last executing test programs: 2.886717274s ago: executing program 2 (id=211): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/vmstat\x00', 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) pread64(r2, &(0x7f0000000100)=""/54, 0xffffffffffffff09, 0x1) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="200000001000010700000000000000000a0000000c0002006e6c3830323131"], 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x40050) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9}]}, 0x0) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000200)={0x9, &(0x7f0000000340)=[{0xd, 0x0, 0x7, 0x187}, {0x7, 0xb, 0xb}, {0x0, 0x2, 0x4, 0xad}, {0x4, 0x7, 0xf2, 0x6}, {0x800, 0x81, 0x81}, {0x3, 0x93, 0x8, 0x1}, {0x0, 0x10, 0x4, 0x8898}, {0x73, 0xea, 0x3, 0x2}, {0xfff7, 0x8, 0x4, 0xfffffff7}]}) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000700000045000000a000020095"], &(0x7f0000000080)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000000c0)='kfree\x00', r5}, 0x18) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000000040)={0x3, 0x0, 0x0, 0x1, 0x7}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000400)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r4, 0x40082102, &(0x7f00000002c0)=r7) r8 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0xd, &(0x7f0000000000)=@assoc_value, &(0x7f0000000240)=0x8) r9 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) syz_usb_disconnect(0xffffffffffffffff) syz_open_procfs$namespace(r9, &(0x7f00000003c0)='ns/time_for_children\x00') close_range(r3, 0xffffffffffffffff, 0x100000000000000) 2.48016658s ago: executing program 1 (id=221): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000180)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) syz_open_dev$loop(0x0, 0xffff, 0x109041) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x24, r3, 0x201, 0x400400, 0x0, {{}, {}, {0x8}}}, 0x24}, 0x1, 0x0, 0x0, 0x48041}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000002e80)=@delchain={0xfc, 0x65, 0x20, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x2, 0x2}, {0x0, 0xe}, {0x0, 0xb}}, [@filter_kind_options=@f_flow={{0x9}, {0xc0, 0x2, [@TCA_FLOW_MODE={0x8, 0x2, 0x8065738cbab9bcb1}, @TCA_FLOW_EMATCHES={0x94, 0xb, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x7c, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x18, 0x3, 0x0, 0x0, {{0x7, 0x2, 0x4}, {0x4, 0x5, 0x6, "ebe6c48aa9"}}}, @TCF_EM_CONTAINER={0x44, 0x3, 0x0, 0x0, {{0x4, 0x0, 0xb}, "d0fa3d16cd50d147bab4e8cc66b89a2f2ddd8d0b788aa8b69311701d1c85ab32acb6397660ea603b182034545dd0bd1327d2665d5a78"}}, @TCF_EM_U32={0x1c, 0x1, 0x0, 0x0, {{0x1, 0x3, 0x81}, {0x10, 0xe, 0x6, 0xd4c}}}]}, @TCA_EMATCH_TREE_LIST={0x4}, @TCA_EMATCH_TREE_HDR={0x8}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1}}]}, @TCA_FLOW_XOR={0x8, 0x7, 0xffffff7b}, @TCA_FLOW_PERTURB={0x8}, @TCA_FLOW_DIVISOR={0x8, 0x8, 0x7fff}, @TCA_FLOW_MODE={0x8, 0x2, 0x1}]}}, @filter_kind_options=@f_bpf={{0x8}, {0x4}}]}, 0xfc}, 0x1, 0x0, 0x0, 0x80}, 0x20000080) r4 = socket(0x10, 0x803, 0x0) sendto(r4, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x365}, {&(0x7f0000000280)=""/85, 0x7c}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000400)=""/106, 0x645}, {&(0x7f0000000980)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x14}, {&(0x7f00000007c0)=""/154, 0x21}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0xffffffffffffff2f}}], 0x4000000000003b4, 0x2040000, &(0x7f0000003700)={0x77359400}) 2.444727981s ago: executing program 1 (id=223): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000080)=0x654a, 0x4) bind$inet(r0, &(0x7f0000000200)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x4c58, 0x10000, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bind$rds(0xffffffffffffffff, 0x0, 0x0) unshare(0x6a040000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x101402, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x25c}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a000000020000000110000007"], 0x50) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 1.8984414s ago: executing program 2 (id=232): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a000000020000000110000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00'}, 0x10) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000001440), 0x0, 0x0) readv(r1, &(0x7f0000001180)=[{&(0x7f0000000000)=""/186, 0xba}], 0x1) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f00000000c0)=0x32) io_setup(0x3ff, &(0x7f0000000500)=0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2400c844}, 0x4000000) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a000020095"], &(0x7f0000000280)='syzkaller\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x60}, 0x94) futex(0x0, 0xd, 0x0, 0x0, 0x0, 0x2) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000)=0x2000000, 0x300) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='kfree\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="33fe000024"], 0xfe33) io_destroy(r2) prlimit64(0x0, 0x8, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001480), 0x42002, 0x0) 1.775273471s ago: executing program 1 (id=240): socket$pppoe(0x18, 0x1, 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="020000000400000008000000"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7020000080000001823", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000009500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='rxrpc_client\x00', r1, 0x0, 0x3}, 0x18) fchownat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r3 = mq_open(&(0x7f0000000040)='!se\xf7ih,\x17i\xacP\xe6lNnuxselinux\x00', 0x6e93ebbbcc0884f2, 0x2, &(0x7f0000000300)={0x0, 0x1, 0x6}) mq_timedsend(r3, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r3, 0x0, 0x0, 0x0, 0x0) 1.616635524s ago: executing program 0 (id=246): r0 = io_uring_setup(0x1d48, &(0x7f0000000340)={0x0, 0x0, 0x1000, 0x2, 0x3bd}) r1 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r1, &(0x7f0000000000)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) listen(r1, 0x4) recvmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}}], 0x1, 0x40000100, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x18, 0xf, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014fa0000b7030000000008008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000020000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x66, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) close_range(r0, r1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="120000000d000000040000000200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000008721fa987c4851a7af67d706cddec33544dfb096afa8a60584c12ccea2729127be506a5b8472ca0644ed9007fb59cd52d9783c3c9960be15cb0ad0f65d78585c16c4f7eae587a6f54e9a939048865fc623ba1fcfb8bee031ce819292080daf912d0cf9986dd1"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r4}, &(0x7f0000000080), &(0x7f0000000380)}, 0x20) 1.565285275s ago: executing program 0 (id=247): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000e1ff30000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, 0x0, 0x0) bind$inet6(r2, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x7, @loopback, 0x1fc}, 0x1c) sendto$inet6(r2, &(0x7f0000847fff)='X', 0xfee4, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r2, 0x1) sendmmsg$inet6(r2, &(0x7f0000004900)=[{{0x0, 0xfffffffffffffe89, &(0x7f0000000480)=[{&(0x7f0000000380)="bd", 0x1}], 0x1}}], 0x1, 0x0) 1.564103575s ago: executing program 0 (id=249): socket$nl_route(0x10, 0x3, 0x0) r0 = perf_event_open(&(0x7f0000001100)={0x5, 0x80, 0x9, 0x8, 0xb, 0xfb, 0x0, 0x3c, 0xc002, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x18842, 0x0, 0x7fffffff, 0x7, 0x9, 0x3, 0x7, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) readv(r1, &(0x7f0000000480)=[{&(0x7f0000000080)=""/148, 0x94}], 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000540)=ANY=[@ANYBLOB="7394bbbbbb00010100000000000000000000000000000990780000e92744acb1b5243510bf6bdcf909ab9be0980508e08c8e8efaea5ee098adecb5c65fd51ec937709bffbb10835ed5a6562ab2b42ac5d2465fa1ba068bc05d55a8ba5aefcd2500865d3d5108d122fd98f8e84436b280d7b2a7d2135d2b0f559cf804c8cd1f849caf9aad134ac660f7583cf4dedc3bbef05e"], 0x0) perf_event_open$cgroup(&(0x7f0000000e40)={0x5, 0x80, 0x8, 0x7, 0x81, 0x75, 0x0, 0x4, 0x44615, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3ff, 0x2, @perf_bp={0x0, 0x8}, 0x0, 0x5d8, 0x0, 0x1, 0x401, 0x3, 0x8, 0x0, 0x8000006, 0x0, 0x8}, 0xffffffffffffffff, 0x0, r0, 0xb) io_setup(0x40, &(0x7f0000000000)=0x0) r3 = eventfd2(0x5, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x39, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0xfffffffffffffff9, 0x4}, 0x0, 0xfffc, 0xfffffff8, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x8, &(0x7f0000000080)={[{@sb={'sb', 0x3d, 0x1}}, {@nodioread_nolock}]}, 0x2, 0x53a, &(0x7f0000000c80)="$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") openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x22500, 0x4) io_cancel(r2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3, 0x7, r0, 0x0, 0x0, 0x5, 0x0, 0x1, r3}, &(0x7f00000000c0)) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0x28f43000) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x0, 0x0}) socket$inet6_sctp(0xa, 0x801, 0x84) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) io_setup(0x1, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'\x00', 0x5}) socket$kcm(0x2, 0x200000000000001, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000040)={0x53, 0xfffffffc, 0x6, 0x0, @buffer={0x42, 0x0, 0x0}, &(0x7f0000000380)="589374c96ee3", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000240)={0x2, 0x6, 0x0, 'queue1\x00', 0x8}) syz_io_uring_setup(0x3c0c, 0x0, 0x0, 0x0) 1.133292122s ago: executing program 3 (id=257): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000031c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r0, 0x0, 0xfffffffffffffffe}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000380)="a1", 0x1}], 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r1, @ANYBLOB="0000000014"], 0x30, 0x40400d1}}], 0x1, 0x10) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0xa86, 0x0) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x5, 0x8510, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x2, @perf_bp={0x0, 0xa}, 0x1020, 0x5dd8, 0x0, 0x5, 0x3, 0x8, 0xfffb, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000200)=@gcm_256={{0x304}, "b5d4c27c5c778dd0", "5f128fd81908609c81286d4f6a539024ffb7007ed672afb4be7aec5ca3d27dbf", '\x00', "b690a3fabf2cb970"}, 0x38) 1.132663122s ago: executing program 3 (id=258): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60e}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x408e, &(0x7f0000000240)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2e}}, {@min_batch_time={'min_batch_time', 0x3d, 0xfff}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x40}}, {@stripe={'stripe', 0x3d, 0x4000}}, {@errors_remount}, {@minixdf}]}, 0x3, 0x43a, &(0x7f0000000340)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x0) pwrite64(r2, &(0x7f0000000140)='2', 0xfdef, 0xfecc) 1.104838472s ago: executing program 3 (id=259): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000e1ff30000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, 0x0, 0x0) bind$inet6(r2, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x7, @loopback, 0x1fc}, 0x1c) sendto$inet6(r2, &(0x7f0000847fff)='X', 0xfee4, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r2, 0x1) sendmmsg$inet6(r2, &(0x7f0000004900)=[{{0x0, 0xfffffffffffffe89, &(0x7f0000000480)=[{&(0x7f0000000380)="bd", 0x1}], 0x1}}], 0x1, 0x0) 1.043430664s ago: executing program 3 (id=260): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000031c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r0, 0x0, 0xfffffffffffffffe}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000380)="a1", 0x1}], 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r1, @ANYBLOB="0000000014"], 0x30, 0x40400d1}}], 0x1, 0x10) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0xa86, 0x0) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x5, 0x8510, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x2, @perf_bp={0x0, 0xa}, 0x1020, 0x5dd8, 0x0, 0x5, 0x3, 0x8, 0xfffb, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000200)=@gcm_256={{0x304}, "b5d4c27c5c778dd0", "5f128fd81908609c81286d4f6a539024ffb7007ed672afb4be7aec5ca3d27dbf", '\x00', "b690a3fabf2cb970"}, 0x38) 1.042475373s ago: executing program 2 (id=261): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000001000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) io_setup(0x3ff, &(0x7f0000000500)=0x0) io_submit(r1, 0x1, &(0x7f0000000300)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0}]) (fail_nth: 1) 1.035363453s ago: executing program 3 (id=263): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000001000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) socket$inet_icmp(0x2, 0x2, 0x1) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) pipe2$9p(&(0x7f00000001c0), 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='comm\x00') write$binfmt_script(r1, &(0x7f0000000600)={'#! ', './file0'}, 0xb) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x9, 0x2, 0x56d, 0x2, 0xc01, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x50) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000009a40)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000010000040900010073797a30000000002c000000030a01080000000000000000010000000900030073797a32000000000900010073797a300000000050000000060a010400000000000000000100000008000b40000000000900010073797a30000000002800048024000180090001006d6574610000000014000280080001400000001208000240000000", @ANYRES64=r2], 0xc4}, 0x1, 0x0, 0x0, 0x10}, 0x0) io_setup(0x3ff, &(0x7f0000000500)=0x0) io_submit(r4, 0x1, &(0x7f0000000300)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, 0x0}]) 827.541877ms ago: executing program 1 (id=264): creat(&(0x7f00000000c0)='./file0\x00', 0xce) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0, 0x0, 0x4}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) fsopen(&(0x7f0000000400)='autofs\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x2004000, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[], [], 0x6b}}) 810.924757ms ago: executing program 1 (id=265): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x5, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}, @NFTA_CHAIN_HOOK={0xc, 0x4, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8}]}]}], {0x14}}, 0x80}}, 0x0) (fail_nth: 5) 756.036538ms ago: executing program 1 (id=266): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$GTP_CMD_ECHOREQ(0xffffffffffffffff, &(0x7f0000001000)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000fc0)={&(0x7f0000000540)={0x38, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @GTPA_PEER_ADDRESS={0x8, 0x4, @multicast2}, @GTPA_MS_ADDR6={0x14, 0xc, @empty}]}, 0x38}, 0x1, 0x0, 0x0, 0x40810}, 0x8000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x8006, 0x0, 0x0, 0xffff9e7b}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) syz_usb_disconnect(0xffffffffffffffff) pidfd_send_signal(0xffffffffffffffff, 0x2, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000200"/15], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x94) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x46, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0xb68, 0x1300, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x3c1, 0x3, 0x458, 0x0, 0x168, 0x10, 0x190, 0xb, 0x388, 0x250, 0x250, 0x388, 0x250, 0x3, 0x0, {[{{@ipv6={@remote, @rand_addr=' \x01\x00', [], [], 'veth1_to_batadv\x00', 'veth1_to_hsr\x00', {}, {}, 0x3a}, 0x6000000, 0x128, 0x190, 0x0, {0x0, 0x28e}, [@common=@icmp6={{0x28}, {0x0, 'K\r'}}, @common=@inet=@hashlimit1={{0x58}, {'netdevsim0\x00', {0x0, 0x0, 0x9, 0x1, 0x0, 0x10000, 0x80000001}}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}, {{@uncond, 0x0, 0xd0, 0x1f8, 0x0, {}, [@common=@inet=@set2={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:usb_device_t:s0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4b8) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket(0x10, 0x803, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r6, {0x0, 0xfff1}, {0xffff, 0xffff}, {0xffe0, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x1}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x11) r7 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r7, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) io_setup(0x2, &(0x7f0000002400)=0x0) io_submit(r8, 0x1, &(0x7f0000001c00)=[&(0x7f0000000400)={0x2000000000, 0x4, 0x0, 0x1, 0x0, r7, &(0x7f0000000040)="5400ffff", 0x4, 0x0, 0x0, 0x2}]) sendmsg$nl_route_sched(r4, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001300)=@newtfilter={0x118, 0x2c, 0xd2b, 0x70bd2b, 0x35dfdbfb, {0x0, 0x0, 0x0, r6, {0xf}, {}, {0x7, 0xfff3}}, [@filter_kind_options=@f_u32={{0x8}, {0xec, 0x2, [@TCA_U32_SEL={0x24, 0x5, {0x1, 0x1, 0x3, 0x1, 0x4, 0x102, 0x6, 0x7ffffffa, [{0x200, 0x500, 0x3, 0x6}]}}, @TCA_U32_SEL={0xc4, 0x5, {0x10, 0x9, 0x6, 0x10da, 0xa760, 0x0, 0x10, 0x100, [{0x1, 0xfffffffb, 0x100, 0x3ff}, {0x9, 0x7, 0x40, 0x80}, {0x6, 0x7fff, 0x9, 0x7}, {0x3, 0x80, 0x1, 0x6}, {0x9, 0x10, 0x5, 0x5}, {0xac, 0xfffff08a, 0x8, 0x3}, {0x49f, 0x7, 0x81, 0xb}, {0x40, 0x80000001, 0xfffffffe, 0xffffffff}, {0x1, 0x5, 0x5127, 0x800}, {0x6, 0x0, 0x2, 0x1}, {0xaa4, 0x406, 0x2, 0x127c}]}}]}}]}, 0x118}}, 0x24040084) r9 = syz_io_uring_setup(0x6159, &(0x7f0000000480)={0x0, 0x7734, 0x40, 0x4002, 0x24f}, &(0x7f0000000000), &(0x7f0000000240)) io_uring_enter(r9, 0x47bc, 0x0, 0x0, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_PD_GET(r4, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="180020000e3734fccdbd5000fdc897050800030002000000"], 0x18}, 0x1, 0x0, 0x0, 0x10}, 0x48011) syz_create_resource$binfmt(&(0x7f00000001c0)='./file2\x00') ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'macvlan0\x00'}) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000000380)={[{@delalloc}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@dioread_lock}, {@data_err_ignore}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4007b1}}, {@data_err_ignore}, {@grpquota}, {@nobh}, {@user_xattr}, {@bh}, {@dioread_nolock}]}, 0x1, 0x553, &(0x7f0000000a40)="$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") openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x10f042, 0x142) openat(0xffffffffffffff9c, &(0x7f0000000400)='./bus\x00', 0x1c5042, 0x12) 752.824608ms ago: executing program 2 (id=267): r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) setns(r1, 0x24020000) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xc, 0xd, &(0x7f0000000540)=ANY=[], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x10000, 0x10d) fcntl$setlease(r3, 0x400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000a80)='kfree\x00', r2, 0x0, 0x2}, 0x18) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYRES32=r3], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='sys_enter\x00', r6}, 0x10) readlink(0x0, 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="a1832abd7000ffffffff05000000080003"], 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x4040004) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file1\x00', &(0x7f0000000340)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) r8 = socket(0x1d, 0x3, 0x7) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r8, 0x84, 0x10, &(0x7f0000000200)=@sack_info={0x0, 0x0, 0x2}, 0xc) syz_open_dev$loop(&(0x7f00000003c0), 0x7, 0x180862) 562.791041ms ago: executing program 3 (id=268): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="a80100002100010027bd7000fedbdf2502"], 0x1a8}, 0x1, 0x0, 0x0, 0x40000}, 0x4000050) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000a00)=@delchain={0x14c8, 0x65, 0x20, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x2, 0x2}, {0x0, 0xe}, {0x0, 0xb}}, [@filter_kind_options=@f_flow={{0x9}, {0x148c, 0x2, [@TCA_FLOW_MODE={0x8, 0x2, 0x8065738cbab9bcb1}, @TCA_FLOW_EMATCHES={0x84, 0xb, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x60, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x18, 0x3, 0x0, 0x0, {{0x7, 0x2, 0x4}, {0x4, 0x5, 0x6, "ebe6c48aa9"}}}, @TCF_EM_CONTAINER={0x44, 0x3, 0x0, 0x0, {{0x4, 0x0, 0xb}, "d0fa3d16cd50d147bab4e8cc66b89a2f2ddd8d0b788aa8b69311701d1c85ab32acb6397660ea603b182034545dd0bd1327d2665d5a78"}}]}, @TCA_EMATCH_TREE_HDR={0x8}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1}}, @TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_IPT={0xc, 0x1, 0x0, 0x0, {{0x1}}}]}]}, @TCA_FLOW_ACT={0x13e4, 0x9, 0x0, 0x1, [@m_connmark={0x114c, 0x17, 0x0, 0x0, {{0xd}, {0x11c, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x8, 0x4, 0x6, 0x0, 0x6}}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x3, 0x1, 0x8, 0x1, 0x5}, 0x8}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x8, 0x3, 0x0, 0x8, 0x9}, 0x1}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x0, 0x75, 0x4, 0x7fffffff, 0xeb}, 0x80}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x1, 0x5, 0x2000000d, 0xa8e, 0x9}, 0x1000}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x6, 0x8, 0x3, 0xfffffff8, 0x10001}, 0x200}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xfffffff9, 0x0, 0x20000000, 0x100, 0x6}, 0xd0}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x7, 0x660b, 0xffffffffffffffff, 0x9, 0xd}, 0x7fff}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x1, 0xff, 0x10000000, 0x9, 0x800}, 0x4}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x1, 0x7fffffff, 0x20000003, 0x4, 0x3}, 0x4}}]}, {0x1004, 0x6, "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"}, {0xc}, {0xc, 0x8, {0x0, 0x1}}}}, @m_bpf={0x124, 0x5, 0x0, 0x0, {{0x8}, {0x1c, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_FD={0x8, 0x5, r0}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x3}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x3}]}, {0xe3, 0x6, "0919de1bf838433cedc440658fa7cc7bc6a47ab9dd566c4e78243b6ebb809bb5bda0172d1276a5447d49ec8ac504a6e9178b957fcbc5216bd75138ae17acac1e295e4b2c086113a48799f37ef527041cff3013038c72fa637d4638f655a23bb465b99e278f5b768991cac2dc345cb06be39d4cbf839a61bf64c682dd55b208b2ccd906d26f0f23436adc5fb772b9d82ce55c299a006035c1d61007c661ca4c6e28ccd577a334e460ead1286eff9a0d2dc0967dbb0aef1d6a96e04dee2af35783afb5341baddda165f617fe53bbf4a432dd6d64204d54b3916414c82bd9b6da"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x2}}}}, @m_skbmod={0x170, 0x19, 0x0, 0x0, {{0xb}, {0x48, 0x2, 0x0, 0x1, [@TCA_SKBMOD_PARMS={0x24, 0x2, {{0x4, 0x8, 0x8, 0x8, 0x80000000}, 0xd}}, @TCA_SKBMOD_SMAC={0xa}, @TCA_SKBMOD_ETYPE={0x6, 0x5, 0x6}, @TCA_SKBMOD_SMAC={0xa, 0x4, @multicast}]}, {0xfd, 0x6, "b2b6ec45f6f74f1b730f51126163a11026f01a2c7afc916f466d76946a181f5d14916fd571a3302b82db35d8ede17df59b38604924a501f4f7aedd5f48701f7744c7be9d5af750f55b282ee1d0a9219445f20e30c3c7853328e0dcdc46bec134988c6c53c9b2a4d003094edc6ad808e2c22c2f981699e885cb1c6649e4b6f77d440c608e42e566c18b28acb9f2b6ebc0f5117fb6cacd663aa34475a11de0cf59c75d2c79118f3e62e6a94e06cc33fd54b77430d14b72d12e1f377784885fb6d13ae840e692c58ec882ea924f3d1b2588a3ac2045fcf68ca1333cdd530b07fd73e5e2086c71d0bf0f3411a8a3d83bdc2ca924e68fc5e0500854"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x3}}}}]}, @TCA_FLOW_PERTURB={0x8}, @TCA_FLOW_DIVISOR={0x8, 0x8, 0x7fff}, @TCA_FLOW_DIVISOR={0x8, 0x8, 0x7}]}}, @filter_kind_options=@f_bpf={{0x8}, {0x4}}]}, 0x14c8}, 0x1, 0x0, 0x0, 0x80}, 0x20000080) r1 = socket(0x10, 0x803, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000090000000000000000060000008500009700000095000000000000001f75c39a1fdc07dce972ed63297989ed6e6fa5324a73a250f3cd51d6d01a6b6d723e83129218"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000040)="a72d11a15c048c0a7d63aebc5cea1f815108f6091475aeec600831aa9d3944e60bc2ad06a619c560aa", 0x29}], 0x1}, 0x0) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a010100000100000000000200fffc0900010073797a30000000000800024000000001cc000000030a01020000000000000000020000000900010073797a3000000000aa000300"], 0x1e4}}, 0x0) write$binfmt_misc(r4, &(0x7f0000000000), 0xfffffecc) splice(r3, 0x0, r5, 0x0, 0x7fff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x8, 0x8, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x320e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) sendto(r1, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0xc, 0x32, 0x0, 0x99867000) r6 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r6, 0x11, 0x1, 0x0, &(0x7f0000000040)) r7 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x2122, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000001380)={0x11, 0x13, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYRES8=r8], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) r10 = socket$netlink(0x10, 0x3, 0x4) writev(r10, &(0x7f0000000000)=[{&(0x7f0000000440)="580000001400192340834b80040d8c560a067fbc45ff810500000000070058000b480400945f640094272d7061d328b92d0000000000008000f0fffeffe809000000fff5dd000000100001000c0808004149004001040800", 0x58}], 0x1) sendmsg$key(r7, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000002080)=ANY=[@ANYBLOB="02040706290000002bbd7000ffdbdf2502001300090000002dbd7000003500000800120002000000b66b6e00a60c00000600ff0006000000010000000000000000000000000000000000000000000000200100000000000000000000000000020800120002000100b06b6e000500000006006c007103000005000000000000000a010100000000000000000000000000640101020000000000000000000000000800120000000000b76b6e000e00000006006c00040800000100000000000000ac1e0101000000000000000000000000ff010000000000000000000000000001010014000b000000010016004e220000070019000000000002004e247f00000100000000000000000a004e247ffffffffe8800000000000000000000000001010800000000000000040003000000a8070180000000000000feffffffffffffff0500000000000000159642f71ec52fe1596aedf16940239bb56700efad70908cec79bcfadcfdef25a8f411fd313bf2e426995e68b0749ce23e3d89a196dbc4f9c1aeb24f33c2079b427baacbc08dfe6f18bd15a9bf6c04ab8a55c5bc08372c88841caf54f057ac72008f1e37002f14eb0a0c59b6ff2f3e83c035037036203277cd118faa2e5886f3256b7ad3ca503a8487b76ab60fac396bd938a883df139f042cf4961a689d13ba321755fc4e3f99f03c41143b6e6a61447a0b8f886329b8fa956d118f4eb1ab"], 0x148}}, 0x1) 465.650953ms ago: executing program 0 (id=269): bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = socket$kcm(0x10, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000380)="2e00000010008188e6b62aa73772cc9f1ba1f848110000005e140602000000000e000a001000000002900000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008188040f80ec59acbc0413a1f848110000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) 408.381614ms ago: executing program 2 (id=270): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r1}, 0x18) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)={{0x14}, [@NFT_MSG_NEWTABLE={0x14, 0x0, 0xa, 0x5, 0x0, 0x0, {0x1}}, @NFT_MSG_NEWRULE={0x20, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x5c}}, 0x0) 407.503443ms ago: executing program 4 (id=271): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000080)=0x654a, 0x4) bind$inet(r0, &(0x7f0000000200)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x4c58, 0x10000, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bind$rds(0xffffffffffffffff, 0x0, 0x0) unshare(0x6a040000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x101402, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x25c}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 395.497674ms ago: executing program 2 (id=272): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a000000020000000110000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00'}, 0x10) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000001440), 0x0, 0x0) readv(r1, &(0x7f0000001180)=[{&(0x7f0000000000)=""/186, 0xba}], 0x1) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f00000000c0)=0x32) io_setup(0x3ff, &(0x7f0000000500)=0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2400c844}, 0x4000000) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a000020095"], &(0x7f0000000280)='syzkaller\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x60}, 0x94) futex(0x0, 0xd, 0x0, 0x0, 0x0, 0x2) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000)=0x2000000, 0x300) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000000c0)='kfree\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="33fe000024"], 0xfe33) io_destroy(r2) prlimit64(0x0, 0x8, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001480), 0x42002, 0x0) 354.555834ms ago: executing program 0 (id=273): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$kcm(0x10, 0x2, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000380)="2e00000010008188e6b62aa73772cc9f1ba1f848110000005e140602000000000e000a001000000002900000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008188040f80ec59acbc0413a1f848110000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x10c}], 0x1, 0x0, 0x0, 0x1}, 0x0) 295.002555ms ago: executing program 0 (id=274): r0 = bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xc, &(0x7f00000007c0)=ANY=[@ANYRES64=r0, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = gettid() kcmp(0xffffffffffffffff, r2, 0x1, r1, r1) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000200)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000640)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@const={0x2, 0x0, 0x0, 0xa, 0x1}]}, {0x0, [0x2e]}}, &(0x7f0000000ac0)=""/244, 0x27, 0xf4, 0x0, 0x31}, 0x28) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r5, &(0x7f0000000000)="10", 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0xfffffffe, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) setsockopt$inet_sctp6_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f0000000040)={0x7, 0xe, 0x9, 0x0, 0x1, 0x8, 0xa7, 0x81, 0x5, 0xf1, 0xb, 0x7, 0x0, 0x7}, 0xe) poll(&(0x7f0000000080)=[{r5, 0x46a8}], 0x1, 0x400) shutdown(r5, 0x1) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000013000000000000000000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r4}, &(0x7f0000000280), &(0x7f00000002c0)=r6}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800f9ffffff0000000000000000000100000000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7000000000000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0500000004000000080000000c"], 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18010000000000000000000001080021850000006d00000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r11}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r9}, &(0x7f0000000a00), &(0x7f0000000a40)=r8}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r7}, 0x18) r12 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r12, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="020d00000a00000029bd70000000000005000500000000000a00fffd00000000fe8000000000000000000000000000aa0000000000000000030006000000000002"], 0x50}}, 0x20000000) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000280)={0x200000, 0x200003, 0xfffffffd, 0x8001, 0x3}) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="05000000000000007111ae00000000008510000002000000850000000500000095000000000000009500a50500000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000004, 0x0, 0x29, 0x10, &(0x7f0000002e00), &(0x7f00000001c0), 0x8, 0x7c, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r13, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) 118.214208ms ago: executing program 4 (id=275): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000740)={{r0}, 0x0, &(0x7f0000000700)='%pS \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='kmem_cache_free\x00', r1}, 0x18) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x1) 80.241459ms ago: executing program 4 (id=276): r0 = io_uring_setup(0x1d48, &(0x7f0000000340)={0x0, 0x0, 0x1000, 0x2, 0x3bd}) r1 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r1, &(0x7f0000000000)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x0, @empty}}, 0x24) listen(r1, 0x4) recvmmsg(r1, &(0x7f00000050c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}}], 0x1, 0x40000100, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x18, 0xf, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014fa0000b7030000000008008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000020000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x66, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) close_range(r0, r1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="120000000d000000040000000200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000008721fa987c4851a7af67d706cddec33544dfb096afa8a60584c12ccea2729127be506a5b8472ca0644ed9007fb59cd52d9783c3c9960be15cb0ad0f65d78585c16c4f7eae587a6f54e9a939048865fc623ba1fcfb8bee031ce819292080daf912d0cf9986dd1"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r4}, &(0x7f0000000080), &(0x7f0000000380)}, 0x20) 79.678839ms ago: executing program 4 (id=277): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000031c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r0, 0x0, 0xfffffffffffffffe}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000380)="a1", 0x1}], 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r1, @ANYBLOB="0000000014"], 0x30, 0x40400d1}}], 0x1, 0x10) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0xa86, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b000000070000000100", @ANYRES32, @ANYBLOB='\x00'/19, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000ff0000000000000000"], 0x50) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r4) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x5, 0x8510, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x2, @perf_bp={0x0, 0xa}, 0x1020, 0x5dd8, 0x0, 0x5, 0x3, 0x8, 0xfffb, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000200)=@gcm_256={{0x304}, "b5d4c27c5c778dd0", "5f128fd81908609c81286d4f6a539024ffb7007ed672afb4be7aec5ca3d27dbf", '\x00', "b690a3fabf2cb970"}, 0x38) 78.785799ms ago: executing program 4 (id=278): bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r0}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) time(0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r1 = open(0x0, 0x7d1c80, 0x120) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xf, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r6}, 0x10) r7 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r7, 0x0, 0x4) sendmsg$ETHTOOL_MSG_STRSET_GET(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000005c0)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0100d0000000fbdbdf25010000001800018014000200766574683100000000000000000000001c0002800c00018008000100030000000c000180080001"], 0x48}, 0x1, 0x0, 0x0, 0x840}, 0x4008810) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) ioctl$BTRFS_IOC_BALANCE_V2(r8, 0xc4009420, &(0x7f0000000bc0)={0x10, 0x7, {0x1, @struct={0x1cf0, 0x44}, 0x0, 0x3, 0x6, 0x4, 0x2, 0xfff, 0x484, @usage=0x1, 0x1, 0x9, [0x100000001, 0x100000001, 0x9, 0xa6af, 0x2, 0x2c4]}, {0xffffffffffffffff, @usage=0x1, 0x0, 0x3ff, 0xffff, 0xd, 0x0, 0x8, 0x2, @usage=0x5, 0x6, 0x5c4dd563, [0xfffffffffffffffc, 0x2, 0x8, 0x27, 0x9, 0x175]}, {0x4, @struct={0x10000, 0x6}, 0x0, 0x7, 0x0, 0x200, 0x16, 0x1, 0x44, @usage=0x8, 0x3, 0x3ff, [0x857a, 0x1000, 0x8, 0x8, 0x0, 0x4]}, {0x7d, 0xfffffffffffffffb, 0x9dd}}) ioctl$BTRFS_IOC_DEV_INFO(r8, 0xd000941e, &(0x7f0000001900)={r9, "624aa0f7a57024d0e9b40c565d36d155"}) io_uring_register$IORING_REGISTER_RESTRICTIONS(0xffffffffffffffff, 0xb, &(0x7f0000000480)=[@ioring_restriction_sqe_op={0x1, 0x1c}], 0x1) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r11}, 0x18) r12 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f0000000040)='ceph\x00', 0x0, &(0x7f00000009c0)="010000000037a788a11d1f000000000000006923c63a4541062101b60a2156566de77062086575a59ea9cb", 0x2b, r12) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2000006, 0x31, 0xffffffffffffffff, 0xd0fb6000) sendmsg$NFNL_MSG_CTHELPER_NEW(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x60, 0x0, 0x9, 0x201, 0x0, 0x0, {0x5, 0x0, 0x9}, [@NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x218e}}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x1}}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x7ff}}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x7}, @NFCTH_STATUS={0x8, 0x6, 0x1, 0x0, 0x1}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x1}, @NFCTH_PRIV_DATA_LEN={0x8, 0x5, 0x1, 0x0, 0x13}]}, 0x60}, 0x1, 0x0, 0x0, 0x4}, 0x48804) syz_mount_image$ext4(&(0x7f0000001140)='ext4\x00', &(0x7f00000007c0)='./file1\x00', 0x410c84, &(0x7f0000000340), 0x1, 0x775, &(0x7f0000001180)="$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") r13 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) pwritev2(r13, &(0x7f0000000000)=[{&(0x7f00000001c0)="ac7f2b6d9ee04fb6c2da5461534e451585de65", 0x13}], 0x1, 0x7c00, 0x0, 0x13) 0s ago: executing program 4 (id=279): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000740)={{r0}, 0x0, &(0x7f0000000700)='%pS \x00'}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='kmem_cache_free\x00', r1}, 0x18) move_mount(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff, 0x0, 0x1) 0s ago: executing program 4 (id=281): sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x20, 0x10, 0x503, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x14615, 0xef}}, 0x20}}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x8, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x18) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r4}, 0x18) syz_clone(0x44208400, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=@newlink={0x20, 0x10, 0x503, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x14615, 0xef}}, 0x20}}, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x8, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x18) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r4}, 0x18) (async) syz_clone(0x44208400, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) (async) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.218' (ED25519) to the list of known hosts. [ 21.520772][ T29] audit: type=1400 audit(1752661617.564:62): avc: denied { mounton } for pid=3295 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.521606][ T3295] cgroup: Unknown subsys name 'net' [ 21.543497][ T29] audit: type=1400 audit(1752661617.564:63): avc: denied { mount } for pid=3295 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.570835][ T29] audit: type=1400 audit(1752661617.594:64): avc: denied { unmount } for pid=3295 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.698441][ T3295] cgroup: Unknown subsys name 'cpuset' [ 21.704463][ T3295] cgroup: Unknown subsys name 'rlimit' [ 21.833843][ T29] audit: type=1400 audit(1752661617.874:65): avc: denied { setattr } for pid=3295 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.857081][ T29] audit: type=1400 audit(1752661617.874:66): avc: denied { create } for pid=3295 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 21.877609][ T29] audit: type=1400 audit(1752661617.874:67): avc: denied { write } for pid=3295 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 21.884089][ T3299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 21.898059][ T29] audit: type=1400 audit(1752661617.874:68): avc: denied { read } for pid=3295 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 21.926904][ T29] audit: type=1400 audit(1752661617.884:69): avc: denied { mounton } for pid=3295 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.951674][ T29] audit: type=1400 audit(1752661617.884:70): avc: denied { mount } for pid=3295 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 21.975051][ T29] audit: type=1400 audit(1752661617.954:71): avc: denied { relabelto } for pid=3299 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.010418][ T3295] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.818771][ T3307] chnl_net:caif_netlink_parms(): no params data found [ 23.910958][ T3306] chnl_net:caif_netlink_parms(): no params data found [ 23.927030][ T3307] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.934129][ T3307] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.941435][ T3307] bridge_slave_0: entered allmulticast mode [ 23.947738][ T3307] bridge_slave_0: entered promiscuous mode [ 23.965048][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 23.974419][ T3307] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.981539][ T3307] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.988846][ T3307] bridge_slave_1: entered allmulticast mode [ 23.995220][ T3307] bridge_slave_1: entered promiscuous mode [ 24.013071][ T3307] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 24.025618][ T3307] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 24.057087][ T3314] chnl_net:caif_netlink_parms(): no params data found [ 24.088247][ T3307] team0: Port device team_slave_0 added [ 24.110548][ T3307] team0: Port device team_slave_1 added [ 24.133351][ T3306] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.140535][ T3306] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.147600][ T3306] bridge_slave_0: entered allmulticast mode [ 24.154107][ T3306] bridge_slave_0: entered promiscuous mode [ 24.167737][ T3315] chnl_net:caif_netlink_parms(): no params data found [ 24.180953][ T3306] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.188032][ T3306] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.195157][ T3306] bridge_slave_1: entered allmulticast mode [ 24.201566][ T3306] bridge_slave_1: entered promiscuous mode [ 24.216829][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.223977][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.231099][ T3313] bridge_slave_0: entered allmulticast mode [ 24.237431][ T3313] bridge_slave_0: entered promiscuous mode [ 24.246216][ T3307] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 24.253212][ T3307] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 24.279099][ T3307] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 24.290255][ T3307] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 24.297187][ T3307] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 24.323111][ T3307] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 24.345730][ T3314] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.352827][ T3314] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.360096][ T3314] bridge_slave_0: entered allmulticast mode [ 24.366453][ T3314] bridge_slave_0: entered promiscuous mode [ 24.372841][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.379930][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.387021][ T3313] bridge_slave_1: entered allmulticast mode [ 24.393644][ T3313] bridge_slave_1: entered promiscuous mode [ 24.410478][ T3306] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 24.419705][ T3314] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.426776][ T3314] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.434149][ T3314] bridge_slave_1: entered allmulticast mode [ 24.440559][ T3314] bridge_slave_1: entered promiscuous mode [ 24.461662][ T3306] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 24.477659][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 24.501052][ T3314] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 24.513436][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 24.527530][ T3306] team0: Port device team_slave_0 added [ 24.538427][ T3314] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 24.556379][ T3306] team0: Port device team_slave_1 added [ 24.562778][ T3313] team0: Port device team_slave_0 added [ 24.570230][ T3307] hsr_slave_0: entered promiscuous mode [ 24.576651][ T3307] hsr_slave_1: entered promiscuous mode [ 24.594003][ T3315] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.601103][ T3315] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.608214][ T3315] bridge_slave_0: entered allmulticast mode [ 24.614455][ T3315] bridge_slave_0: entered promiscuous mode [ 24.625790][ T3313] team0: Port device team_slave_1 added [ 24.632408][ T3314] team0: Port device team_slave_0 added [ 24.638194][ T3315] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.645229][ T3315] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.652349][ T3315] bridge_slave_1: entered allmulticast mode [ 24.658657][ T3315] bridge_slave_1: entered promiscuous mode [ 24.679627][ T3314] team0: Port device team_slave_1 added [ 24.689914][ T3306] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 24.696864][ T3306] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 24.722782][ T3306] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 24.738498][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 24.745551][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 24.771524][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 24.782891][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 24.789954][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 24.815868][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 24.835149][ T3306] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 24.842254][ T3306] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 24.868173][ T3306] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 24.887299][ T3315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 24.897455][ T3315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 24.919463][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 24.926480][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 24.952449][ T3314] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 24.976986][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 24.983969][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 25.009894][ T3314] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 25.021212][ T3315] team0: Port device team_slave_0 added [ 25.040128][ T3315] team0: Port device team_slave_1 added [ 25.067046][ T3306] hsr_slave_0: entered promiscuous mode [ 25.072952][ T3306] hsr_slave_1: entered promiscuous mode [ 25.078910][ T3306] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 25.086446][ T3306] Cannot create hsr debugfs directory [ 25.093947][ T3313] hsr_slave_0: entered promiscuous mode [ 25.099955][ T3313] hsr_slave_1: entered promiscuous mode [ 25.105806][ T3313] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 25.113473][ T3313] Cannot create hsr debugfs directory [ 25.130435][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 25.137419][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 25.163390][ T3315] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 25.180641][ T3314] hsr_slave_0: entered promiscuous mode [ 25.186521][ T3314] hsr_slave_1: entered promiscuous mode [ 25.192437][ T3314] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 25.200044][ T3314] Cannot create hsr debugfs directory [ 25.206106][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 25.213074][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 25.238983][ T3315] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 25.357845][ T3315] hsr_slave_0: entered promiscuous mode [ 25.363816][ T3315] hsr_slave_1: entered promiscuous mode [ 25.369772][ T3315] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 25.377309][ T3315] Cannot create hsr debugfs directory [ 25.439746][ T3307] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 25.452245][ T3307] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 25.461083][ T3307] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 25.471995][ T3307] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 25.508711][ T3313] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 25.517303][ T3313] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 25.526449][ T3313] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 25.534738][ T3313] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 25.570967][ T3314] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 25.585340][ T3314] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 25.599533][ T3314] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 25.609879][ T3314] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 25.640176][ T3307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 25.651549][ T3306] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 25.661898][ T3306] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 25.679013][ T3306] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 25.687506][ T3306] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 25.697011][ T3307] 8021q: adding VLAN 0 to HW filter on device team0 [ 25.712020][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 25.724667][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.731759][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.740392][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.747431][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.770082][ T3315] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 25.779162][ T3315] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 25.790415][ T3307] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 25.800785][ T3307] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 25.818435][ T3315] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 25.833571][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 25.840885][ T3315] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 25.857581][ T51] bridge0: port 1(bridge_slave_0) entered blocking state [ 25.864725][ T51] bridge0: port 1(bridge_slave_0) entered forwarding state [ 25.874048][ T51] bridge0: port 2(bridge_slave_1) entered blocking state [ 25.881117][ T51] bridge0: port 2(bridge_slave_1) entered forwarding state [ 25.926651][ T3307] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 25.961638][ T3314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 25.975158][ T3313] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 25.992896][ T3315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 26.005703][ T3306] 8021q: adding VLAN 0 to HW filter on device bond0 [ 26.018708][ T3314] 8021q: adding VLAN 0 to HW filter on device team0 [ 26.034380][ T3306] 8021q: adding VLAN 0 to HW filter on device team0 [ 26.043246][ T3315] 8021q: adding VLAN 0 to HW filter on device team0 [ 26.055302][ T51] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.062386][ T51] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.079672][ T51] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.086751][ T51] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.095731][ T51] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.102845][ T51] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.119639][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.126708][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.145664][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.152724][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.161790][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.168861][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.195806][ T3307] veth0_vlan: entered promiscuous mode [ 26.204408][ T3314] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 26.214781][ T3314] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 26.234117][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 26.247120][ T3307] veth1_vlan: entered promiscuous mode [ 26.302554][ T3307] veth0_macvtap: entered promiscuous mode [ 26.328720][ T3307] veth1_macvtap: entered promiscuous mode [ 26.344224][ T3314] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 26.357605][ T3307] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 26.377600][ T3315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 26.386729][ T3307] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 26.409292][ T3307] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.418120][ T3307] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.426870][ T3307] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.435677][ T3307] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.475573][ T3306] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 26.510405][ T3307] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 26.514792][ T3314] veth0_vlan: entered promiscuous mode [ 26.538082][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 26.538095][ T29] audit: type=1400 audit(1752661622.584:90): avc: denied { read write } for pid=3307 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 26.551671][ T3314] veth1_vlan: entered promiscuous mode [ 26.568323][ T29] audit: type=1400 audit(1752661622.584:91): avc: denied { open } for pid=3307 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 26.586865][ T3314] veth0_macvtap: entered promiscuous mode [ 26.597468][ T29] audit: type=1400 audit(1752661622.584:92): avc: denied { ioctl } for pid=3307 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=101 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 26.651024][ T3315] veth0_vlan: entered promiscuous mode [ 26.664748][ T29] audit: type=1400 audit(1752661622.704:93): avc: denied { map_create } for pid=3471 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 26.671057][ T3315] veth1_vlan: entered promiscuous mode [ 26.683534][ T29] audit: type=1400 audit(1752661622.704:94): avc: denied { bpf } for pid=3471 comm="syz.1.2" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 26.699362][ T3315] veth0_macvtap: entered promiscuous mode [ 26.709058][ T29] audit: type=1400 audit(1752661622.704:95): avc: denied { prog_load } for pid=3471 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 26.722654][ T3313] veth0_vlan: entered promiscuous mode [ 26.733272][ T29] audit: type=1400 audit(1752661622.704:96): avc: denied { append } for pid=3471 comm="syz.1.2" name="001" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 26.750642][ T3314] veth1_macvtap: entered promiscuous mode [ 26.761147][ T29] audit: type=1400 audit(1752661622.704:97): avc: denied { open } for pid=3471 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 26.783773][ T3315] veth1_macvtap: entered promiscuous mode [ 26.785639][ T29] audit: type=1400 audit(1752661622.704:98): avc: denied { perfmon } for pid=3471 comm="syz.1.2" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 26.803654][ T3306] veth0_vlan: entered promiscuous mode [ 26.811736][ T29] audit: type=1400 audit(1752661622.704:99): avc: denied { kernel } for pid=3471 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 26.825090][ T3313] veth1_vlan: entered promiscuous mode [ 26.848675][ T3306] veth1_vlan: entered promiscuous mode [ 26.858831][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 26.874631][ T3313] veth0_macvtap: entered promiscuous mode [ 26.882170][ T3313] veth1_macvtap: entered promiscuous mode [ 26.905942][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 26.922397][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 26.931900][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 26.940335][ T3306] veth0_macvtap: entered promiscuous mode [ 26.948455][ T3314] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.957202][ T3314] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.965967][ T3314] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.974684][ T3314] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 26.995237][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 27.003939][ T3306] veth1_macvtap: entered promiscuous mode [ 27.020478][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 27.033800][ T3313] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.042610][ T3313] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.051314][ T3313] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.060020][ T3313] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.074011][ T3315] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.082880][ T3315] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.091618][ T3315] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.100360][ T3315] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.112512][ T3306] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 27.127648][ T3306] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 27.143532][ T3306] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.152499][ T3306] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.161352][ T3306] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.170091][ T3306] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 27.235080][ T3481] syz.1.8 (3481) used greatest stack depth: 10144 bytes left [ 27.278450][ T3493] FAULT_INJECTION: forcing a failure. [ 27.278450][ T3493] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 27.291690][ T3493] CPU: 0 UID: 0 PID: 3493 Comm: syz.1.9 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(voluntary) [ 27.291717][ T3493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 27.291731][ T3493] Call Trace: [ 27.291736][ T3493] [ 27.291744][ T3493] __dump_stack+0x1d/0x30 [ 27.291835][ T3493] dump_stack_lvl+0xe8/0x140 [ 27.291854][ T3493] dump_stack+0x15/0x1b [ 27.291868][ T3493] should_fail_ex+0x265/0x280 [ 27.291897][ T3493] should_fail+0xb/0x20 [ 27.291975][ T3493] should_fail_usercopy+0x1a/0x20 [ 27.292003][ T3493] _copy_to_user+0x20/0xa0 [ 27.292019][ T3493] simple_read_from_buffer+0xb5/0x130 [ 27.292067][ T3493] proc_fail_nth_read+0x100/0x140 [ 27.292099][ T3493] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 27.292128][ T3493] vfs_read+0x19d/0x6f0 [ 27.292168][ T3493] ? __rcu_read_unlock+0x4f/0x70 [ 27.292214][ T3493] ? __rcu_read_unlock+0x4f/0x70 [ 27.292233][ T3493] ? __fget_files+0x184/0x1c0 [ 27.292252][ T3493] ksys_read+0xda/0x1a0 [ 27.292338][ T3493] __x64_sys_read+0x40/0x50 [ 27.292420][ T3493] x64_sys_call+0x2d77/0x2fb0 [ 27.292440][ T3493] do_syscall_64+0xd2/0x200 [ 27.292458][ T3493] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 27.292484][ T3493] ? clear_bhb_loop+0x40/0x90 [ 27.292573][ T3493] ? clear_bhb_loop+0x40/0x90 [ 27.292596][ T3493] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 27.292617][ T3493] RIP: 0033:0x7feba1e4d33c [ 27.292687][ T3493] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 27.292705][ T3493] RSP: 002b:00007feba04b7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 27.292726][ T3493] RAX: ffffffffffffffda RBX: 00007feba2075fa0 RCX: 00007feba1e4d33c [ 27.292737][ T3493] RDX: 000000000000000f RSI: 00007feba04b70a0 RDI: 0000000000000006 [ 27.292749][ T3493] RBP: 00007feba04b7090 R08: 0000000000000000 R09: 0000000000000000 [ 27.292760][ T3493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 27.292771][ T3493] R13: 0000000000000000 R14: 00007feba2075fa0 R15: 00007ffc695abaf8 [ 27.292789][ T3493] [ 27.547078][ T3496] netlink: 'syz.2.3': attribute type 10 has an invalid length. [ 27.557726][ T3496] team0: Port device dummy0 added [ 27.568307][ T3496] netlink: 'syz.2.3': attribute type 10 has an invalid length. [ 27.589528][ T3496] team0: Port device dummy0 removed [ 27.594941][ T3499] loop1: detected capacity change from 0 to 1024 [ 27.597832][ T3496] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 27.609077][ T3499] EXT4-fs: Ignoring removed oldalloc option [ 27.621022][ T3501] netlink: 8 bytes leftover after parsing attributes in process `syz.3.11'. [ 27.642776][ T3499] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 27.662492][ T3501] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 27.672164][ T3501] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 27.694537][ T3501] netlink: 20 bytes leftover after parsing attributes in process `syz.3.11'. [ 27.776108][ T3307] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 27.802580][ T3509] 9pnet: Could not find request transport: t [ 27.836870][ T3511] syzkaller0: entered promiscuous mode [ 27.842400][ T3511] syzkaller0: entered allmulticast mode [ 28.117295][ T3531] FAULT_INJECTION: forcing a failure. [ 28.117295][ T3531] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 28.125166][ T3533] netlink: 'syz.0.22': attribute type 10 has an invalid length. [ 28.130530][ T3531] CPU: 1 UID: 0 PID: 3531 Comm: syz.4.21 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(voluntary) [ 28.130558][ T3531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 28.130641][ T3531] Call Trace: [ 28.130647][ T3531] [ 28.130653][ T3531] __dump_stack+0x1d/0x30 [ 28.130674][ T3531] dump_stack_lvl+0xe8/0x140 [ 28.130693][ T3531] dump_stack+0x15/0x1b [ 28.130709][ T3531] should_fail_ex+0x265/0x280 [ 28.130866][ T3531] should_fail+0xb/0x20 [ 28.130892][ T3531] should_fail_usercopy+0x1a/0x20 [ 28.130963][ T3531] _copy_from_user+0x1c/0xb0 [ 28.130982][ T3531] kstrtouint_from_user+0x69/0xf0 [ 28.131056][ T3531] ? 0xffffffff81000000 [ 28.131138][ T3531] ? selinux_file_permission+0x1e4/0x320 [ 28.131173][ T3531] proc_fail_nth_write+0x50/0x160 [ 28.131205][ T3531] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 28.131236][ T3531] vfs_write+0x269/0x8e0 [ 28.131328][ T3531] ? vfs_read+0x47f/0x6f0 [ 28.131410][ T3531] ? __rcu_read_unlock+0x4f/0x70 [ 28.131431][ T3531] ? __fget_files+0x184/0x1c0 [ 28.131450][ T3531] ksys_write+0xda/0x1a0 [ 28.131480][ T3531] __x64_sys_write+0x40/0x50 [ 28.131519][ T3531] x64_sys_call+0x2cdd/0x2fb0 [ 28.131617][ T3531] do_syscall_64+0xd2/0x200 [ 28.131701][ T3531] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 28.131831][ T3531] ? clear_bhb_loop+0x40/0x90 [ 28.131851][ T3531] ? clear_bhb_loop+0x40/0x90 [ 28.131871][ T3531] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 28.131892][ T3531] RIP: 0033:0x7f239774d3df [ 28.131906][ T3531] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 28.131924][ T3531] RSP: 002b:00007f2395db7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 28.131995][ T3531] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f239774d3df [ 28.132083][ T3531] RDX: 0000000000000001 RSI: 00007f2395db70a0 RDI: 0000000000000003 [ 28.132094][ T3531] RBP: 00007f2395db7090 R08: 0000000000000000 R09: 0000000000000000 [ 28.132106][ T3531] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 28.132189][ T3531] R13: 0000000000000000 R14: 00007f2397975fa0 R15: 00007ffdf4154ca8 [ 28.132207][ T3531] [ 28.176219][ T3536] netlink: 'syz.0.22': attribute type 10 has an invalid length. [ 28.184553][ T3533] team0: Port device dummy0 added [ 28.384131][ T3536] team0: Port device dummy0 removed [ 28.396173][ T3536] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 28.406025][ T3542] netlink: 'syz.4.25': attribute type 10 has an invalid length. [ 28.413578][ T3544] netlink: 8 bytes leftover after parsing attributes in process `syz.3.26'. [ 28.421120][ T3542] team0: Port device dummy0 added [ 28.434953][ T3542] netlink: 'syz.4.25': attribute type 10 has an invalid length. [ 28.447313][ T3542] team0: Port device dummy0 removed [ 28.455191][ T3542] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 28.621408][ T3572] netlink: 'syz.4.38': attribute type 10 has an invalid length. [ 28.632222][ T3572] bond0: (slave dummy0): Releasing backup interface [ 28.642266][ T3572] team0: Port device dummy0 added [ 28.661405][ T3572] netlink: 'syz.4.38': attribute type 10 has an invalid length. [ 28.672862][ T3572] team0: Port device dummy0 removed [ 28.681486][ T3572] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 28.698693][ T3574] FAULT_INJECTION: forcing a failure. [ 28.698693][ T3574] name failslab, interval 1, probability 0, space 0, times 1 [ 28.711426][ T3574] CPU: 1 UID: 0 PID: 3574 Comm: syz.0.37 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(voluntary) [ 28.711458][ T3574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 28.711492][ T3574] Call Trace: [ 28.711498][ T3574] [ 28.711505][ T3574] __dump_stack+0x1d/0x30 [ 28.711528][ T3574] dump_stack_lvl+0xe8/0x140 [ 28.711543][ T3574] dump_stack+0x15/0x1b [ 28.711557][ T3574] should_fail_ex+0x265/0x280 [ 28.711649][ T3574] ? __se_sys_memfd_create+0x1cc/0x590 [ 28.711679][ T3574] should_failslab+0x8c/0xb0 [ 28.711699][ T3574] __kmalloc_cache_noprof+0x4c/0x320 [ 28.711722][ T3574] ? fput+0x8f/0xc0 [ 28.711758][ T3574] __se_sys_memfd_create+0x1cc/0x590 [ 28.711788][ T3574] __x64_sys_memfd_create+0x31/0x40 [ 28.711818][ T3574] x64_sys_call+0x122f/0x2fb0 [ 28.711866][ T3574] do_syscall_64+0xd2/0x200 [ 28.711882][ T3574] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 28.711915][ T3574] ? clear_bhb_loop+0x40/0x90 [ 28.711937][ T3574] ? clear_bhb_loop+0x40/0x90 [ 28.711985][ T3574] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 28.712003][ T3574] RIP: 0033:0x7f01d67fe929 [ 28.712015][ T3574] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 28.712054][ T3574] RSP: 002b:00007f01d4e24e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 28.712141][ T3574] RAX: ffffffffffffffda RBX: 000000000000050a RCX: 00007f01d67fe929 [ 28.712190][ T3574] RDX: 00007f01d4e24ef0 RSI: 0000000000000000 RDI: 00007f01d68814cc [ 28.712203][ T3574] RBP: 0000200000000200 R08: 00007f01d4e24bb7 R09: 00007f01d4e24e40 [ 28.712215][ T3574] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000780 [ 28.712225][ T3574] R13: 00007f01d4e24ef0 R14: 00007f01d4e24eb0 R15: 0000200000000c00 [ 28.712239][ T3574] [ 28.921927][ T3579] netlink: 'syz.1.40': attribute type 10 has an invalid length. [ 28.934112][ T3579] team0: Port device dummy0 added [ 28.942013][ T3579] netlink: 'syz.1.40': attribute type 10 has an invalid length. [ 28.958721][ T3579] team0: Port device dummy0 removed [ 28.967420][ T3579] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 30.576338][ T3650] FAULT_INJECTION: forcing a failure. [ 30.576338][ T3650] name failslab, interval 1, probability 0, space 0, times 0 [ 30.589148][ T3650] CPU: 1 UID: 0 PID: 3650 Comm: syz.1.68 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(voluntary) [ 30.589172][ T3650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 30.589183][ T3650] Call Trace: [ 30.589187][ T3650] [ 30.589193][ T3650] __dump_stack+0x1d/0x30 [ 30.589213][ T3650] dump_stack_lvl+0xe8/0x140 [ 30.589251][ T3650] dump_stack+0x15/0x1b [ 30.589282][ T3650] should_fail_ex+0x265/0x280 [ 30.589312][ T3650] should_failslab+0x8c/0xb0 [ 30.589332][ T3650] kmem_cache_alloc_node_noprof+0x57/0x320 [ 30.589357][ T3650] ? dup_task_struct+0x70/0x6a0 [ 30.589414][ T3650] dup_task_struct+0x70/0x6a0 [ 30.589433][ T3650] ? _parse_integer+0x27/0x40 [ 30.589491][ T3650] copy_process+0x399/0x1f90 [ 30.589516][ T3650] ? kstrtouint+0x76/0xc0 [ 30.589537][ T3650] ? kstrtouint_from_user+0x9f/0xf0 [ 30.589560][ T3650] ? __rcu_read_unlock+0x4f/0x70 [ 30.589613][ T3650] kernel_clone+0x16c/0x5b0 [ 30.589640][ T3650] ? vfs_write+0x75e/0x8e0 [ 30.589709][ T3650] __x64_sys_clone+0xe6/0x120 [ 30.589735][ T3650] x64_sys_call+0x2c59/0x2fb0 [ 30.589754][ T3650] do_syscall_64+0xd2/0x200 [ 30.589772][ T3650] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 30.589794][ T3650] ? clear_bhb_loop+0x40/0x90 [ 30.589842][ T3650] ? clear_bhb_loop+0x40/0x90 [ 30.589859][ T3650] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 30.589943][ T3650] RIP: 0033:0x7feba1e4e929 [ 30.589955][ T3650] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 30.590009][ T3650] RSP: 002b:00007feba04b6fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 30.590025][ T3650] RAX: ffffffffffffffda RBX: 00007feba2075fa0 RCX: 00007feba1e4e929 [ 30.590037][ T3650] RDX: 0000000000000000 RSI: 0000000000020010 RDI: 0000000022023400 [ 30.590047][ T3650] RBP: 00007feba04b7090 R08: 0000000000000000 R09: 0000000000000000 [ 30.590102][ T3650] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 30.590112][ T3650] R13: 0000000000000000 R14: 00007feba2075fa0 R15: 00007ffc695abaf8 [ 30.590129][ T3650] [ 31.150570][ T3668] bond0: (slave dummy0): Releasing backup interface [ 31.170977][ T3668] team0: Port device dummy0 added [ 31.179696][ T3670] team0: Port device dummy0 removed [ 31.187122][ T3670] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 31.230025][ T3674] bond0: (slave dummy0): Releasing backup interface [ 31.247162][ T3674] team0: Port device dummy0 added [ 31.257745][ T3674] team0: Port device dummy0 removed [ 31.266254][ T3674] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 31.480936][ T3702] FAULT_INJECTION: forcing a failure. [ 31.480936][ T3702] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 31.494040][ T3702] CPU: 0 UID: 0 PID: 3702 Comm: syz.3.90 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(voluntary) [ 31.494069][ T3702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 31.494082][ T3702] Call Trace: [ 31.494088][ T3702] [ 31.494095][ T3702] __dump_stack+0x1d/0x30 [ 31.494117][ T3702] dump_stack_lvl+0xe8/0x140 [ 31.494184][ T3702] dump_stack+0x15/0x1b [ 31.494201][ T3702] should_fail_ex+0x265/0x280 [ 31.494232][ T3702] should_fail+0xb/0x20 [ 31.494328][ T3702] should_fail_usercopy+0x1a/0x20 [ 31.494356][ T3702] _copy_to_user+0x20/0xa0 [ 31.494376][ T3702] simple_read_from_buffer+0xb5/0x130 [ 31.494436][ T3702] proc_fail_nth_read+0x100/0x140 [ 31.494471][ T3702] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 31.494553][ T3702] vfs_read+0x19d/0x6f0 [ 31.494582][ T3702] ? __rcu_read_unlock+0x4f/0x70 [ 31.494605][ T3702] ? __fget_files+0x184/0x1c0 [ 31.494649][ T3702] ksys_read+0xda/0x1a0 [ 31.494742][ T3702] __x64_sys_read+0x40/0x50 [ 31.494774][ T3702] x64_sys_call+0x2d77/0x2fb0 [ 31.494796][ T3702] do_syscall_64+0xd2/0x200 [ 31.494834][ T3702] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 31.494858][ T3702] ? clear_bhb_loop+0x40/0x90 [ 31.494922][ T3702] ? clear_bhb_loop+0x40/0x90 [ 31.494945][ T3702] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 31.494967][ T3702] RIP: 0033:0x7f324178d33c [ 31.494982][ T3702] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 31.495064][ T3702] RSP: 002b:00007f323fdf7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 31.495083][ T3702] RAX: ffffffffffffffda RBX: 00007f32419b5fa0 RCX: 00007f324178d33c [ 31.495096][ T3702] RDX: 000000000000000f RSI: 00007f323fdf70a0 RDI: 0000000000000003 [ 31.495109][ T3702] RBP: 00007f323fdf7090 R08: 0000000000000000 R09: 0000000000000000 [ 31.495144][ T3702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 31.495156][ T3702] R13: 0000000000000000 R14: 00007f32419b5fa0 R15: 00007ffd1f417e28 [ 31.495216][ T3702] [ 31.536301][ T3709] netlink: 8 bytes leftover after parsing attributes in process `syz.4.93'. [ 31.568142][ T29] kauditd_printk_skb: 1387 callbacks suppressed [ 31.568162][ T29] audit: type=1400 audit(1752661627.604:1487): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 31.743093][ T29] audit: type=1400 audit(1752661627.634:1488): avc: denied { read write } for pid=3314 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 31.767356][ T29] audit: type=1400 audit(1752661627.664:1489): avc: denied { read write } for pid=3711 comm="syz.0.95" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 31.791342][ T29] audit: type=1400 audit(1752661627.674:1490): avc: denied { prog_load } for pid=3711 comm="syz.0.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 31.810357][ T29] audit: type=1400 audit(1752661627.674:1491): avc: denied { open } for pid=3711 comm="syz.0.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 31.829422][ T29] audit: type=1400 audit(1752661627.674:1492): avc: denied { prog_load } for pid=3708 comm="syz.4.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 31.848332][ T29] audit: type=1400 audit(1752661627.674:1493): avc: denied { read write } for pid=3708 comm="syz.4.93" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 31.871653][ T29] audit: type=1400 audit(1752661627.674:1494): avc: denied { create } for pid=3708 comm="syz.4.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 31.891919][ T29] audit: type=1400 audit(1752661627.674:1495): avc: denied { create } for pid=3708 comm="syz.4.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 31.912301][ T29] audit: type=1400 audit(1752661627.674:1496): avc: denied { prog_load } for pid=3708 comm="syz.4.93" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 32.048923][ T3741] team0: Port device dummy0 added [ 32.058220][ T3741] team0: Port device dummy0 removed [ 32.065100][ T3741] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 32.233989][ T3756] netlink: 32 bytes leftover after parsing attributes in process `syz.2.112'. [ 32.296558][ T3767] bond0: (slave dummy0): Releasing backup interface [ 32.306368][ T3767] team0: Port device dummy0 added [ 32.319788][ T3767] team0: Port device dummy0 removed [ 32.321688][ T3767] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 32.379027][ T3774] Zero length message leads to an empty skb [ 32.406731][ T3776] capability: warning: `syz.1.120' uses 32-bit capabilities (legacy support in use) [ 32.599646][ T3812] FAULT_INJECTION: forcing a failure. [ 32.599646][ T3812] name failslab, interval 1, probability 0, space 0, times 0 [ 32.612416][ T3812] CPU: 1 UID: 0 PID: 3812 Comm: syz.4.136 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(voluntary) [ 32.612466][ T3812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 32.612479][ T3812] Call Trace: [ 32.612486][ T3812] [ 32.612493][ T3812] __dump_stack+0x1d/0x30 [ 32.612551][ T3812] dump_stack_lvl+0xe8/0x140 [ 32.612571][ T3812] dump_stack+0x15/0x1b [ 32.612624][ T3812] should_fail_ex+0x265/0x280 [ 32.612655][ T3812] should_failslab+0x8c/0xb0 [ 32.612678][ T3812] kmem_cache_alloc_noprof+0x50/0x310 [ 32.612705][ T3812] ? dst_alloc+0xbd/0x100 [ 32.612785][ T3812] dst_alloc+0xbd/0x100 [ 32.612813][ T3812] ? __ip_select_ident+0xf2/0x1a0 [ 32.612915][ T3812] ip_route_output_key_hash_rcu+0xf16/0x1440 [ 32.612947][ T3812] ip_route_output_flow+0x7b/0x130 [ 32.612973][ T3812] udp_sendmsg+0x1197/0x13b0 [ 32.612996][ T3812] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 32.613050][ T3812] ? count_memcg_events+0x179/0x240 [ 32.613102][ T3812] ? __rcu_read_unlock+0x4f/0x70 [ 32.613130][ T3812] udpv6_sendmsg+0x7e9/0x1580 [ 32.613182][ T3812] ? __pfx_udpv6_sendmsg+0x10/0x10 [ 32.613215][ T3812] inet6_sendmsg+0xac/0xd0 [ 32.613234][ T3812] __sock_sendmsg+0x8b/0x180 [ 32.613260][ T3812] ____sys_sendmsg+0x345/0x4e0 [ 32.613343][ T3812] ___sys_sendmsg+0x17b/0x1d0 [ 32.613435][ T3812] __sys_sendmmsg+0x178/0x300 [ 32.613475][ T3812] __x64_sys_sendmmsg+0x57/0x70 [ 32.613524][ T3812] x64_sys_call+0x2f2f/0x2fb0 [ 32.613547][ T3812] do_syscall_64+0xd2/0x200 [ 32.613566][ T3812] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 32.613595][ T3812] ? clear_bhb_loop+0x40/0x90 [ 32.613632][ T3812] ? clear_bhb_loop+0x40/0x90 [ 32.613699][ T3812] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 32.613719][ T3812] RIP: 0033:0x7f239774e929 [ 32.613734][ T3812] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 32.613752][ T3812] RSP: 002b:00007f2395db7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 32.613771][ T3812] RAX: ffffffffffffffda RBX: 00007f2397975fa0 RCX: 00007f239774e929 [ 32.613783][ T3812] RDX: 0400000000000172 RSI: 0000200000003cc0 RDI: 0000000000000003 [ 32.613794][ T3812] RBP: 00007f2395db7090 R08: 0000000000000000 R09: 0000000000000000 [ 32.613804][ T3812] R10: 0000000004000000 R11: 0000000000000246 R12: 0000000000000001 [ 32.613857][ T3812] R13: 0000000000000000 R14: 00007f2397975fa0 R15: 00007ffdf4154ca8 [ 32.613871][ T3812] [ 32.649957][ T3818] netlink: 8 bytes leftover after parsing attributes in process `syz.4.138'. [ 33.185874][ T3858] validate_nla: 9 callbacks suppressed [ 33.185883][ T3858] netlink: 'syz.0.155': attribute type 10 has an invalid length. [ 33.201637][ T3858] bond0: (slave dummy0): Releasing backup interface [ 33.213022][ T3858] team0: Port device dummy0 added [ 33.225499][ T3858] netlink: 'syz.0.155': attribute type 10 has an invalid length. [ 33.237290][ T3858] team0: Port device dummy0 removed [ 33.243971][ T3858] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 33.331167][ T3866] FAULT_INJECTION: forcing a failure. [ 33.331167][ T3866] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 33.331196][ T3866] CPU: 0 UID: 0 PID: 3866 Comm: syz.2.159 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(voluntary) [ 33.331293][ T3866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 33.331304][ T3866] Call Trace: [ 33.331308][ T3866] [ 33.331314][ T3866] __dump_stack+0x1d/0x30 [ 33.331336][ T3866] dump_stack_lvl+0xe8/0x140 [ 33.331355][ T3866] dump_stack+0x15/0x1b [ 33.331427][ T3866] should_fail_ex+0x265/0x280 [ 33.331518][ T3866] should_fail+0xb/0x20 [ 33.331559][ T3866] should_fail_usercopy+0x1a/0x20 [ 33.331585][ T3866] _copy_to_user+0x20/0xa0 [ 33.331679][ T3866] simple_read_from_buffer+0xb5/0x130 [ 33.331712][ T3866] proc_fail_nth_read+0x100/0x140 [ 33.331756][ T3866] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 33.331784][ T3866] vfs_read+0x19d/0x6f0 [ 33.331808][ T3866] ? __rcu_read_unlock+0x4f/0x70 [ 33.331826][ T3866] ? __fget_files+0x184/0x1c0 [ 33.331914][ T3866] ksys_read+0xda/0x1a0 [ 33.332011][ T3866] __x64_sys_read+0x40/0x50 [ 33.332045][ T3866] x64_sys_call+0x2d77/0x2fb0 [ 33.332125][ T3866] do_syscall_64+0xd2/0x200 [ 33.332176][ T3866] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 33.332201][ T3866] ? clear_bhb_loop+0x40/0x90 [ 33.332221][ T3866] ? clear_bhb_loop+0x40/0x90 [ 33.332305][ T3866] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 33.332325][ T3866] RIP: 0033:0x7fdd1cedd33c [ 33.332413][ T3866] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 33.332430][ T3866] RSP: 002b:00007fdd1b547030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 33.332490][ T3866] RAX: ffffffffffffffda RBX: 00007fdd1d105fa0 RCX: 00007fdd1cedd33c [ 33.332574][ T3866] RDX: 000000000000000f RSI: 00007fdd1b5470a0 RDI: 0000000000000004 [ 33.332585][ T3866] RBP: 00007fdd1b547090 R08: 0000000000000000 R09: 0000000000000000 [ 33.332597][ T3866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 33.332608][ T3866] R13: 0000000000000000 R14: 00007fdd1d105fa0 R15: 00007ffda42e9438 [ 33.332621][ T3866] [ 33.676865][ T3893] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3893 comm=syz.4.169 [ 34.100415][ T3928] netlink: 'syz.1.185': attribute type 10 has an invalid length. [ 34.110288][ T3928] bond0: (slave dummy0): Releasing backup interface [ 34.119847][ T3928] team0: Port device dummy0 added [ 34.130849][ T3928] netlink: 'syz.1.185': attribute type 10 has an invalid length. [ 34.145406][ T3928] team0: Port device dummy0 removed [ 34.154091][ T3928] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 34.300982][ T3956] netlink: 'syz.2.199': attribute type 10 has an invalid length. [ 34.311645][ T3956] bond0: (slave dummy0): Releasing backup interface [ 34.334600][ T3956] team0: Port device dummy0 added [ 34.341035][ T3951] xt_hashlimit: max too large, truncated to 1048576 [ 34.362376][ T3965] netlink: 'syz.2.199': attribute type 10 has an invalid length. [ 34.374659][ T3965] team0: Port device dummy0 removed [ 34.388602][ T3965] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 34.427554][ T3974] netlink: 4 bytes leftover after parsing attributes in process `syz.1.207'. [ 34.536005][ T3995] FAULT_INJECTION: forcing a failure. [ 34.536005][ T3995] name failslab, interval 1, probability 0, space 0, times 0 [ 34.548874][ T3995] CPU: 0 UID: 0 PID: 3995 Comm: syz.1.215 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(voluntary) [ 34.548923][ T3995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 34.549015][ T3995] Call Trace: [ 34.549021][ T3995] [ 34.549027][ T3995] __dump_stack+0x1d/0x30 [ 34.549045][ T3995] dump_stack_lvl+0xe8/0x140 [ 34.549061][ T3995] dump_stack+0x15/0x1b [ 34.549121][ T3995] should_fail_ex+0x265/0x280 [ 34.549147][ T3995] should_failslab+0x8c/0xb0 [ 34.549168][ T3995] kmem_cache_alloc_node_noprof+0x57/0x320 [ 34.549252][ T3995] ? __alloc_skb+0x101/0x320 [ 34.549278][ T3995] __alloc_skb+0x101/0x320 [ 34.549344][ T3995] ? avc_has_perm+0xd3/0x150 [ 34.549369][ T3995] alloc_skb_with_frags+0x7d/0x470 [ 34.549407][ T3995] ? selinux_file_open+0x2df/0x330 [ 34.549430][ T3995] ? __rcu_read_unlock+0x4f/0x70 [ 34.549453][ T3995] sock_alloc_send_pskb+0x43a/0x4f0 [ 34.549476][ T3995] ? terminate_walk+0x27f/0x2a0 [ 34.549534][ T3995] tun_get_user+0x8d3/0x2500 [ 34.549561][ T3995] ? avc_has_perm+0xd3/0x150 [ 34.549622][ T3995] ? ref_tracker_alloc+0x1f2/0x2f0 [ 34.549652][ T3995] ? selinux_file_permission+0x2f0/0x320 [ 34.549675][ T3995] tun_chr_write_iter+0x15e/0x210 [ 34.549701][ T3995] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 34.549725][ T3995] vfs_write+0x49d/0x8e0 [ 34.549758][ T3995] ksys_write+0xda/0x1a0 [ 34.549805][ T3995] __x64_sys_write+0x40/0x50 [ 34.549835][ T3995] x64_sys_call+0x2cdd/0x2fb0 [ 34.549870][ T3995] do_syscall_64+0xd2/0x200 [ 34.549887][ T3995] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 34.549922][ T3995] ? clear_bhb_loop+0x40/0x90 [ 34.549943][ T3995] ? clear_bhb_loop+0x40/0x90 [ 34.549993][ T3995] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 34.550014][ T3995] RIP: 0033:0x7feba1e4d3df [ 34.550030][ T3995] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 34.550090][ T3995] RSP: 002b:00007feba04b7000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 34.550108][ T3995] RAX: ffffffffffffffda RBX: 00007feba2075fa0 RCX: 00007feba1e4d3df [ 34.550121][ T3995] RDX: 00000000000011ae RSI: 0000200000001d80 RDI: 00000000000000c8 [ 34.550133][ T3995] RBP: 00007feba04b7090 R08: 0000000000000000 R09: 0000000000000000 [ 34.550146][ T3995] R10: 00000000000011ae R11: 0000000000000293 R12: 0000000000000001 [ 34.550157][ T3995] R13: 0000000000000000 R14: 00007feba2075fa0 R15: 00007ffc695abaf8 [ 34.550174][ T3995] [ 34.847521][ T4001] netlink: '’': attribute type 10 has an invalid length. [ 35.000030][ T4021] netlink: 'syz.0.226': attribute type 10 has an invalid length. [ 35.051248][ T4022] netlink: 'syz.0.226': attribute type 10 has an invalid length. [ 35.159115][ T4021] bond0: (slave dummy0): Releasing backup interface [ 35.170047][ T4021] team0: Port device dummy0 added [ 35.235582][ T4031] FAULT_INJECTION: forcing a failure. [ 35.235582][ T4031] name failslab, interval 1, probability 0, space 0, times 0 [ 35.248402][ T4031] CPU: 0 UID: 0 PID: 4031 Comm: syz.0.230 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(voluntary) [ 35.248450][ T4031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 35.248463][ T4031] Call Trace: [ 35.248469][ T4031] [ 35.248475][ T4031] __dump_stack+0x1d/0x30 [ 35.248490][ T4031] dump_stack_lvl+0xe8/0x140 [ 35.248551][ T4031] dump_stack+0x15/0x1b [ 35.248560][ T4031] should_fail_ex+0x265/0x280 [ 35.248576][ T4031] should_failslab+0x8c/0xb0 [ 35.248653][ T4031] __kmalloc_noprof+0xa5/0x3e0 [ 35.248667][ T4031] ? iovec_from_user+0x84/0x210 [ 35.248678][ T4031] ? mntput_no_expire+0x6f/0x3c0 [ 35.248722][ T4031] iovec_from_user+0x84/0x210 [ 35.248734][ T4031] __import_iovec+0xf3/0x540 [ 35.248757][ T4031] import_iovec+0x61/0x80 [ 35.248768][ T4031] ___sys_recvmsg+0x358/0x370 [ 35.248782][ T4031] do_recvmmsg+0x1ef/0x540 [ 35.248794][ T4031] ? get_timespec64+0xc9/0x100 [ 35.248832][ T4031] __x64_sys_recvmmsg+0xfb/0x170 [ 35.248860][ T4031] x64_sys_call+0x1c6a/0x2fb0 [ 35.248872][ T4031] do_syscall_64+0xd2/0x200 [ 35.248882][ T4031] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 35.248969][ T4031] ? clear_bhb_loop+0x40/0x90 [ 35.248981][ T4031] ? clear_bhb_loop+0x40/0x90 [ 35.248993][ T4031] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 35.249004][ T4031] RIP: 0033:0x7f01d67fe929 [ 35.249051][ T4031] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 35.249061][ T4031] RSP: 002b:00007f01d4e67038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 35.249072][ T4031] RAX: ffffffffffffffda RBX: 00007f01d6a25fa0 RCX: 00007f01d67fe929 [ 35.249079][ T4031] RDX: 04000000000003b4 RSI: 00002000000037c0 RDI: 0000000000000003 [ 35.249086][ T4031] RBP: 00007f01d4e67090 R08: 0000200000003700 R09: 0000000000000000 [ 35.249093][ T4031] R10: 0000000002040000 R11: 0000000000000246 R12: 0000000000000001 [ 35.249105][ T4031] R13: 0000000000000000 R14: 00007f01d6a25fa0 R15: 00007ffda7ff0d08 [ 35.249114][ T4031] [ 35.722158][ T4065] xt_CT: You must specify a L4 protocol and not use inversions on it [ 35.840149][ T4083] FAULT_INJECTION: forcing a failure. [ 35.840149][ T4083] name failslab, interval 1, probability 0, space 0, times 0 [ 35.860938][ T4083] CPU: 1 UID: 0 PID: 4083 Comm: syz.4.251 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(voluntary) [ 35.861008][ T4083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 35.861020][ T4083] Call Trace: [ 35.861027][ T4083] [ 35.861042][ T4083] __dump_stack+0x1d/0x30 [ 35.861064][ T4083] dump_stack_lvl+0xe8/0x140 [ 35.861080][ T4083] dump_stack+0x15/0x1b [ 35.861170][ T4083] should_fail_ex+0x265/0x280 [ 35.861195][ T4083] should_failslab+0x8c/0xb0 [ 35.861218][ T4083] __kmalloc_noprof+0xa5/0x3e0 [ 35.861244][ T4083] ? iovec_from_user+0x84/0x210 [ 35.861338][ T4083] ? mntput_no_expire+0x6f/0x3c0 [ 35.861360][ T4083] iovec_from_user+0x84/0x210 [ 35.861450][ T4083] __import_iovec+0xf3/0x540 [ 35.861472][ T4083] import_iovec+0x61/0x80 [ 35.861493][ T4083] ___sys_recvmsg+0x358/0x370 [ 35.861594][ T4083] do_recvmmsg+0x1ef/0x540 [ 35.861617][ T4083] ? get_timespec64+0xc9/0x100 [ 35.861685][ T4083] __x64_sys_recvmmsg+0xfb/0x170 [ 35.861702][ T4083] x64_sys_call+0x1c6a/0x2fb0 [ 35.861723][ T4083] do_syscall_64+0xd2/0x200 [ 35.861819][ T4083] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 35.861918][ T4083] ? clear_bhb_loop+0x40/0x90 [ 35.861941][ T4083] ? clear_bhb_loop+0x40/0x90 [ 35.861960][ T4083] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 35.861987][ T4083] RIP: 0033:0x7f239774e929 [ 35.862003][ T4083] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 35.862021][ T4083] RSP: 002b:00007f2395db7038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 35.862045][ T4083] RAX: ffffffffffffffda RBX: 00007f2397975fa0 RCX: 00007f239774e929 [ 35.862058][ T4083] RDX: 04000000000003b4 RSI: 00002000000037c0 RDI: 0000000000000003 [ 35.862108][ T4083] RBP: 00007f2395db7090 R08: 0000200000003700 R09: 0000000000000000 [ 35.862118][ T4083] R10: 0000000002040000 R11: 0000000000000246 R12: 0000000000000001 [ 35.862131][ T4083] R13: 0000000000000000 R14: 00007f2397975fa0 R15: 00007ffdf4154ca8 [ 35.862148][ T4083] [ 36.149775][ T4089] netlink: 'syz.3.252': attribute type 3 has an invalid length. [ 36.339292][ T4112] FAULT_INJECTION: forcing a failure. [ 36.339292][ T4112] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 36.352504][ T4112] CPU: 0 UID: 0 PID: 4112 Comm: syz.2.261 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(voluntary) [ 36.352521][ T4112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 36.352528][ T4112] Call Trace: [ 36.352532][ T4112] [ 36.352536][ T4112] __dump_stack+0x1d/0x30 [ 36.352548][ T4112] dump_stack_lvl+0xe8/0x140 [ 36.352559][ T4112] dump_stack+0x15/0x1b [ 36.352622][ T4112] should_fail_ex+0x265/0x280 [ 36.352639][ T4112] should_fail+0xb/0x20 [ 36.352653][ T4112] should_fail_usercopy+0x1a/0x20 [ 36.352698][ T4112] _copy_from_user+0x1c/0xb0 [ 36.352751][ T4112] io_submit_one+0x52/0x11d0 [ 36.352764][ T4112] __se_sys_io_submit+0xfb/0x280 [ 36.352783][ T4112] __x64_sys_io_submit+0x43/0x50 [ 36.352801][ T4112] x64_sys_call+0xfc4/0x2fb0 [ 36.352837][ T4112] do_syscall_64+0xd2/0x200 [ 36.352848][ T4112] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 36.352901][ T4112] ? clear_bhb_loop+0x40/0x90 [ 36.352981][ T4112] ? clear_bhb_loop+0x40/0x90 [ 36.352993][ T4112] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 36.353004][ T4112] RIP: 0033:0x7fdd1cede929 [ 36.353013][ T4112] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 36.353025][ T4112] RSP: 002b:00007fdd1b547038 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 36.353036][ T4112] RAX: ffffffffffffffda RBX: 00007fdd1d105fa0 RCX: 00007fdd1cede929 [ 36.353048][ T4112] RDX: 0000200000000300 RSI: 0000000000000001 RDI: 00007fdd1b516000 [ 36.353055][ T4112] RBP: 00007fdd1b547090 R08: 0000000000000000 R09: 0000000000000000 [ 36.353061][ T4112] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 36.353068][ T4112] R13: 0000000000000000 R14: 00007fdd1d105fa0 R15: 00007ffda42e9438 [ 36.353077][ T4112] [ 36.585067][ T29] kauditd_printk_skb: 1468 callbacks suppressed [ 36.585081][ T29] audit: type=1400 audit(1752661632.624:2965): avc: denied { read write } for pid=3307 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.633715][ T29] audit: type=1400 audit(1752661632.664:2966): avc: denied { read write } for pid=3306 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.660813][ T29] audit: type=1400 audit(1752661632.704:2967): avc: denied { prog_load } for pid=4123 comm="syz.1.266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 36.738044][ T29] audit: type=1400 audit(1752661632.784:2968): avc: denied { create } for pid=4115 comm="syz.4.262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 36.759980][ T29] audit: type=1400 audit(1752661632.794:2969): avc: denied { map_create } for pid=4115 comm="syz.4.262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 36.779126][ T29] audit: type=1400 audit(1752661632.794:2970): avc: denied { prog_load } for pid=4115 comm="syz.4.262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 36.820339][ T29] audit: type=1400 audit(1752661632.854:2971): avc: denied { read write } for pid=3315 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 36.844978][ T29] audit: type=1400 audit(1752661632.874:2972): avc: denied { map_create } for pid=4121 comm="syz.2.267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 36.864224][ T29] audit: type=1400 audit(1752661632.874:2973): avc: denied { prog_load } for pid=4121 comm="syz.2.267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 36.883278][ T29] audit: type=1400 audit(1752661632.874:2974): avc: denied { prog_load } for pid=4121 comm="syz.2.267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 36.919958][ T4124] xt_CT: No such helper "pptp" [ 36.964087][ T4130] team0: Port device dummy0 removed [ 36.977280][ T4130] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 37.033854][ T4139] bond0: (slave dummy0): Releasing backup interface [ 37.043849][ T4139] team0: Port device dummy0 added [ 37.054285][ T4139] team0: Port device dummy0 removed [ 37.061652][ T4139] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 37.143778][ T4145] capability: warning: `syz.0.274' uses deprecated v2 capabilities in a way that may be insecure [ 37.424983][ T4170] ================================================================== [ 37.433105][ T4170] BUG: KCSAN: data-race in mas_state_walk / mas_wr_store_entry [ 37.440662][ T4170] [ 37.442977][ T4170] write to 0xffff888104abed60 of 8 bytes by task 4166 on cpu 0: [ 37.450586][ T4170] mas_wr_store_entry+0x1581/0x2b50 [ 37.455772][ T4170] mas_store_prealloc+0x74d/0x9e0 [ 37.460791][ T4170] commit_merge+0x6a5/0x730 [ 37.465273][ T4170] vma_expand+0x1d0/0x370 [ 37.469586][ T4170] vma_merge_new_range+0x296/0x310 [ 37.474693][ T4170] mmap_region+0x9fa/0x1580 [ 37.479184][ T4170] do_mmap+0x9b3/0xbe0 [ 37.483239][ T4170] vm_mmap_pgoff+0x17a/0x2e0 [ 37.487814][ T4170] ksys_mmap_pgoff+0xc2/0x310 [ 37.492485][ T4170] x64_sys_call+0x1602/0x2fb0 [ 37.497144][ T4170] do_syscall_64+0xd2/0x200 [ 37.501626][ T4170] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 37.507511][ T4170] [ 37.509819][ T4170] read to 0xffff888104abed60 of 8 bytes by task 4170 on cpu 1: [ 37.517338][ T4170] mas_state_walk+0x2f5/0x650 [ 37.522018][ T4170] mas_walk+0x30/0x120 [ 37.526084][ T4170] lock_vma_under_rcu+0xa2/0x2f0 [ 37.531007][ T4170] do_user_addr_fault+0x233/0x1090 [ 37.536103][ T4170] exc_page_fault+0x62/0xa0 [ 37.540590][ T4170] asm_exc_page_fault+0x26/0x30 [ 37.545421][ T4170] [ 37.547725][ T4170] value changed: 0x00007f2395d54fff -> 0x00007f2395d33fff [ 37.554815][ T4170] [ 37.557118][ T4170] Reported by Kernel Concurrency Sanitizer on: [ 37.563246][ T4170] CPU: 1 UID: 0 PID: 4170 Comm: syz.4.281 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(voluntary) [ 37.575558][ T4170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 37.585613][ T4170] ==================================================================