596] netlink: 28 bytes leftover after parsing attributes in process `syz.5.5615'. [ 347.855092][T18601] netlink: 16 bytes leftover after parsing attributes in process `syz.6.5619'. [ 347.892710][T18601] netlink: 32 bytes leftover after parsing attributes in process `syz.6.5619'. [ 347.904463][T18462] netdevsim netdevsim2 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 347.912832][T18462] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 347.921431][T18606] netlink: 28 bytes leftover after parsing attributes in process `syz.0.5621'. [ 347.930494][T18606] netlink: 108 bytes leftover after parsing attributes in process `syz.0.5621'. [ 347.940048][T18606] netlink: 28 bytes leftover after parsing attributes in process `syz.0.5621'. [ 347.964299][T18462] netdevsim netdevsim2 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 347.972567][T18462] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 347.985069][T18462] netdevsim netdevsim2 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 347.994617][T18462] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 348.010443][T18462] netdevsim netdevsim2 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 348.018836][T18462] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 348.107480][T18620] pimreg0: tun_chr_ioctl cmd 35108 [ 348.236558][T18627] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18627 comm=syz.0.5629 [ 348.399806][T18635] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 348.419108][T18635] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 349.042108][T18654] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18654 comm=syz.6.5641 [ 349.606704][T18689] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18689 comm=syz.2.5655 [ 349.864351][ T29] kauditd_printk_skb: 561 callbacks suppressed [ 349.864440][ T29] audit: type=1400 audit(2000000014.695:14298): avc: denied { bind } for pid=18700 comm="syz.2.5660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 349.891560][ T29] audit: type=1400 audit(2000000014.695:14299): avc: denied { node_bind } for pid=18700 comm="syz.2.5660" saddr=172.20.20.170 src=50720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 349.985837][ T29] audit: type=1326 audit(2000000014.798:14300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18702 comm="syz.2.5661" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb36aa3d169 code=0x7ffc0000 [ 350.009608][ T29] audit: type=1326 audit(2000000014.798:14301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18702 comm="syz.2.5661" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb36aa3d169 code=0x7ffc0000 [ 350.034773][ T29] audit: type=1326 audit(2000000014.798:14302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18702 comm="syz.2.5661" exe="/root/syz-executor" sig=0 arch=c000003e syscall=440 compat=0 ip=0x7fb36aa3d169 code=0x7ffc0000 [ 350.058591][ T29] audit: type=1326 audit(2000000014.798:14303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18702 comm="syz.2.5661" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb36aa3d169 code=0x7ffc0000 [ 350.082391][ T29] audit: type=1326 audit(2000000014.798:14304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18702 comm="syz.2.5661" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb36aa3d169 code=0x7ffc0000 [ 350.156852][ T29] audit: type=1326 audit(2000000014.882:14305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18704 comm="syz.2.5663" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb36aa3d169 code=0x7ffc0000 [ 350.181900][ T29] audit: type=1326 audit(2000000014.882:14306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18704 comm="syz.2.5663" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb36aa3d169 code=0x7ffc0000 [ 350.206821][ T29] audit: type=1326 audit(2000000014.882:14307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18704 comm="syz.2.5663" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb36aa3d169 code=0x7ffc0000 [ 350.433245][T18718] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18718 comm=syz.5.5668 [ 352.432652][T18797] smc: net device bond0 applied user defined pnetid SYZ0 [ 352.464683][T18797] smc: net device bond0 erased user defined pnetid SYZ0 [ 352.675383][T18819] __nla_validate_parse: 15 callbacks suppressed [ 352.675411][T18819] netlink: 8 bytes leftover after parsing attributes in process `syz.5.5704'. [ 352.699308][T18819] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 352.861567][T18829] netlink: 36 bytes leftover after parsing attributes in process `syz.8.5707'. [ 352.884015][T18829] xt_hashlimit: max too large, truncated to 1048576 [ 352.933776][T18835] netdevsim netdevsim8 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 352.975785][T18835] netdevsim netdevsim8 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 353.063534][T18835] netdevsim netdevsim8 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 353.099526][T18850] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5716'. [ 353.116807][T18835] netdevsim netdevsim8 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 353.135686][T18850] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 353.204229][T18835] netdevsim netdevsim8 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 353.229747][T18835] netdevsim netdevsim8 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 353.253768][T18835] netdevsim netdevsim8 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 353.266466][T18835] netdevsim netdevsim8 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 353.326595][T18867] SELinux: syz.2.5721 (18867) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 353.428765][T18874] netlink: 20 bytes leftover after parsing attributes in process `syz.8.5725'. [ 353.497259][T18878] FAULT_INJECTION: forcing a failure. [ 353.497259][T18878] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 353.510405][T18878] CPU: 1 UID: 0 PID: 18878 Comm: syz.8.5726 Not tainted 6.14.0-syzkaller-09584-g7d06015d936c #0 PREEMPT(voluntary) [ 353.510435][T18878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 353.510450][T18878] Call Trace: [ 353.510458][T18878] [ 353.510468][T18878] dump_stack_lvl+0xf6/0x150 [ 353.510497][T18878] dump_stack+0x15/0x1a [ 353.510518][T18878] should_fail_ex+0x261/0x270 [ 353.510579][T18878] should_fail+0xb/0x10 [ 353.510620][T18878] should_fail_usercopy+0x1a/0x20 [ 353.510660][T18878] _copy_from_user+0x1c/0xa0 [ 353.510686][T18878] move_addr_to_kernel+0x8c/0x130 [ 353.510756][T18878] __sys_bind+0xa3/0x190 [ 353.510788][T18878] __x64_sys_bind+0x41/0x50 [ 353.510838][T18878] x64_sys_call+0x1e4a/0x2e10 [ 353.510860][T18878] do_syscall_64+0xc9/0x1c0 [ 353.510940][T18878] ? clear_bhb_loop+0x25/0x80 [ 353.511036][T18878] ? clear_bhb_loop+0x25/0x80 [ 353.511064][T18878] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 353.511092][T18878] RIP: 0033:0x7fddfef3d169 [ 353.511108][T18878] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 353.511128][T18878] RSP: 002b:00007fddfd59f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 353.511152][T18878] RAX: ffffffffffffffda RBX: 00007fddff155fa0 RCX: 00007fddfef3d169 [ 353.511167][T18878] RDX: 000000000000000e RSI: 0000200000000200 RDI: 0000000000000004 [ 353.511183][T18878] RBP: 00007fddfd59f090 R08: 0000000000000000 R09: 0000000000000000 [ 353.511198][T18878] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 353.511240][T18878] R13: 0000000000000000 R14: 00007fddff155fa0 R15: 00007ffe8a5ffa58 [ 353.511261][T18878] [ 353.814693][T18885] netlink: 28 bytes leftover after parsing attributes in process `syz.8.5728'. [ 353.926079][T18893] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5732'. [ 353.935653][T18893] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 354.073193][T18900] netlink: 60 bytes leftover after parsing attributes in process `syz.8.5735'. [ 354.180176][T18907] netlink: 'syz.2.5738': attribute type 7 has an invalid length. [ 354.682070][T18919] bond1: entered promiscuous mode [ 354.687335][T18919] bond1: entered allmulticast mode [ 354.729543][T18919] 8021q: adding VLAN 0 to HW filter on device bond1 [ 354.823428][T18919] bond1 (unregistering): Released all slaves [ 354.863540][T18931] 8021q: VLANs not supported on ip6_vti0 [ 354.898676][T18937] tipc: Started in network mode [ 354.903627][T18937] tipc: Node identity 4, cluster identity 4711 [ 354.909843][T18937] tipc: Node number set to 4 [ 355.893604][ T29] kauditd_printk_skb: 749 callbacks suppressed [ 355.893621][ T29] audit: type=1400 audit(2000000020.335:15057): avc: denied { read } for pid=18908 comm="syz.8.5740" name="event0" dev="devtmpfs" ino=242 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 355.926751][ T29] audit: type=1400 audit(2000000020.335:15058): avc: denied { open } for pid=18908 comm="syz.8.5740" path="/dev/input/event0" dev="devtmpfs" ino=242 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 356.034543][ T29] audit: type=1326 audit(2000000020.466:15059): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18956 comm="syz.5.5753" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7800d5d169 code=0x7ffc0000 [ 356.074803][ T29] audit: type=1326 audit(2000000020.494:15060): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18956 comm="syz.5.5753" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7800d5d169 code=0x7ffc0000 [ 356.099749][ T29] audit: type=1326 audit(2000000020.494:15061): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18956 comm="syz.5.5753" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f7800d5d169 code=0x7ffc0000 [ 356.123616][ T29] audit: type=1326 audit(2000000020.494:15062): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18956 comm="syz.5.5753" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7800d5d169 code=0x7ffc0000 [ 356.148476][ T29] audit: type=1326 audit(2000000020.494:15063): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18956 comm="syz.5.5753" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7800d5d169 code=0x7ffc0000 [ 356.173578][ T29] audit: type=1326 audit(2000000020.494:15064): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18956 comm="syz.5.5753" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f7800d5d169 code=0x7ffc0000 [ 356.197348][ T29] audit: type=1326 audit(2000000020.494:15065): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18956 comm="syz.5.5753" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7800d5d169 code=0x7ffc0000 [ 356.222253][ T29] audit: type=1326 audit(2000000020.494:15066): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18956 comm="syz.5.5753" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7800d5d169 code=0x7ffc0000 [ 356.354342][T18968] netlink: 36 bytes leftover after parsing attributes in process `syz.0.5757'. [ 356.364403][T18968] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5757'. [ 356.449406][T18968] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18968 comm=syz.0.5757 [ 356.486399][T18975] netlink: 4 bytes leftover after parsing attributes in process `syz.5.5762'. [ 356.735768][T18980] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18980 comm=syz.5.5764 [ 356.967610][T19004] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 357.345782][T19022] bond1: entered promiscuous mode [ 357.351368][T19022] bond1: entered allmulticast mode [ 357.476609][T19022] 8021q: adding VLAN 0 to HW filter on device bond1 [ 357.554001][T19022] bond1 (unregistering): Released all slaves [ 357.744280][T19044] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 357.967045][T19058] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 358.579537][T19091] __nla_validate_parse: 3 callbacks suppressed [ 358.579561][T19091] netlink: 8 bytes leftover after parsing attributes in process `syz.8.5806'. [ 358.595752][T19091] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 358.742658][T19092] bond1: entered promiscuous mode [ 358.748473][T19092] bond1: entered allmulticast mode [ 358.757476][T19092] 8021q: adding VLAN 0 to HW filter on device bond1 [ 358.829196][T19092] bond1 (unregistering): Released all slaves [ 359.114216][T19111] rdma_op ffff88815d1c3d80 conn xmit_rdma 0000000000000000 [ 359.188692][T19114] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 359.864800][T19129] rdma_op ffff8881581b9980 conn xmit_rdma 0000000000000000 [ 359.906164][T19131] netlink: 36 bytes leftover after parsing attributes in process `syz.2.5817'. [ 359.929604][T19131] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5817'. [ 360.034664][T19138] nfs: Unexpected value for 'acl' [ 360.067601][T19131] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19131 comm=syz.2.5817 [ 360.158577][T19147] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 360.735445][T19173] netlink: 64 bytes leftover after parsing attributes in process `syz.0.5832'. [ 361.271284][ T29] kauditd_printk_skb: 385 callbacks suppressed [ 361.271300][ T29] audit: type=1400 audit(2000000025.368:15452): avc: denied { ioctl } for pid=19192 comm="syz.6.5838" path="socket:[72638]" dev="sockfs" ino=72638 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 361.378483][ T29] audit: type=1400 audit(2000000025.396:15453): avc: denied { bind } for pid=19192 comm="syz.6.5838" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 361.440774][T19200] nfs: Unexpected value for 'acl' [ 361.530411][ T29] audit: type=1326 audit(2000000025.611:15454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19203 comm="syz.8.5842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fddfef3d169 code=0x7ffc0000 [ 361.611982][ T29] audit: type=1326 audit(2000000025.611:15455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19203 comm="syz.8.5842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fddfef3d169 code=0x7ffc0000 [ 361.636004][ T29] audit: type=1326 audit(2000000025.611:15456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19203 comm="syz.8.5842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fddfef3d169 code=0x7ffc0000 [ 361.659773][ T29] audit: type=1326 audit(2000000025.629:15457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19203 comm="syz.8.5842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fddfef3d169 code=0x7ffc0000 [ 361.683607][ T29] audit: type=1326 audit(2000000025.629:15458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19203 comm="syz.8.5842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fddfef3d169 code=0x7ffc0000 [ 361.707222][ T29] audit: type=1326 audit(2000000025.648:15459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19203 comm="syz.8.5842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fddfef3d169 code=0x7ffc0000 [ 361.731264][ T29] audit: type=1326 audit(2000000025.648:15460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19203 comm="syz.8.5842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fddfef3d169 code=0x7ffc0000 [ 361.755084][ T29] audit: type=1326 audit(2000000025.658:15461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19203 comm="syz.8.5842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fddfef3d169 code=0x7ffc0000 [ 361.819629][T19210] netlink: 64 bytes leftover after parsing attributes in process `syz.0.5844'. [ 362.094586][T19220] lo speed is unknown, defaulting to 1000 [ 362.115059][T19220] lo speed is unknown, defaulting to 1000 [ 362.131475][T19220] lo speed is unknown, defaulting to 1000 [ 362.177573][T19220] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 362.217586][T19220] lo speed is unknown, defaulting to 1000 [ 362.228391][T19220] lo speed is unknown, defaulting to 1000 [ 362.262438][T19220] lo speed is unknown, defaulting to 1000 [ 362.279750][T19220] lo speed is unknown, defaulting to 1000 [ 362.296487][T19220] lo speed is unknown, defaulting to 1000 [ 362.308597][T19220] lo speed is unknown, defaulting to 1000 [ 362.314793][T19220] lo speed is unknown, defaulting to 1000 [ 362.368217][T19220] lo speed is unknown, defaulting to 1000 [ 362.390694][T19220] lo speed is unknown, defaulting to 1000 [ 362.420378][T19220] lo speed is unknown, defaulting to 1000 [ 362.437648][T19220] lo speed is unknown, defaulting to 1000 [ 362.465332][T19220] lo speed is unknown, defaulting to 1000 [ 362.495477][T19220] lo speed is unknown, defaulting to 1000 [ 362.522439][T19220] lo speed is unknown, defaulting to 1000 [ 362.547221][T19220] lo speed is unknown, defaulting to 1000 [ 362.562991][T19220] lo speed is unknown, defaulting to 1000 [ 362.603551][T19220] lo speed is unknown, defaulting to 1000 [ 362.622487][T19220] lo speed is unknown, defaulting to 1000 [ 362.653101][T19220] lo speed is unknown, defaulting to 1000 [ 362.691337][T19220] lo speed is unknown, defaulting to 1000 [ 362.715270][T19220] lo speed is unknown, defaulting to 1000 [ 362.744915][T19220] lo speed is unknown, defaulting to 1000 [ 362.768737][T19220] lo speed is unknown, defaulting to 1000 [ 362.795032][T19220] lo speed is unknown, defaulting to 1000 [ 362.818271][T19220] lo speed is unknown, defaulting to 1000 [ 362.844800][T19220] lo speed is unknown, defaulting to 1000 [ 362.868080][T19239] lo speed is unknown, defaulting to 1000 [ 362.879325][T19220] lo speed is unknown, defaulting to 1000 [ 362.920239][T19220] lo speed is unknown, defaulting to 1000 [ 362.939635][T19220] lo speed is unknown, defaulting to 1000 [ 362.955382][T19220] lo speed is unknown, defaulting to 1000 [ 362.965924][T19242] netlink: 64 bytes leftover after parsing attributes in process `syz.2.5857'. [ 362.975199][T19220] lo speed is unknown, defaulting to 1000 [ 362.988076][T19220] lo speed is unknown, defaulting to 1000 [ 362.995220][T19220] lo speed is unknown, defaulting to 1000 [ 363.008829][T19220] lo speed is unknown, defaulting to 1000 [ 363.016362][T19220] lo speed is unknown, defaulting to 1000 [ 363.033416][T19220] lo speed is unknown, defaulting to 1000 [ 363.039770][T19220] lo speed is unknown, defaulting to 1000 [ 363.057090][T19220] lo speed is unknown, defaulting to 1000 [ 363.063659][T19220] lo speed is unknown, defaulting to 1000 [ 363.076210][T19220] lo speed is unknown, defaulting to 1000 [ 363.086485][T19220] lo speed is unknown, defaulting to 1000 [ 363.092814][T19220] lo speed is unknown, defaulting to 1000 [ 363.113540][T19220] lo speed is unknown, defaulting to 1000 [ 363.121253][T19220] lo speed is unknown, defaulting to 1000 [ 363.128039][T19220] lo speed is unknown, defaulting to 1000 [ 363.134584][T19220] lo speed is unknown, defaulting to 1000 [ 363.141534][T19220] lo speed is unknown, defaulting to 1000 [ 363.149037][T19250] vlan2: entered allmulticast mode [ 363.178591][T19220] lo speed is unknown, defaulting to 1000 [ 363.185801][T19220] lo speed is unknown, defaulting to 1000 [ 363.200020][T19220] lo speed is unknown, defaulting to 1000 [ 363.206333][T19220] lo speed is unknown, defaulting to 1000 [ 363.220263][T19220] lo speed is unknown, defaulting to 1000 [ 363.233946][T19220] lo speed is unknown, defaulting to 1000 [ 363.241516][T19252] nfs: Unexpected value for 'acl' [ 363.279181][T19220] lo speed is unknown, defaulting to 1000 [ 363.287820][T19220] lo speed is unknown, defaulting to 1000 [ 363.302027][T19220] lo speed is unknown, defaulting to 1000 [ 363.326351][T19220] lo speed is unknown, defaulting to 1000 [ 363.337356][T19220] lo speed is unknown, defaulting to 1000 [ 363.357778][T19220] lo speed is unknown, defaulting to 1000 [ 363.376186][T19220] lo speed is unknown, defaulting to 1000 [ 363.382248][T19220] lo speed is unknown, defaulting to 1000 [ 363.408481][T19220] lo speed is unknown, defaulting to 1000 [ 363.420345][T19220] lo speed is unknown, defaulting to 1000 [ 363.437238][T19220] lo speed is unknown, defaulting to 1000 [ 363.448217][T19220] lo speed is unknown, defaulting to 1000 [ 363.458408][T19220] lo speed is unknown, defaulting to 1000 [ 363.493699][T19220] lo speed is unknown, defaulting to 1000 [ 363.505099][T19220] lo speed is unknown, defaulting to 1000 [ 363.522508][T19267] xt_CT: You must specify a L4 protocol and not use inversions on it [ 363.526811][T19220] lo speed is unknown, defaulting to 1000 [ 363.592392][T19220] lo speed is unknown, defaulting to 1000 [ 363.602581][T19273] IPv4: Oversized IP packet from 127.202.26.0 [ 363.608838][T19220] lo speed is unknown, defaulting to 1000 [ 363.665031][T19220] lo speed is unknown, defaulting to 1000 [ 363.678220][T19220] lo speed is unknown, defaulting to 1000 [ 363.694426][T19220] lo speed is unknown, defaulting to 1000 [ 363.713616][T19220] lo speed is unknown, defaulting to 1000 [ 363.723469][T19273] lo speed is unknown, defaulting to 1000 [ 363.747263][T19220] lo speed is unknown, defaulting to 1000 [ 363.761401][T19220] lo speed is unknown, defaulting to 1000 [ 363.768073][T19220] lo speed is unknown, defaulting to 1000 [ 363.778315][T19220] lo speed is unknown, defaulting to 1000 [ 363.787430][T19220] lo speed is unknown, defaulting to 1000 [ 363.801977][T19220] lo speed is unknown, defaulting to 1000 [ 363.810595][T19220] lo speed is unknown, defaulting to 1000 [ 363.822413][T19220] lo speed is unknown, defaulting to 1000 [ 363.831269][T19220] lo speed is unknown, defaulting to 1000 [ 363.841301][T19220] lo speed is unknown, defaulting to 1000 [ 363.850237][T19220] lo speed is unknown, defaulting to 1000 [ 363.856386][T19220] lo speed is unknown, defaulting to 1000 [ 363.875185][T19220] lo speed is unknown, defaulting to 1000 [ 363.886214][T19220] lo speed is unknown, defaulting to 1000 [ 363.894815][T19220] lo speed is unknown, defaulting to 1000 [ 363.913117][T19220] lo speed is unknown, defaulting to 1000 [ 363.928504][T19220] lo speed is unknown, defaulting to 1000 [ 363.934901][T19220] lo speed is unknown, defaulting to 1000 [ 363.941062][T19220] lo speed is unknown, defaulting to 1000 [ 363.941826][T19291] netlink: 8 bytes leftover after parsing attributes in process `syz.8.5875'. [ 363.947690][T19220] lo speed is unknown, defaulting to 1000 [ 363.962715][T19220] lo speed is unknown, defaulting to 1000 [ 363.968971][T19291] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 363.969695][T19220] lo speed is unknown, defaulting to 1000 [ 363.984828][T19220] lo speed is unknown, defaulting to 1000 [ 364.013914][T19220] lo speed is unknown, defaulting to 1000 [ 364.021504][T19220] lo speed is unknown, defaulting to 1000 [ 364.028503][T19220] lo speed is unknown, defaulting to 1000 [ 364.034651][T19220] lo speed is unknown, defaulting to 1000 [ 364.042361][T19220] lo speed is unknown, defaulting to 1000 [ 364.048484][T19220] lo speed is unknown, defaulting to 1000 [ 364.062431][T19220] lo speed is unknown, defaulting to 1000 [ 364.068723][T19220] lo speed is unknown, defaulting to 1000 [ 364.075817][T19220] lo speed is unknown, defaulting to 1000 [ 364.082344][T19220] lo speed is unknown, defaulting to 1000 [ 364.088597][T19220] lo speed is unknown, defaulting to 1000 [ 364.096354][T19220] lo speed is unknown, defaulting to 1000 [ 364.107675][T19220] lo speed is unknown, defaulting to 1000 [ 364.114618][T19220] lo speed is unknown, defaulting to 1000 [ 364.133763][T19220] lo speed is unknown, defaulting to 1000 [ 364.140834][T19220] lo speed is unknown, defaulting to 1000 [ 364.148329][T19220] lo speed is unknown, defaulting to 1000 [ 364.148758][T19302] tipc: Started in network mode [ 364.159082][T19302] tipc: Node identity 4, cluster identity 4711 [ 364.165256][T19302] tipc: Node number set to 4 [ 364.171278][T19220] lo speed is unknown, defaulting to 1000 [ 364.180793][T19220] lo speed is unknown, defaulting to 1000 [ 364.200191][T19220] lo speed is unknown, defaulting to 1000 [ 364.206340][T19220] lo speed is unknown, defaulting to 1000 [ 364.226152][T19220] lo speed is unknown, defaulting to 1000 [ 364.237237][T19220] lo speed is unknown, defaulting to 1000 [ 364.251465][T19220] lo speed is unknown, defaulting to 1000 [ 364.262148][T19220] lo speed is unknown, defaulting to 1000 [ 364.280838][T19220] lo speed is unknown, defaulting to 1000 [ 364.292391][T19303] lo speed is unknown, defaulting to 1000 [ 364.299132][T19220] lo speed is unknown, defaulting to 1000 [ 364.305395][T19220] lo speed is unknown, defaulting to 1000 [ 364.331434][T19220] lo speed is unknown, defaulting to 1000 [ 364.347305][T19220] lo speed is unknown, defaulting to 1000 [ 364.362157][T19220] lo speed is unknown, defaulting to 1000 [ 364.371363][T19220] lo speed is unknown, defaulting to 1000 [ 364.381397][T19220] lo speed is unknown, defaulting to 1000 [ 364.387578][T19220] lo speed is unknown, defaulting to 1000 [ 364.394407][T19220] lo speed is unknown, defaulting to 1000 [ 364.400527][T19220] lo speed is unknown, defaulting to 1000 [ 364.421127][T19220] lo speed is unknown, defaulting to 1000 [ 364.438540][T19220] lo speed is unknown, defaulting to 1000 [ 364.467317][T19220] lo speed is unknown, defaulting to 1000 [ 364.473442][T19220] lo speed is unknown, defaulting to 1000 [ 364.484884][T19220] lo speed is unknown, defaulting to 1000 [ 364.498100][T19220] lo speed is unknown, defaulting to 1000 [ 364.505722][T19220] lo speed is unknown, defaulting to 1000 [ 364.517499][T19220] lo speed is unknown, defaulting to 1000 [ 364.524788][T19220] lo speed is unknown, defaulting to 1000 [ 364.536499][T19220] lo speed is unknown, defaulting to 1000 [ 364.543371][T19220] lo speed is unknown, defaulting to 1000 [ 364.549816][T19220] lo speed is unknown, defaulting to 1000 [ 364.562648][T19220] lo speed is unknown, defaulting to 1000 [ 364.568699][T19220] lo speed is unknown, defaulting to 1000 [ 364.580427][T19220] lo speed is unknown, defaulting to 1000 [ 364.586479][T19220] lo speed is unknown, defaulting to 1000 [ 364.592635][T19220] lo speed is unknown, defaulting to 1000 [ 364.604443][T19220] lo speed is unknown, defaulting to 1000 [ 364.610663][T19220] lo speed is unknown, defaulting to 1000 [ 364.625283][T19220] lo speed is unknown, defaulting to 1000 [ 364.632005][T19220] lo speed is unknown, defaulting to 1000 [ 364.645823][T19313] FAULT_INJECTION: forcing a failure. [ 364.645823][T19313] name failslab, interval 1, probability 0, space 0, times 0 [ 364.646168][T19220] lo speed is unknown, defaulting to 1000 [ 364.660026][T19313] CPU: 0 UID: 0 PID: 19313 Comm: syz.6.5884 Not tainted 6.14.0-syzkaller-09584-g7d06015d936c #0 PREEMPT(voluntary) [ 364.660062][T19313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 364.660078][T19313] Call Trace: [ 364.660087][T19313] [ 364.660097][T19313] dump_stack_lvl+0xf6/0x150 [ 364.660128][T19313] dump_stack+0x15/0x1a [ 364.660219][T19313] should_fail_ex+0x261/0x270 [ 364.660311][T19313] should_failslab+0x8f/0xb0 [ 364.660338][T19313] kmem_cache_alloc_node_noprof+0x5c/0x340 [ 364.660425][T19313] ? __alloc_skb+0x10d/0x320 [ 364.660456][T19313] __alloc_skb+0x10d/0x320 [ 364.660487][T19313] netlink_alloc_large_skb+0xad/0xe0 [ 364.660515][T19313] netlink_sendmsg+0x3da/0x720 [ 364.660618][T19313] ? __pfx_netlink_sendmsg+0x10/0x10 [ 364.660650][T19313] __sock_sendmsg+0x140/0x180 [ 364.660676][T19313] ____sys_sendmsg+0x350/0x4e0 [ 364.660838][T19313] __sys_sendmsg+0x1a0/0x240 [ 364.660889][T19313] __x64_sys_sendmsg+0x46/0x50 [ 364.660924][T19313] x64_sys_call+0x26f3/0x2e10 [ 364.661010][T19313] do_syscall_64+0xc9/0x1c0 [ 364.661047][T19313] ? clear_bhb_loop+0x25/0x80 [ 364.661074][T19313] ? clear_bhb_loop+0x25/0x80 [ 364.661102][T19313] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 364.661153][T19313] RIP: 0033:0x7f4c6593d169 [ 364.661242][T19313] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 364.661265][T19313] RSP: 002b:00007f4c63fa7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 364.661288][T19313] RAX: ffffffffffffffda RBX: 00007f4c65b55fa0 RCX: 00007f4c6593d169 [ 364.661304][T19313] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000003 [ 364.661319][T19313] RBP: 00007f4c63fa7090 R08: 0000000000000000 R09: 0000000000000000 [ 364.661334][T19313] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 364.661350][T19313] R13: 0000000000000000 R14: 00007f4c65b55fa0 R15: 00007fff327bc9a8 [ 364.661409][T19313] [ 364.915444][T19220] lo speed is unknown, defaulting to 1000 [ 364.921542][T19220] lo speed is unknown, defaulting to 1000 [ 364.964903][T19220] lo speed is unknown, defaulting to 1000 [ 364.974395][T19220] lo speed is unknown, defaulting to 1000 [ 365.010715][T19220] lo speed is unknown, defaulting to 1000 [ 365.029623][T19318] lo speed is unknown, defaulting to 1000 [ 365.105480][T19220] lo speed is unknown, defaulting to 1000 [ 365.116734][T19220] lo speed is unknown, defaulting to 1000 [ 365.127551][T19220] lo speed is unknown, defaulting to 1000 [ 365.149339][T19220] lo speed is unknown, defaulting to 1000 [ 365.155773][T19220] lo speed is unknown, defaulting to 1000 [ 365.168736][T19220] lo speed is unknown, defaulting to 1000 [ 365.174986][T19327] netlink: 100 bytes leftover after parsing attributes in process `syz.2.5890'. [ 365.193636][T19220] lo speed is unknown, defaulting to 1000 [ 365.199798][T19220] lo speed is unknown, defaulting to 1000 [ 365.212710][T19329] 9pnet_fd: Insufficient options for proto=fd [ 365.214923][T19220] lo speed is unknown, defaulting to 1000 [ 365.233335][T19327] netlink: 36 bytes leftover after parsing attributes in process `syz.2.5890'. [ 365.242808][T19220] lo speed is unknown, defaulting to 1000 [ 365.257722][T19220] lo speed is unknown, defaulting to 1000 [ 365.263998][T19220] lo speed is unknown, defaulting to 1000 [ 365.272684][T19327] vlan0: entered promiscuous mode [ 365.277857][T19327] vlan0: entered allmulticast mode [ 365.283071][T19327] veth0_vlan: entered allmulticast mode [ 365.334421][T19220] lo speed is unknown, defaulting to 1000 [ 365.340666][T19220] lo speed is unknown, defaulting to 1000 [ 365.369919][T19220] lo speed is unknown, defaulting to 1000 [ 365.383223][T19220] lo speed is unknown, defaulting to 1000 [ 365.389728][T19220] lo speed is unknown, defaulting to 1000 [ 365.395973][T19220] lo speed is unknown, defaulting to 1000 [ 365.402525][T19220] lo speed is unknown, defaulting to 1000 [ 365.411908][T19220] lo speed is unknown, defaulting to 1000 [ 365.418361][T19220] lo speed is unknown, defaulting to 1000 [ 365.424549][T19220] lo speed is unknown, defaulting to 1000 [ 365.430894][T19220] lo speed is unknown, defaulting to 1000 [ 365.437067][T19220] lo speed is unknown, defaulting to 1000 [ 365.444107][T19220] lo speed is unknown, defaulting to 1000 [ 365.450422][T19220] lo speed is unknown, defaulting to 1000 [ 365.456498][T19220] lo speed is unknown, defaulting to 1000 [ 365.463449][T19220] lo speed is unknown, defaulting to 1000 [ 365.469631][T19220] lo speed is unknown, defaulting to 1000 [ 365.476308][T19220] lo speed is unknown, defaulting to 1000 [ 365.546481][T19220] lo speed is unknown, defaulting to 1000 [ 365.552862][T19220] lo speed is unknown, defaulting to 1000 [ 365.561533][T19220] lo speed is unknown, defaulting to 1000 [ 365.571227][T19220] lo speed is unknown, defaulting to 1000 [ 365.584396][T19336] lo speed is unknown, defaulting to 1000 [ 365.596485][T19220] lo speed is unknown, defaulting to 1000 [ 365.603003][T19220] lo speed is unknown, defaulting to 1000 [ 365.609090][T19220] lo speed is unknown, defaulting to 1000 [ 365.622589][T19220] lo speed is unknown, defaulting to 1000 [ 365.628743][T19220] lo speed is unknown, defaulting to 1000 [ 365.639673][T19220] lo speed is unknown, defaulting to 1000 [ 365.666690][T19220] lo speed is unknown, defaulting to 1000 [ 365.689510][T19220] lo speed is unknown, defaulting to 1000 [ 365.713940][T19220] lo speed is unknown, defaulting to 1000 [ 365.720028][T19220] lo speed is unknown, defaulting to 1000 [ 365.738158][T19220] lo speed is unknown, defaulting to 1000 [ 365.758078][T19220] lo speed is unknown, defaulting to 1000 [ 365.775272][T19220] lo speed is unknown, defaulting to 1000 [ 365.792490][T19220] lo speed is unknown, defaulting to 1000 [ 365.798826][T19220] lo speed is unknown, defaulting to 1000 [ 365.805517][T19220] lo speed is unknown, defaulting to 1000 [ 365.811627][T19220] lo speed is unknown, defaulting to 1000 [ 365.818294][T19220] lo speed is unknown, defaulting to 1000 [ 365.824547][T19220] lo speed is unknown, defaulting to 1000 [ 365.830693][T19220] lo speed is unknown, defaulting to 1000 [ 365.844792][T19220] lo speed is unknown, defaulting to 1000 [ 365.888315][T19220] lo speed is unknown, defaulting to 1000 [ 365.899186][T19220] lo speed is unknown, defaulting to 1000 [ 365.909666][T19220] lo speed is unknown, defaulting to 1000 [ 365.995274][T19220] lo speed is unknown, defaulting to 1000 [ 366.016675][T19220] lo speed is unknown, defaulting to 1000 [ 366.022684][T19220] lo speed is unknown, defaulting to 1000 [ 366.037931][T19220] lo speed is unknown, defaulting to 1000 [ 366.048853][T19220] lo speed is unknown, defaulting to 1000 [ 366.054904][T19220] lo speed is unknown, defaulting to 1000 [ 366.091584][T19220] lo speed is unknown, defaulting to 1000 [ 366.097558][T19220] lo speed is unknown, defaulting to 1000 [ 366.115649][T19220] lo speed is unknown, defaulting to 1000 [ 366.121890][T19220] lo speed is unknown, defaulting to 1000 [ 366.132734][T19220] lo speed is unknown, defaulting to 1000 [ 366.143732][T19220] lo speed is unknown, defaulting to 1000 [ 366.153259][T19220] lo speed is unknown, defaulting to 1000 [ 366.164562][T19220] lo speed is unknown, defaulting to 1000 [ 366.191326][T19220] lo speed is unknown, defaulting to 1000 [ 366.197426][T19220] lo speed is unknown, defaulting to 1000 [ 366.205846][T19220] lo speed is unknown, defaulting to 1000 [ 366.213840][T19220] lo speed is unknown, defaulting to 1000 [ 366.223986][T19220] lo speed is unknown, defaulting to 1000 [ 366.232150][T19220] lo speed is unknown, defaulting to 1000 [ 366.238476][T19220] lo speed is unknown, defaulting to 1000 [ 366.249963][T19220] lo speed is unknown, defaulting to 1000 [ 366.256630][T19220] lo speed is unknown, defaulting to 1000 [ 366.263398][T19220] lo speed is unknown, defaulting to 1000 [ 366.278863][T19220] lo speed is unknown, defaulting to 1000 [ 366.296124][T19220] lo speed is unknown, defaulting to 1000 [ 366.313100][T19220] lo speed is unknown, defaulting to 1000 [ 366.325848][T19220] lo speed is unknown, defaulting to 1000 [ 366.351524][T19220] lo speed is unknown, defaulting to 1000 [ 366.357724][T19220] lo speed is unknown, defaulting to 1000 [ 366.372143][T19364] netdevsim netdevsim8 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 366.400148][T19220] lo speed is unknown, defaulting to 1000 [ 366.410355][T19220] lo speed is unknown, defaulting to 1000 [ 366.419345][T19220] lo speed is unknown, defaulting to 1000 [ 366.428830][T19364] netdevsim netdevsim8 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 366.448167][T19220] lo speed is unknown, defaulting to 1000 [ 366.454331][T19220] lo speed is unknown, defaulting to 1000 [ 366.461750][T19220] lo speed is unknown, defaulting to 1000 [ 366.486490][T19220] lo speed is unknown, defaulting to 1000 [ 366.494048][T19220] lo speed is unknown, defaulting to 1000 [ 366.500565][T19220] lo speed is unknown, defaulting to 1000 [ 366.507308][T19220] lo speed is unknown, defaulting to 1000 [ 366.514031][T19220] lo speed is unknown, defaulting to 1000 [ 366.522421][T19364] netdevsim netdevsim8 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 366.533713][T19220] lo speed is unknown, defaulting to 1000 [ 366.540066][T19220] lo speed is unknown, defaulting to 1000 [ 366.546315][T19220] lo speed is unknown, defaulting to 1000 [ 366.559128][T19220] lo speed is unknown, defaulting to 1000 [ 366.565528][T19220] lo speed is unknown, defaulting to 1000 [ 366.571696][T19220] lo speed is unknown, defaulting to 1000 [ 366.583591][T19220] lo speed is unknown, defaulting to 1000 [ 366.589739][T19220] lo speed is unknown, defaulting to 1000 [ 366.601177][T19220] lo speed is unknown, defaulting to 1000 [ 366.610152][T19364] netdevsim netdevsim8 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 366.625608][T19220] lo speed is unknown, defaulting to 1000 [ 366.632120][T19220] lo speed is unknown, defaulting to 1000 [ 366.638860][T19220] lo speed is unknown, defaulting to 1000 [ 366.649815][T19220] lo speed is unknown, defaulting to 1000 [ 366.651362][ T29] kauditd_printk_skb: 91 callbacks suppressed [ 366.651380][ T29] audit: type=1400 audit(2000000030.400:15553): avc: denied { create } for pid=19371 comm="syz.0.5907" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 366.659519][T19220] lo speed is unknown, defaulting to 1000 [ 366.670867][ T29] audit: type=1400 audit(2000000030.419:15554): avc: denied { read write } for pid=19371 comm="syz.0.5907" name="ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 366.682155][T19220] lo speed is unknown, defaulting to 1000 [ 366.682534][T19220] lo speed is unknown, defaulting to 1000 [ 366.682807][T19220] lo speed is unknown, defaulting to 1000 [ 366.683178][T19220] lo speed is unknown, defaulting to 1000 [ 366.697636][ T29] audit: type=1400 audit(2000000030.437:15555): avc: denied { open } for pid=19371 comm="syz.0.5907" path="/dev/ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 366.714220][T19220] lo speed is unknown, defaulting to 1000 [ 366.766838][T19220] lo speed is unknown, defaulting to 1000 [ 366.779553][T19364] netdevsim netdevsim8 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 366.788476][T19220] lo speed is unknown, defaulting to 1000 [ 366.794613][T19220] lo speed is unknown, defaulting to 1000 [ 366.804346][T19364] netdevsim netdevsim8 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 366.813235][T19220] lo speed is unknown, defaulting to 1000 [ 366.822922][T19364] netdevsim netdevsim8 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 366.845771][T19364] netdevsim netdevsim8 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 366.887502][ T29] audit: type=1400 audit(2000000030.615:15556): avc: denied { bind } for pid=19378 comm="syz.5.5910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 366.926103][ T29] audit: type=1400 audit(2000000030.615:15557): avc: denied { write } for pid=19378 comm="syz.5.5910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 367.033759][ T29] audit: type=1400 audit(2000000030.755:15558): avc: denied { create } for pid=19378 comm="syz.5.5910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 367.285363][ T29] audit: type=1400 audit(2000000030.980:15559): avc: denied { setopt } for pid=19394 comm="syz.6.5916" lport=4 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 367.307408][ T29] audit: type=1400 audit(2000000030.980:15560): avc: denied { bind } for pid=19394 comm="syz.6.5916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 367.325127][T19395] FAULT_INJECTION: forcing a failure. [ 367.325127][T19395] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 367.327096][ T29] audit: type=1400 audit(2000000030.989:15561): avc: denied { name_bind } for pid=19394 comm="syz.6.5916" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 367.327140][ T29] audit: type=1400 audit(2000000030.989:15562): avc: denied { node_bind } for pid=19394 comm="syz.6.5916" saddr=ff02::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 367.327598][ T10] IPv4: Oversized IP packet from 127.0.0.1 [ 367.341359][T19395] CPU: 1 UID: 0 PID: 19395 Comm: syz.6.5916 Not tainted 6.14.0-syzkaller-09584-g7d06015d936c #0 PREEMPT(voluntary) [ 367.341395][T19395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 367.341415][T19395] Call Trace: [ 367.341425][T19395] [ 367.341435][T19395] dump_stack_lvl+0xf6/0x150 [ 367.341472][T19395] dump_stack+0x15/0x1a [ 367.341494][T19395] should_fail_ex+0x261/0x270 [ 367.341558][T19395] should_fail+0xb/0x10 [ 367.341593][T19395] should_fail_usercopy+0x1a/0x20 [ 367.341638][T19395] _copy_from_user+0x1c/0xa0 [ 367.341720][T19395] copy_msghdr_from_user+0x54/0x2b0 [ 367.341749][T19395] ? __fget_files+0x186/0x1c0 [ 367.341785][T19395] do_recvmmsg+0x24d/0x6e0 [ 367.341840][T19395] __x64_sys_recvmmsg+0xe4/0x170 [ 367.341884][T19395] x64_sys_call+0x1b90/0x2e10 [ 367.341928][T19395] do_syscall_64+0xc9/0x1c0 [ 367.341965][T19395] ? clear_bhb_loop+0x25/0x80 [ 367.342054][T19395] ? clear_bhb_loop+0x25/0x80 [ 367.342082][T19395] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 367.342196][T19395] RIP: 0033:0x7f4c6593d169 [ 367.342292][T19395] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 367.342316][T19395] RSP: 002b:00007f4c63fa7038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 367.342343][T19395] RAX: ffffffffffffffda RBX: 00007f4c65b55fa0 RCX: 00007f4c6593d169 [ 367.342360][T19395] RDX: 0000000000000001 RSI: 0000200000000940 RDI: 0000000000000007 [ 367.342375][T19395] RBP: 00007f4c63fa7090 R08: 0000000000000000 R09: 0000000000000000 [ 367.342391][T19395] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000000001 [ 367.342460][T19395] R13: 0000000000000000 R14: 00007f4c65b55fa0 R15: 00007fff327bc9a8 [ 367.342485][T19395] [ 367.438196][T19397] netlink: 32 bytes leftover after parsing attributes in process `syz.6.5916'. [ 367.442463][ C0] IPv4: Oversized IP packet from 127.0.0.1 [ 367.579378][ C0] IPv4: Oversized IP packet from 127.0.0.1 [ 367.853382][T19412] netlink: 8 bytes leftover after parsing attributes in process `syz.8.5923'. [ 367.951513][T19417] tipc: Started in network mode [ 367.956429][T19417] tipc: Node identity 4, cluster identity 4711 [ 367.962751][T19417] tipc: Node number set to 4 [ 368.798962][T19431] netlink: 64 bytes leftover after parsing attributes in process `syz.5.5929'. [ 369.259688][T19433] lo speed is unknown, defaulting to 1000 [ 370.222512][T19470] netlink: 8 bytes leftover after parsing attributes in process `syz.5.5946'. [ 370.240885][T19470] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 370.364608][T19485] lo speed is unknown, defaulting to 1000 [ 370.499468][T19486] FAULT_INJECTION: forcing a failure. [ 370.499468][T19486] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 370.512854][T19486] CPU: 0 UID: 0 PID: 19486 Comm: syz.8.5948 Not tainted 6.14.0-syzkaller-09584-g7d06015d936c #0 PREEMPT(voluntary) [ 370.512887][T19486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 370.512940][T19486] Call Trace: [ 370.512946][T19486] [ 370.512952][T19486] dump_stack_lvl+0xf6/0x150 [ 370.512981][T19486] dump_stack+0x15/0x1a [ 370.513002][T19486] should_fail_ex+0x261/0x270 [ 370.513039][T19486] should_fail_alloc_page+0xfd/0x110 [ 370.513067][T19486] __alloc_frozen_pages_noprof+0x11e/0x340 [ 370.513161][T19486] alloc_pages_mpol+0xb6/0x260 [ 370.513191][T19486] folio_alloc_mpol_noprof+0x36/0x80 [ 370.513219][T19486] shmem_get_folio_gfp+0x3c1/0xd30 [ 370.513258][T19486] shmem_write_begin+0xa7/0x190 [ 370.513324][T19486] generic_perform_write+0x189/0x4b0 [ 370.513360][T19486] ? inode_update_timestamps+0x1c6/0x250 [ 370.513392][T19486] shmem_file_write_iter+0xc2/0xe0 [ 370.513424][T19486] iter_file_splice_write+0x5f2/0x980 [ 370.513474][T19486] ? __pfx_iter_file_splice_write+0x10/0x10 [ 370.513514][T19486] direct_splice_actor+0x160/0x2c0 [ 370.513577][T19486] splice_direct_to_actor+0x305/0x680 [ 370.513600][T19486] ? __pfx_direct_splice_actor+0x10/0x10 [ 370.513621][T19486] do_splice_direct+0xd9/0x150 [ 370.513638][T19486] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 370.513661][T19486] do_sendfile+0x40a/0x690 [ 370.513774][T19486] __x64_sys_sendfile64+0x113/0x160 [ 370.513806][T19486] x64_sys_call+0xfc3/0x2e10 [ 370.513836][T19486] do_syscall_64+0xc9/0x1c0 [ 370.513864][T19486] ? clear_bhb_loop+0x25/0x80 [ 370.513884][T19486] ? clear_bhb_loop+0x25/0x80 [ 370.513908][T19486] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 370.513933][T19486] RIP: 0033:0x7fddfef3d169 [ 370.513951][T19486] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 370.514043][T19486] RSP: 002b:00007fddfd57e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 370.514111][T19486] RAX: ffffffffffffffda RBX: 00007fddff156080 RCX: 00007fddfef3d169 [ 370.514124][T19486] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000008 [ 370.514135][T19486] RBP: 00007fddfd57e090 R08: 0000000000000000 R09: 0000000000000000 [ 370.514150][T19486] R10: 0000000080000000 R11: 0000000000000246 R12: 0000000000000001 [ 370.514164][T19486] R13: 0000000000000000 R14: 00007fddff156080 R15: 00007ffe8a5ffa58 [ 370.514186][T19486] [ 370.894324][T19497] batadv3: entered promiscuous mode [ 370.901662][T19491] lo speed is unknown, defaulting to 1000 [ 371.021267][T19503] set match dimension is over the limit! [ 371.044740][T19505] FAULT_INJECTION: forcing a failure. [ 371.044740][T19505] name failslab, interval 1, probability 0, space 0, times 0 [ 371.057441][T19505] CPU: 1 UID: 0 PID: 19505 Comm: syz.0.5958 Not tainted 6.14.0-syzkaller-09584-g7d06015d936c #0 PREEMPT(voluntary) [ 371.057474][T19505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 371.057489][T19505] Call Trace: [ 371.057496][T19505] [ 371.057504][T19505] dump_stack_lvl+0xf6/0x150 [ 371.057527][T19505] dump_stack+0x15/0x1a [ 371.057544][T19505] should_fail_ex+0x261/0x270 [ 371.057640][T19505] should_failslab+0x8f/0xb0 [ 371.057683][T19505] __kmalloc_noprof+0xad/0x410 [ 371.057708][T19505] ? sock_kmalloc+0x83/0xc0 [ 371.057738][T19505] sock_kmalloc+0x83/0xc0 [ 371.057773][T19505] ____sys_sendmsg+0x12c/0x4e0 [ 371.057921][T19505] ? copy_msghdr_from_user+0x25d/0x2b0 [ 371.057997][T19505] __sys_sendmsg+0x1a0/0x240 [ 371.058043][T19505] __x64_sys_sendmsg+0x46/0x50 [ 371.058143][T19505] x64_sys_call+0x26f3/0x2e10 [ 371.058165][T19505] do_syscall_64+0xc9/0x1c0 [ 371.058192][T19505] ? clear_bhb_loop+0x25/0x80 [ 371.058212][T19505] ? clear_bhb_loop+0x25/0x80 [ 371.058235][T19505] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 371.058331][T19505] RIP: 0033:0x7f7fbbdbd169 [ 371.058347][T19505] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 371.058366][T19505] RSP: 002b:00007f7fba427038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 371.058384][T19505] RAX: ffffffffffffffda RBX: 00007f7fbbfd5fa0 RCX: 00007f7fbbdbd169 [ 371.058396][T19505] RDX: 0000000000000000 RSI: 0000200000000100 RDI: 0000000000000005 [ 371.058488][T19505] RBP: 00007f7fba427090 R08: 0000000000000000 R09: 0000000000000000 [ 371.058500][T19505] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 371.058512][T19505] R13: 0000000000000000 R14: 00007f7fbbfd5fa0 R15: 00007fffab734158 [ 371.058534][T19505] [ 371.488069][T19523] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 371.524129][T19527] FAULT_INJECTION: forcing a failure. [ 371.524129][T19527] name failslab, interval 1, probability 0, space 0, times 0 [ 371.536933][T19527] CPU: 0 UID: 0 PID: 19527 Comm: syz.0.5967 Not tainted 6.14.0-syzkaller-09584-g7d06015d936c #0 PREEMPT(voluntary) [ 371.536958][T19527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 371.536972][T19527] Call Trace: [ 371.536988][T19527] [ 371.536998][T19527] dump_stack_lvl+0xf6/0x150 [ 371.537025][T19527] dump_stack+0x15/0x1a [ 371.537045][T19527] should_fail_ex+0x261/0x270 [ 371.537082][T19527] should_failslab+0x8f/0xb0 [ 371.537103][T19527] kmem_cache_alloc_noprof+0x59/0x340 [ 371.537190][T19527] ? dst_alloc+0xc0/0x100 [ 371.537223][T19527] dst_alloc+0xc0/0x100 [ 371.537271][T19527] ip_route_output_key_hash_rcu+0xb90/0x12e0 [ 371.537317][T19527] ip_route_output_flow+0x7e/0x130 [ 371.537465][T19527] udp_sendmsg+0xe9f/0x1350 [ 371.537540][T19527] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 371.537577][T19527] ? avc_has_perm+0xd6/0x150 [ 371.537694][T19527] ? __pfx_udp_sendmsg+0x10/0x10 [ 371.537719][T19527] inet_sendmsg+0xaf/0xd0 [ 371.537765][T19527] __sock_sendmsg+0x102/0x180 [ 371.537788][T19527] ____sys_sendmsg+0x350/0x4e0 [ 371.537827][T19527] __sys_sendmmsg+0x22a/0x4b0 [ 371.537877][T19527] __x64_sys_sendmmsg+0x57/0x70 [ 371.537966][T19527] x64_sys_call+0x2b53/0x2e10 [ 371.537993][T19527] do_syscall_64+0xc9/0x1c0 [ 371.538027][T19527] ? clear_bhb_loop+0x25/0x80 [ 371.538051][T19527] ? clear_bhb_loop+0x25/0x80 [ 371.538078][T19527] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 371.538103][T19527] RIP: 0033:0x7f7fbbdbd169 [ 371.538139][T19527] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 371.538157][T19527] RSP: 002b:00007f7fba427038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 371.538180][T19527] RAX: ffffffffffffffda RBX: 00007f7fbbfd5fa0 RCX: 00007f7fbbdbd169 [ 371.538195][T19527] RDX: 000000000800001d RSI: 0000200000007fc0 RDI: 0000000000000006 [ 371.538208][T19527] RBP: 00007f7fba427090 R08: 0000000000000000 R09: 0000000000000000 [ 371.538219][T19527] R10: 0000000000001008 R11: 0000000000000246 R12: 0000000000000001 [ 371.538282][T19527] R13: 0000000000000000 R14: 00007f7fbbfd5fa0 R15: 00007fffab734158 [ 371.538305][T19527] [ 371.937260][T19532] rdma_op ffff88816ae05d80 conn xmit_rdma 0000000000000000 [ 372.003970][ T29] kauditd_printk_skb: 121 callbacks suppressed [ 372.003991][ T29] audit: type=1326 audit(2000000035.404:15684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19539 comm="syz.2.5973" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb36aa3d169 code=0x7ffc0000 [ 372.035388][ T29] audit: type=1326 audit(2000000035.404:15685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19539 comm="syz.2.5973" exe="/root/syz-executor" sig=0 arch=c000003e syscall=440 compat=0 ip=0x7fb36aa3d169 code=0x7ffc0000 [ 372.059659][ T29] audit: type=1326 audit(2000000035.404:15686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19539 comm="syz.2.5973" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb36aa3d169 code=0x7ffc0000 [ 372.084001][ T29] audit: type=1326 audit(2000000035.404:15687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19539 comm="syz.2.5973" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb36aa3d169 code=0x7ffc0000 [ 372.148926][T19531] lo speed is unknown, defaulting to 1000 [ 372.444999][T19555] lo speed is unknown, defaulting to 1000 [ 372.794098][ T29] audit: type=1400 audit(2000000036.134:15688): avc: denied { bind } for pid=19549 comm="syz.6.5977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 372.853854][ T29] audit: type=1400 audit(2000000036.143:15689): avc: denied { setopt } for pid=19549 comm="syz.6.5977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 373.076792][T19563] syz_tun (unregistering): left allmulticast mode [ 373.083508][T19563] syz_tun (unregistering): left promiscuous mode [ 373.090052][T19563] bridge0: port 3(syz_tun) entered disabled state [ 373.184270][ T29] audit: type=1400 audit(2000000036.499:15690): avc: denied { connect } for pid=19565 comm="syz.0.5981" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 373.239294][ T29] audit: type=1400 audit(2000000036.555:15691): avc: denied { getopt } for pid=19565 comm="syz.0.5981" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 373.239732][T19566] netlink: 16 bytes leftover after parsing attributes in process `syz.0.5981'. [ 373.269496][T19566] netlink: 16 bytes leftover after parsing attributes in process `syz.0.5981'. [ 373.278513][T19566] netlink: 16 bytes leftover after parsing attributes in process `syz.0.5981'. [ 373.311735][T19566] netlink: 16 bytes leftover after parsing attributes in process `syz.0.5981'. [ 373.320951][T19566] netlink: 16 bytes leftover after parsing attributes in process `syz.0.5981'. [ 373.330158][T19566] netlink: 16 bytes leftover after parsing attributes in process `syz.0.5981'. [ 373.375391][T19566] netlink: 16 bytes leftover after parsing attributes in process `syz.0.5981'. [ 373.384434][T19566] netlink: 16 bytes leftover after parsing attributes in process `syz.0.5981'. [ 373.394772][T19566] netlink: 16 bytes leftover after parsing attributes in process `syz.0.5981'. [ 373.487655][ T29] audit: type=1326 audit(2000000036.789:15692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19582 comm="syz.2.5986" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb36aa3d169 code=0x7ffc0000 [ 373.511654][ C0] EXT4-fs (loop0): error count since last fsck: 5 [ 373.511676][ C0] EXT4-fs (loop0): last error at time 1743296361: ext4_lookup:1793: inode 2 [ 373.541923][ T29] audit: type=1326 audit(2000000036.789:15693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19582 comm="syz.2.5986" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb36aa3d169 code=0x7ffc0000 [ 373.812919][T19592] lo speed is unknown, defaulting to 1000 [ 373.859836][T19597] netlink: 'syz.8.5992': attribute type 4 has an invalid length. [ 374.043972][T19597] netlink: 'syz.8.5992': attribute type 4 has an invalid length. [ 374.187172][T19604] bridge0: entered promiscuous mode [ 374.192529][T19604] macvlan2: entered promiscuous mode [ 374.199844][T19604] bridge0: port 4(macvlan2) entered blocking state [ 374.206437][T19604] bridge0: port 4(macvlan2) entered disabled state [ 374.224295][T19604] macvlan2: entered allmulticast mode [ 374.230435][T19604] bridge0: entered allmulticast mode [ 374.250155][T19604] macvlan2: left allmulticast mode [ 374.255395][T19604] bridge0: left allmulticast mode [ 374.287746][T19604] bridge0: left promiscuous mode [ 374.339758][T19590] lo speed is unknown, defaulting to 1000 [ 374.519695][T19599] lo speed is unknown, defaulting to 1000 [ 374.765937][T19628] netdevsim netdevsim6 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 374.833312][T19628] netdevsim netdevsim6 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 374.846781][T19630] bridge0: received packet on syz_tun with own address as source address (addr:aa:aa:aa:aa:aa:aa, vlan:0) [ 374.892262][T19628] netdevsim netdevsim6 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 374.955998][T19628] netdevsim netdevsim6 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 375.005571][T19640] tipc: Started in network mode [ 375.010530][T19640] tipc: Node identity 4, cluster identity 4711 [ 375.016712][T19640] tipc: Node number set to 4 [ 375.032850][T19628] netdevsim netdevsim6 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 375.046305][T19628] netdevsim netdevsim6 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 375.064888][T19628] netdevsim netdevsim6 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 375.082040][T19628] netdevsim netdevsim6 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 375.331126][T19649] lo speed is unknown, defaulting to 1000 [ 375.594474][T19652] __nla_validate_parse: 1 callbacks suppressed [ 375.594493][T19652] netlink: 8 bytes leftover after parsing attributes in process `syz.0.6007'. [ 375.610290][T19652] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 376.046943][T19670] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 376.056390][T19670] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 376.239675][T19672] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 376.248389][T19672] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 377.397605][ T29] kauditd_printk_skb: 29 callbacks suppressed [ 377.397622][ T29] audit: type=1326 audit(2000000040.446:15723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19687 comm="syz.8.6022" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fddfef3d169 code=0x7ffc0000 [ 377.428089][ T29] audit: type=1326 audit(2000000040.446:15724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19687 comm="syz.8.6022" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fddfef3d169 code=0x7ffc0000 [ 377.452716][ T29] audit: type=1326 audit(2000000040.446:15725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19687 comm="syz.8.6022" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fddfef3d169 code=0x7ffc0000 [ 377.476408][ T29] audit: type=1326 audit(2000000040.446:15726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19687 comm="syz.8.6022" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fddfef3d169 code=0x7ffc0000 [ 377.501470][ T29] audit: type=1326 audit(2000000040.446:15727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19687 comm="syz.8.6022" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fddfef3d169 code=0x7ffc0000 [ 377.525370][ T29] audit: type=1326 audit(2000000040.446:15728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19687 comm="syz.8.6022" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fddfef3d169 code=0x7ffc0000 [ 377.550529][ T29] audit: type=1326 audit(2000000040.446:15729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19687 comm="syz.8.6022" exe="/root/syz-executor" sig=0 arch=c000003e syscall=246 compat=0 ip=0x7fddfef3d169 code=0x7ffc0000 [ 377.575363][ T29] audit: type=1326 audit(2000000040.446:15730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19687 comm="syz.8.6022" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fddfef3d169 code=0x7ffc0000 [ 377.598990][ T29] audit: type=1326 audit(2000000040.446:15731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19687 comm="syz.8.6022" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fddfef3d169 code=0x7ffc0000 [ 377.807712][ T29] audit: type=1326 audit(2000000040.830:15732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19708 comm="syz.0.6032" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7fbbdbd169 code=0x7ffc0000 [ 377.995267][T19721] SELinux: ebitmap: truncated map [ 378.010875][T19721] SELinux: failed to load policy [ 378.092940][T19710] $Hÿ: renamed from bond0 (while UP) [ 378.105102][T19710] $Hÿ: entered promiscuous mode [ 378.110251][T19710] bond_slave_0: entered promiscuous mode [ 378.116044][T19710] bond_slave_1: entered promiscuous mode [ 378.162359][T19732] netlink: 32 bytes leftover after parsing attributes in process `syz.0.6041'. [ 378.166966][T19723] lo speed is unknown, defaulting to 1000 [ 378.678204][T19749] 9p: Unknown access argument „: -22 [ 378.967659][T19785] lo speed is unknown, defaulting to 1000 [ 379.202718][T19802] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 379.216592][T19802] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 379.448443][T19804] netlink: 'syz.2.6071': attribute type 4 has an invalid length. [ 379.471914][T19804] netlink: 'syz.2.6071': attribute type 4 has an invalid length. [ 379.580648][T19816] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6077'. [ 379.589862][T19816] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 379.986330][T19832] FAULT_INJECTION: forcing a failure. [ 379.986330][T19832] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 379.999531][T19832] CPU: 1 UID: 0 PID: 19832 Comm: syz.0.6084 Not tainted 6.14.0-syzkaller-09584-g7d06015d936c #0 PREEMPT(voluntary) [ 379.999562][T19832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 379.999576][T19832] Call Trace: [ 379.999583][T19832] [ 379.999591][T19832] dump_stack_lvl+0xf6/0x150 [ 379.999619][T19832] dump_stack+0x15/0x1a [ 379.999638][T19832] should_fail_ex+0x261/0x270 [ 379.999703][T19832] should_fail+0xb/0x10 [ 379.999730][T19832] should_fail_usercopy+0x1a/0x20 [ 379.999766][T19832] _copy_from_user+0x1c/0xa0 [ 379.999859][T19832] vt_do_kdsk_ioctl+0x58/0x710 [ 379.999953][T19832] ? security_capable+0x81/0x90 [ 379.999990][T19832] vt_ioctl+0x904/0x18e0 [ 380.000024][T19832] ? tty_jobctrl_ioctl+0x2ab/0x810 [ 380.000048][T19832] tty_ioctl+0x815/0xbe0 [ 380.000078][T19832] ? __pfx_tty_ioctl+0x10/0x10 [ 380.000170][T19832] __se_sys_ioctl+0xc9/0x140 [ 380.000208][T19832] __x64_sys_ioctl+0x43/0x50 [ 380.000269][T19832] x64_sys_call+0x168d/0x2e10 [ 380.000353][T19832] do_syscall_64+0xc9/0x1c0 [ 380.000387][T19832] ? clear_bhb_loop+0x25/0x80 [ 380.000414][T19832] ? clear_bhb_loop+0x25/0x80 [ 380.000503][T19832] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 380.000529][T19832] RIP: 0033:0x7f7fbbdbd169 [ 380.000545][T19832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 380.000606][T19832] RSP: 002b:00007f7fba427038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 380.000629][T19832] RAX: ffffffffffffffda RBX: 00007f7fbbfd5fa0 RCX: 00007f7fbbdbd169 [ 380.000644][T19832] RDX: 0000200000000400 RSI: 0000000000004b47 RDI: 0000000000000003 [ 380.000659][T19832] RBP: 00007f7fba427090 R08: 0000000000000000 R09: 0000000000000000 [ 380.000674][T19832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 380.000688][T19832] R13: 0000000000000000 R14: 00007f7fbbfd5fa0 R15: 00007fffab734158 [ 380.000711][T19832] [ 380.256997][T19810] lo speed is unknown, defaulting to 1000 [ 380.335179][T19825] lo speed is unknown, defaulting to 1000 [ 380.616746][T19854] macvlan2: entered promiscuous mode [ 380.622914][T19854] bridge0: entered promiscuous mode [ 380.672959][T19854] bridge0: port 3(macvlan2) entered blocking state [ 380.680389][T19854] bridge0: port 3(macvlan2) entered disabled state [ 380.711453][T19854] macvlan2: entered allmulticast mode [ 380.717517][T19854] bridge0: entered allmulticast mode [ 380.729338][T19846] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6088'. [ 380.745736][T19854] macvlan2: left allmulticast mode [ 380.751679][T19854] bridge0: left allmulticast mode [ 380.769976][T19854] bridge0: left promiscuous mode [ 380.797993][T19846] syz_tun: left allmulticast mode [ 380.803931][T19846] syz_tun: left promiscuous mode [ 380.809043][T19846] bridge0: port 3(syz_tun) entered disabled state [ 380.838343][T19846] bridge_slave_1: left allmulticast mode [ 380.844140][T19846] bridge_slave_1: left promiscuous mode [ 380.849980][T19846] bridge0: port 2(bridge_slave_1) entered disabled state [ 380.927595][T19846] bridge_slave_0: left allmulticast mode [ 380.934127][T19846] bridge_slave_0: left promiscuous mode [ 380.939888][T19846] bridge0: port 1(bridge_slave_0) entered disabled state [ 381.102752][T19871] netlink: 8 bytes leftover after parsing attributes in process `syz.5.6100'. [ 381.137354][T19871] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 381.147394][T19873] smc: net device bond0 applied user defined pnetid SYZ0 [ 381.176062][T19873] smc: net device bond0 erased user defined pnetid SYZ0 [ 381.211094][T19876] netlink: 28 bytes leftover after parsing attributes in process `syz.5.6101'. [ 381.572505][T19896] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6111'. [ 381.581697][T19896] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 381.645760][T19904] netlink: 28 bytes leftover after parsing attributes in process `syz.0.6114'. [ 381.656143][T19900] nfs: Unexpected value for 'acl' [ 381.873510][T19910] bond1: entered promiscuous mode [ 381.878598][T19910] bond1: entered allmulticast mode [ 381.890665][T19910] 8021q: adding VLAN 0 to HW filter on device bond1 [ 381.934283][T19910] bond1 (unregistering): Released all slaves [ 382.147016][T19925] netlink: 8 bytes leftover after parsing attributes in process `syz.6.6124'. [ 382.177043][T19925] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 382.201665][T19929] netlink: 36 bytes leftover after parsing attributes in process `syz.2.6123'. [ 382.217824][T19929] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6123'. [ 382.273728][T19929] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19929 comm=syz.2.6123 [ 382.314669][T19938] veth1_macvtap: left promiscuous mode [ 382.321719][T19940] netlink: 'syz.5.6130': attribute type 10 has an invalid length. [ 382.322739][T19938] macsec0: entered promiscuous mode [ 382.382065][T19940] team0: Port device dummy0 added [ 382.425232][T19943] team0: Port device dummy0 removed [ 382.446214][T19943] bridge_slave_0: left allmulticast mode [ 382.452684][T19943] bridge_slave_0: left promiscuous mode [ 382.458477][T19943] bridge0: port 1(bridge_slave_0) entered disabled state [ 382.469188][T19947] nfs: Unexpected value for 'acl' [ 382.475147][T19943] bond0: (slave bond_slave_0): Releasing backup interface [ 382.489832][T19943] bond0: (slave bond_slave_1): Releasing backup interface [ 382.511689][T19943] team0: Port device team_slave_0 removed [ 382.536597][T19943] team0: Port device team_slave_1 removed [ 382.545712][T19943] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 382.553521][T19943] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 382.564578][T19943] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 382.572257][T19943] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 382.592809][T19943] hsr0: left allmulticast mode [ 382.597697][T19943] hsr_slave_0: left allmulticast mode [ 382.603242][T19943] hsr_slave_1: left allmulticast mode [ 382.608725][T19943] hsr0: left promiscuous mode [ 382.613695][T19943] bridge0: port 2(hsr0) entered disabled state [ 382.632561][ T9] lo speed is unknown, defaulting to 1000 [ 382.657409][T19945] bond1: entered promiscuous mode [ 382.662790][T19945] bond1: entered allmulticast mode [ 382.713072][T19945] 8021q: adding VLAN 0 to HW filter on device bond1 [ 382.766203][T19945] bond1 (unregistering): Released all slaves [ 382.853132][T19962] netlink: 8 bytes leftover after parsing attributes in process `syz.5.6137'. [ 382.867912][T19962] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 382.963261][ T29] kauditd_printk_skb: 230 callbacks suppressed [ 382.963280][ T29] audit: type=1326 audit(2000000045.656:15963): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19965 comm="syz.0.6140" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7fbbdbd169 code=0x7ffc0000 [ 383.030305][ T29] audit: type=1326 audit(2000000045.656:15964): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19965 comm="syz.0.6140" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7fbbdbd169 code=0x7ffc0000 [ 383.054049][ T29] audit: type=1326 audit(2000000045.656:15965): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19965 comm="syz.0.6140" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7fbbdbd169 code=0x7ffc0000 [ 383.079065][ T29] audit: type=1326 audit(2000000045.656:15966): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19965 comm="syz.0.6140" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7fbbdbd169 code=0x7ffc0000 [ 383.103541][ T29] audit: type=1326 audit(2000000045.656:15967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19965 comm="syz.0.6140" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7fbbdbd169 code=0x7ffc0000 [ 383.127883][ T29] audit: type=1326 audit(2000000045.656:15968): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19965 comm="syz.0.6140" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat=0 ip=0x7f7fbbdbd169 code=0x7ffc0000 [ 383.152283][ T29] audit: type=1326 audit(2000000045.656:15969): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19965 comm="syz.0.6140" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7fbbdbd169 code=0x7ffc0000 [ 383.177570][ T29] audit: type=1326 audit(2000000045.656:15970): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19965 comm="syz.0.6140" exe="/root/syz-executor" sig=0 arch=c000003e syscall=226 compat=0 ip=0x7f7fbbdbd169 code=0x7ffc0000 [ 383.201236][ T29] audit: type=1326 audit(2000000045.656:15971): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19965 comm="syz.0.6140" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7fbbdbd169 code=0x7ffc0000 [ 383.226186][ T29] audit: type=1326 audit(2000000045.656:15972): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19965 comm="syz.0.6140" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7fbbdbd169 code=0x7ffc0000 [ 383.686327][T19985] FAULT_INJECTION: forcing a failure. [ 383.686327][T19985] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 383.699596][T19985] CPU: 1 UID: 0 PID: 19985 Comm: syz.8.6148 Not tainted 6.14.0-syzkaller-09584-g7d06015d936c #0 PREEMPT(voluntary) [ 383.699687][T19985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 383.699703][T19985] Call Trace: [ 383.699710][T19985] [ 383.699718][T19985] dump_stack_lvl+0xf6/0x150 [ 383.699747][T19985] dump_stack+0x15/0x1a [ 383.699768][T19985] should_fail_ex+0x261/0x270 [ 383.699829][T19985] should_fail+0xb/0x10 [ 383.699864][T19985] should_fail_usercopy+0x1a/0x20 [ 383.699974][T19985] _copy_from_user+0x1c/0xa0 [ 383.700002][T19985] copy_from_sockptr+0x65/0xb0 [ 383.700034][T19985] ip_mroute_setsockopt+0x525/0x950 [ 383.700072][T19985] do_ip_setsockopt+0xd06/0x22a0 [ 383.700206][T19985] ip_setsockopt+0x63/0x100 [ 383.700235][T19985] raw_setsockopt+0x10f/0x170 [ 383.700260][T19985] sock_common_setsockopt+0x64/0x80 [ 383.700285][T19985] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 383.700326][T19985] __sys_setsockopt+0x187/0x200 [ 383.700360][T19985] __x64_sys_setsockopt+0x66/0x80 [ 383.700392][T19985] x64_sys_call+0x2a09/0x2e10 [ 383.700465][T19985] do_syscall_64+0xc9/0x1c0 [ 383.700495][T19985] ? clear_bhb_loop+0x25/0x80 [ 383.700523][T19985] ? clear_bhb_loop+0x25/0x80 [ 383.700579][T19985] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 383.700602][T19985] RIP: 0033:0x7fddfef3d169 [ 383.700621][T19985] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 383.700702][T19985] RSP: 002b:00007fddfd59f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 383.700725][T19985] RAX: ffffffffffffffda RBX: 00007fddff155fa0 RCX: 00007fddfef3d169 [ 383.700741][T19985] RDX: 00000000000000ca RSI: 0000000000000000 RDI: 0000000000000003 [ 383.700755][T19985] RBP: 00007fddfd59f090 R08: 0000000000000010 R09: 0000000000000000 [ 383.700843][T19985] R10: 00002000000000c0 R11: 0000000000000246 R12: 0000000000000001 [ 383.700858][T19985] R13: 0000000000000000 R14: 00007fddff155fa0 R15: 00007ffe8a5ffa58 [ 383.700880][T19985] [ 384.166380][T19991] bond1: entered promiscuous mode [ 384.171588][T19991] bond1: entered allmulticast mode [ 384.178416][T19991] 8021q: adding VLAN 0 to HW filter on device bond1 [ 384.213211][T19991] bond1 (unregistering): Released all slaves [ 384.702466][T20006] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5425 sclass=netlink_route_socket pid=20006 comm=syz.6.6156 [ 384.990845][T20006] syzkaller1: entered promiscuous mode [ 384.996444][T20006] syzkaller1: entered allmulticast mode [ 385.103579][T20028] bridge0: entered promiscuous mode [ 385.138958][T20028] macvlan2: entered promiscuous mode [ 385.151146][T20028] bridge0: port 3(macvlan2) entered blocking state [ 385.157836][T20028] bridge0: port 3(macvlan2) entered disabled state [ 385.171859][T20028] macvlan2: entered allmulticast mode [ 385.178129][T20028] bridge0: entered allmulticast mode [ 385.188545][T20028] macvlan2: left allmulticast mode [ 385.193715][T20028] bridge0: left allmulticast mode [ 385.201095][T20028] bridge0: left promiscuous mode [ 385.201367][T20035] netlink: 28 bytes leftover after parsing attributes in process `syz.6.6169'. [ 385.331567][T20041] smc: net device bond0 applied user defined pnetid SYZ0 [ 385.354011][T20041] smc: net device bond0 erased user defined pnetid SYZ0 [ 385.675804][T20060] netlink: 8 bytes leftover after parsing attributes in process `syz.5.6179'. [ 385.686178][T20060] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 385.959150][T20081] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 386.242787][T20101] smc: net device bond0 applied user defined pnetid SYZ0 [ 386.251292][T20101] smc: net device bond0 erased user defined pnetid SYZ0 [ 386.345483][T20107] nfs: Unexpected value for 'acl' [ 386.420604][T20114] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 386.668116][T20123] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 386.773854][T20123] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 386.897615][T20123] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 386.923516][T20134] __nla_validate_parse: 4 callbacks suppressed [ 386.923536][T20134] netlink: 36 bytes leftover after parsing attributes in process `syz.6.6210'. [ 386.972175][T20123] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 386.986528][T20134] netlink: 4 bytes leftover after parsing attributes in process `syz.6.6210'. [ 387.033914][T20124] lo speed is unknown, defaulting to 1000 [ 387.045539][T20134] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20134 comm=syz.6.6210 [ 387.051235][T20123] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 387.083973][T20123] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 387.107446][T20139] netlink: 8 bytes leftover after parsing attributes in process `syz.8.6212'. [ 387.128362][T20123] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 387.149738][T20123] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 387.227267][T20147] netlink: 8 bytes leftover after parsing attributes in process `syz.8.6216'. [ 387.247124][T20147] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 387.322375][T20153] netlink: 28 bytes leftover after parsing attributes in process `syz.6.6218'. [ 387.333974][T20124] chnl_net:caif_netlink_parms(): no params data found [ 387.421241][T20157] nfs: Unexpected value for 'acl' [ 387.484571][T20124] bridge0: port 1(bridge_slave_0) entered blocking state [ 387.491676][T20124] bridge0: port 1(bridge_slave_0) entered disabled state [ 387.556348][T20124] bridge_slave_0: entered allmulticast mode [ 387.575120][T20124] bridge_slave_0: entered promiscuous mode [ 387.597739][T20165] bond0: entered promiscuous mode [ 387.602894][T20165] bond0: entered allmulticast mode [ 387.617049][T20165] 8021q: adding VLAN 0 to HW filter on device bond0 [ 387.640104][T20165] bond0 (unregistering): Released all slaves [ 387.653279][T20124] bridge0: port 2(bridge_slave_1) entered blocking state [ 387.660490][T20124] bridge0: port 2(bridge_slave_1) entered disabled state [ 387.674088][T20124] bridge_slave_1: entered allmulticast mode [ 387.681401][T20124] bridge_slave_1: entered promiscuous mode [ 387.715771][T20179] bond1: entered promiscuous mode [ 387.720954][T20179] bond1: entered allmulticast mode [ 387.732819][T20179] 8021q: adding VLAN 0 to HW filter on device bond1 [ 387.748085][T20179] bond1 (unregistering): Released all slaves [ 387.791189][T20124] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 387.820485][T20124] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 387.839751][T20186] netlink: 36 bytes leftover after parsing attributes in process `syz.5.6230'. [ 387.861906][T20186] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6230'. [ 387.957391][T20124] team0: Port device team_slave_0 added [ 387.971818][T20186] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20186 comm=syz.5.6230 [ 387.986550][T20124] team0: Port device team_slave_1 added [ 388.051357][T20124] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 388.058344][T20124] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 388.084400][T20124] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 388.110765][T20124] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 388.118551][T20124] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 388.145399][T20124] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 388.212994][T20124] hsr_slave_0: entered promiscuous mode [ 388.220202][T20124] hsr_slave_1: entered promiscuous mode [ 388.246371][T20124] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 388.256994][T20124] Cannot create hsr debugfs directory [ 388.360325][T20212] nfs: Unexpected value for 'acl' [ 388.398918][T20210] bond1: entered promiscuous mode [ 388.404028][T20210] bond1: entered allmulticast mode [ 388.441586][T20210] 8021q: adding VLAN 0 to HW filter on device bond1 [ 388.468797][T20210] bond1 (unregistering): Released all slaves [ 388.477117][T20218] netlink: 8 bytes leftover after parsing attributes in process `syz.8.6243'. [ 388.495019][T20218] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 388.727470][T20236] smc: net device bond0 applied user defined pnetid SYZ0 [ 388.735876][T20236] smc: net device bond0 erased user defined pnetid SYZ0 [ 388.833806][T20124] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 388.850923][T20124] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 388.861364][T20124] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 388.885806][T20238] lo speed is unknown, defaulting to 1000 [ 388.891635][T20243] netlink: 8 bytes leftover after parsing attributes in process `syz.5.6255'. [ 388.891721][T20245] netlink: 36 bytes leftover after parsing attributes in process `syz.6.6256'. [ 388.923276][T20124] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 389.067951][T20245] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20245 comm=syz.6.6256 [ 389.136192][T20124] 8021q: adding VLAN 0 to HW filter on device bond0 [ 389.181379][T20263] bond1: entered promiscuous mode [ 389.187200][T20263] bond1: entered allmulticast mode [ 389.193836][T20263] 8021q: adding VLAN 0 to HW filter on device bond1 [ 389.227909][T20263] bond1 (unregistering): Released all slaves [ 389.266823][T20124] 8021q: adding VLAN 0 to HW filter on device team0 [ 389.284508][ T172] bridge0: port 1(bridge_slave_0) entered blocking state [ 389.291625][ T172] bridge0: port 1(bridge_slave_0) entered forwarding state [ 389.310264][T20259] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5425 sclass=netlink_route_socket pid=20259 comm=syz.5.6261 [ 389.356912][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 389.364015][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 389.405722][T20124] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 389.416807][T20124] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 389.609145][T20124] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 389.613288][ T29] kauditd_printk_skb: 89 callbacks suppressed [ 389.613305][ T29] audit: type=1326 audit(2000000051.877:16062): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20284 comm="syz.6.6270" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4c6593d169 code=0x7ffc0000 [ 389.641757][T20275] lo speed is unknown, defaulting to 1000 [ 389.699637][ T29] audit: type=1326 audit(2000000051.914:16063): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20284 comm="syz.6.6270" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f4c6593d169 code=0x7ffc0000 [ 389.724701][ T29] audit: type=1326 audit(2000000051.914:16064): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20284 comm="syz.6.6270" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4c6593d169 code=0x7ffc0000 [ 389.748303][ T29] audit: type=1326 audit(2000000051.914:16065): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20284 comm="syz.6.6270" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f4c6593d169 code=0x7ffc0000 [ 389.906912][T20124] veth0_vlan: entered promiscuous mode [ 389.924466][T20124] veth1_vlan: entered promiscuous mode [ 390.006996][T20124] veth0_macvtap: entered promiscuous mode [ 390.030112][T20124] veth1_macvtap: entered promiscuous mode [ 390.071910][T20124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 390.082554][T20124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 390.092407][T20124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 390.102870][T20124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 390.112723][T20124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 390.123195][T20124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 390.133065][T20124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 390.143580][T20124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 390.153479][T20124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 390.164005][T20124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 390.173869][T20124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 390.184333][T20124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 390.194247][T20124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 390.204697][T20124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 390.214666][T20124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 390.225114][T20124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 390.234961][T20124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 390.245407][T20124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 390.255290][T20124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 390.265732][T20124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 390.275657][T20124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 390.286134][T20124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 390.296091][T20124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 390.306550][T20124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 390.316392][T20124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 390.327038][T20124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 390.336972][T20124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 390.347526][T20124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 390.347598][ T2994] ================================================================== [ 390.347624][ T2994] BUG: KCSAN: data-race in desc_read_finalized_seq / prb_reserve [ 390.373280][ T2994] [ 390.375606][ T2994] write to 0xffffffff868ed878 of 8 bytes by task 20124 on cpu 1: [ 390.383323][ T2994] prb_reserve+0x750/0xb80 [ 390.387752][ T2994] vprintk_store+0x552/0x860 [ 390.392346][ T2994] vprintk_emit+0x1a0/0x6c0 [ 390.396868][ T2994] vprintk_default+0x26/0x30 [ 390.401466][ T2994] vprintk+0x1d/0x30 [ 390.405390][ T2994] _printk+0x7f/0xb0 [ 390.409289][ T2994] batadv_check_known_mac_addr+0x153/0x180 [ 390.415101][ T2994] batadv_hard_if_event+0x4b4/0xf50 [ 390.420301][ T2994] raw_notifier_call_chain+0x6f/0x1d0 [ 390.425684][ T2994] call_netdevice_notifiers_info+0xae/0x100 [ 390.431594][ T2994] netif_set_mac_address+0x201/0x260 [ 390.436890][ T2994] do_setlink+0x623/0x2480 [ 390.441306][ T2994] rtnl_newlink+0xe84/0x12d0 [ 390.446034][ T2994] rtnetlink_rcv_msg+0x65a/0x740 [ 390.450994][ T2994] netlink_rcv_skb+0x12f/0x230 [ 390.455768][ T2994] rtnetlink_rcv+0x1c/0x30 [ 390.460198][ T2994] netlink_unicast+0x605/0x6c0 [ 390.464964][ T2994] netlink_sendmsg+0x609/0x720 [ 390.469735][ T2994] __sock_sendmsg+0x140/0x180 [ 390.474416][ T2994] __sys_sendto+0x1aa/0x230 [ 390.478927][ T2994] __x64_sys_sendto+0x78/0x90 [ 390.483611][ T2994] x64_sys_call+0x2bcb/0x2e10 [ 390.488297][ T2994] do_syscall_64+0xc9/0x1c0 [ 390.492831][ T2994] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 390.498729][ T2994] [ 390.501051][ T2994] read to 0xffffffff868ed878 of 8 bytes by task 2994 on cpu 0: [ 390.508601][ T2994] desc_read_finalized_seq+0x163/0x280 [ 390.514069][ T2994] _prb_read_valid+0x142/0x710 [ 390.518839][ T2994] prb_read_valid+0x42/0x70 [ 390.523377][ T2994] syslog_print+0x242/0x540 [ 390.527887][ T2994] do_syslog+0x3ae/0x810 [ 390.532132][ T2994] __x64_sys_syslog+0x43/0x50 [ 390.536812][ T2994] x64_sys_call+0x2b8f/0x2e10 [ 390.541494][ T2994] do_syscall_64+0xc9/0x1c0 [ 390.546008][ T2994] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 390.551902][ T2994] [ 390.554221][ T2994] value changed: 0x0000000000000f9f -> 0x0000000000000000 [ 390.561322][ T2994] [ 390.563646][ T2994] Reported by Kernel Concurrency Sanitizer on: [ 390.570056][ T2994] CPU: 0 UID: 0 PID: 2994 Comm: klogd Not tainted 6.14.0-syzkaller-09584-g7d06015d936c #0 PREEMPT(voluntary) [ 390.581690][ T2994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 390.591755][ T2994] ================================================================== [ 390.654487][ T29] audit: type=1326 audit(2000000052.831:16066): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20284 comm="syz.6.6270" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4c6593d169 code=0x7ffc0000 [ 390.678255][ T29] audit: type=1326 audit(2000000052.831:16067): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20284 comm="syz.6.6270" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4c6593d169 code=0x7ffc0000 [ 390.703762][T20124] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 390.734895][T20309] bond1: entered promiscuous mode [ 390.739982][T20309] bond1: entered allmulticast mode [ 390.747829][T20309] 8021q: adding VLAN 0 to HW filter on device bond1 [ 390.761397][T20309] bond1 (unregistering): Released all slaves [ 390.774096][T20124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 390.784669][T20124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 390.795947][T20124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 390.806822][T20124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 390.816717][T20124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 390.828447][T20124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 390.838328][T20124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 390.848860][T20124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 390.860073][T20124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 390.870544][T20124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 390.880409][T20124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 390.892057][T20124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 390.901976][T20124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 390.912469][T20124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 390.923621][T20124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 390.934137][T20124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 390.944070][T20124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 390.955999][T20124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 390.965962][T20124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 390.976510][T20124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 390.987643][T20124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 390.998136][T20124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 391.008088][T20124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 391.019843][T20124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 391.029717][T20124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 391.040248][T20124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 391.051242][T20124] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 391.061703][T20124] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 391.072991][T20124] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 391.089440][T20124] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 391.098298][T20124] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 391.107028][T20124] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 391.115792][T20124] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 391.146427][ T29] audit: type=1400 audit(2000000053.308:16068): avc: denied { mounton } for pid=20124 comm="syz-executor" path="/root/syzkaller.8R6Eve/syz-tmp" dev="sda1" ino=1980 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 391.178462][ T29] audit: type=1400 audit(2000000053.308:16069): avc: denied { mount } for pid=20124 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 391.201051][ T29] audit: type=1400 audit(2000000053.308:16070): avc: denied { mount } for pid=20124 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 391.223205][ T29] audit: type=1400 audit(2000000053.308:16071): avc: denied { mounton } for pid=20124 comm="syz-executor" path="/root/syzkaller.8R6Eve/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1