last executing test programs: 2m47.263323435s ago: executing program 4 (id=1589): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0xf5, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001240)={&(0x7f0000000200)='kfree\x00', r1, 0x0, 0x9}, 0x18) sendmsg$NFT_BATCH(r0, 0x0, 0x20008000) 2m47.263007215s ago: executing program 4 (id=1590): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="030000000400000004000000b5"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="18000000000000000000000000000000180200", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r1, 0x0, 0xf, 0x0, &(0x7f0000000180)="c1dfb080cd21d308098ee68886dd96", 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2m47.199567991s ago: executing program 4 (id=1594): r0 = socket$netlink(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200130002000000da16c167d803f1f805000600200000000a00060000000000ff0000000000000000001ffeff0001000003f1dc7f7c6e7c02000100000000000040000280ffffff05000500000000000a"], 0x80}}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newsa={0x138, 0x10, 0x1, 0xfffffffe, 0x100, {{@in6=@private0={0xfc, 0x0, '\x00', 0x1}, @in=@rand_addr=0x64010101, 0x1, 0x714, 0x4e23, 0x5, 0x0, 0x0, 0x0, 0x3a}, {@in6=@mcast2, 0x4d4, 0x6c}, @in=@dev={0xac, 0x14, 0x14, 0x3f}, {0x0, 0x192, 0x6, 0xffff, 0x8251c, 0x2, 0xfffffffffffffff8}, {0xffffffffffffffff, 0x0, 0x1f, 0xfffffffffffffffe}, {0x2, 0xfffffffc}, 0x70bd2a, 0x3504, 0x2, 0x1, 0x0, 0x20}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}]}, 0x138}, 0x1, 0x0, 0x0, 0x8801}, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="3801000018"], 0x138}, 0x1, 0x0, 0x0, 0x8801}, 0x0) 2m47.198990591s ago: executing program 4 (id=1595): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80102, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x3fe, 0x7ffffffc, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) socket$nl_sock_diag(0x10, 0x3, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_route(0x10, 0x3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="030000000400000004000000b5"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x4, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000d000000b7"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r1, 0x0, 0xf, 0x0, &(0x7f0000000180)="c1dfb080cd21d308098ee68886dd96", 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2m47.137832127s ago: executing program 4 (id=1597): r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'syztnl1\x00', 0x0}) 2m47.137102577s ago: executing program 4 (id=1598): unshare(0x6a040000) (async) unshare(0x6a040000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f0000000280)='./file0\x00', 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB='nodots,check=relaxed,check=normal,nodots,uid=', @ANYRESHEX=0x0, @ANYBLOB], 0x1, 0x22d, &(0x7f0000000680)="$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") openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000140)='memory.pressure\x00', 0x2, 0x0) (async) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000140)='memory.pressure\x00', 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000020c0), 0x0, 0x1}, 0x20) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) renameat2(0xffffffffffffff9c, &(0x7f0000000280)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2e, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffc0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2e, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffc0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000540)='kfree\x00', r1, 0x0, 0x4}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x50) syz_open_dev$tty20(0xc, 0x4, 0x0) (async) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_DISALLOCATE(r2, 0x5608) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000ed074479000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r4, 0x0, 0xfffffffffffffffd}, 0x18) io_uring_enter(0xffffffffffffffff, 0x29ab, 0xd480, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000ebff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r6}, 0x10) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0202000311000000000000000000000005000500000000000a00000000000000fe8000000000000000000000000000bb000000000000000002000100000007000000000b000000000200090000000000000000000000000005000600000000000a00000000000000fe8800000000000000000000000000010000000000000000010018"], 0x88}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000010000000900010073797a300000000048000000030a05020000000000000000010000000900030073797a320000000014000480080002400000000008000140000000000900010073797a3000000000080007006e6174"], 0xcc}, 0x1, 0x0, 0x0, 0x880}, 0x0) (async) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000010000000900010073797a300000000048000000030a05020000000000000000010000000900030073797a320000000014000480080002400000000008000140000000000900010073797a3000000000080007006e6174"], 0xcc}, 0x1, 0x0, 0x0, 0x880}, 0x0) 2m32.651381281s ago: executing program 32 (id=1598): unshare(0x6a040000) (async) unshare(0x6a040000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f0000000280)='./file0\x00', 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB='nodots,check=relaxed,check=normal,nodots,uid=', @ANYRESHEX=0x0, @ANYBLOB], 0x1, 0x22d, &(0x7f0000000680)="$eJzs3b2KE1EYBuDP3exu2MatxWLAxiqodzDICuKAEJlCKwdWm10RZpvRKpfhNXhJXsZW6UbMhPwZbTQes/M8EOaFl8B3mpwU5yRv73+4vPh4/b799iWGwywGEZOYRpzFQRxG5878eTDLx7FqEgDAvhmPqzz1DOxWXefVUUSc/NSUX5MMBAAAAAAAAAAAwB9z/h8A+sf5/9uvrvPqdP79bZ3z/wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEA607a92/7mlXo+AODvs/8DQP/Y/wGgf+z/ANA/r16/eZEXxfk4y4YRN5OmbMru2fXPnhfnj7KZs+W7bpqmPFz0j7s+W++P4nTeP9naH8fDB13/o3v6stjoT+Ji98sHAAAAAAAAAAAAAAAAAACA/8IoW9h6v380+lXfpZXfB9i4vz+Ie4N/tgwAAAAAAAAAAAAAAAAAAADYa9efPl9WV1fvakEQhEVI/ckEAAAAAAAAAAAAAAAAAAD9s7z0m3oSAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEhn+f//uwup1wgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD0w/cAAAD//wu+k9A=") openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000140)='memory.pressure\x00', 0x2, 0x0) (async) openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000140)='memory.pressure\x00', 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f00000020c0), 0x0, 0x1}, 0x20) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) renameat2(0xffffffffffffff9c, &(0x7f0000000280)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2e, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffc0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2e, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffc0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000540)='kfree\x00', r1, 0x0, 0x4}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x50) syz_open_dev$tty20(0xc, 0x4, 0x0) (async) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_DISALLOCATE(r2, 0x5608) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000ed074479000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r4, 0x0, 0xfffffffffffffffd}, 0x18) io_uring_enter(0xffffffffffffffff, 0x29ab, 0xd480, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000ebff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r6}, 0x10) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0202000311000000000000000000000005000500000000000a00000000000000fe8000000000000000000000000000bb000000000000000002000100000007000000000b000000000200090000000000000000000000000005000600000000000a00000000000000fe8800000000000000000000000000010000000000000000010018"], 0x88}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000010000000900010073797a300000000048000000030a05020000000000000000010000000900030073797a320000000014000480080002400000000008000140000000000900010073797a3000000000080007006e6174"], 0xcc}, 0x1, 0x0, 0x0, 0x880}, 0x0) (async) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000010000000900010073797a300000000048000000030a05020000000000000000010000000900030073797a320000000014000480080002400000000008000140000000000900010073797a3000000000080007006e6174"], 0xcc}, 0x1, 0x0, 0x0, 0x880}, 0x0) 28.018463905s ago: executing program 0 (id=3826): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x281442, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f00000000c0)=ANY=[@ANYBLOB="2300030000000000"], 0x8) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x8800, 0x0) ioctl$TCSETSW2(r3, 0x5453, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1d, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="9bca80d84bfab158e2a0ed9aa35d20d0b92022d78669c7c30c81b1c79dacf685da9989954c50afbeddedbdcdc4077be4a5fc80b7a2dc8408fcdcd801c4f76e65cfbe2e90b357206061c8b9036d1be42e7a81baae", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x1a00404, &(0x7f0000000080)={[{@grpquota}, {@nomblk_io_submit}]}, 0x1, 0xbac, &(0x7f00000017c0)="$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") r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0x42, 0x0) pwrite64(r5, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) lseek(r5, 0x5, 0x4) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0xf) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r6, 0x10e, 0x4, &(0x7f0000000080)=0x100, 0x4) bind$netlink(r6, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xb, 0x1, 0x4, 0x0, 0x0, 0x7, 0x590, 0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0xfff, 0x0, 0x3, 0x8, 0x20005, 0x8, 0x0, 0x0, 0x0, 0x64f1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="58000000100000000000000000000000050000030500010007"], 0x58}, 0x1, 0x0, 0x0, 0x8040}, 0x4004010) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xfd13ad03441c30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r7}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x6, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18020000a8ffffff00000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) creat(&(0x7f0000000080)='./bus\x00', 0x0) mount(&(0x7f0000000100), &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x8c, &(0x7f0000000300)='trans=rdma,') writev(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea1100200005000000", 0x29}], 0x1) 27.522363514s ago: executing program 0 (id=3834): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000de0000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r1, 0x0, 0x8008000000010, &(0x7f00000003c0)="17000000020001000003d68c5ee17688a2003208030300ecff3f0000000300000a0000000098fc5ad9485bbb6a880000d6c8db0000dba67e06000000e28900000200df018000000000f50607bdff59100ac45761547a681f009cee4a5acb3da400001fb700674f00c88ebbf9315033bf79ac2dff060115003901000000000000ea000000000000000002ffff02dfccebf6ba0008400200000000e90554062a80e605007f71174aa951f3c63e5c83f1ba2112ce68bf17", 0xb6) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0xfffc, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x4, 0x0, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @multicast2}}}}}}, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r4, 0x0, 0x8008000000010, &(0x7f00000003c0)="17000000020001000003d68c5ee17688a2003208030300ecff3f0000000300000a0000000098fc5ad9485bbb6a880000d6c8db0000dba67e06000000e28900000200df018000000000f50607bdff59100ac45761547a681f009cee4a5acb3da400001fb700674f00c88ebbf9315033bf79ac2dff060115003901000000000000ea000000000000000002ffff02dfccebf6ba0008400200000000e90554062a80e605007f71174aa951f3c63e5c83f1ba2112ce68bf17a6e0", 0xb8) r5 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r5, 0x1, 0x8, &(0x7f00000001c0), 0x4) sendmsg$key(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000007c0)=ANY=[@ANYBLOB="0212000002"], 0x10}}, 0x14) close_range(r4, 0xffffffffffffffff, 0x0) 27.293590477s ago: executing program 0 (id=3837): socket$netlink(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000200)={0x18, 0x2, {0xfeff, @local}}, 0x1e) connect$pptp(r0, &(0x7f0000000700)={0x18, 0x2, {0x0, @multicast1}}, 0x1e) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000600)='./file0\x00', 0xc8d0, &(0x7f0000000140)=ANY=[@ANYRES8=0x0], 0x1, 0x30e, &(0x7f0000000f00)="$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") lstat(&(0x7f0000000280)='./file2\x00', &(0x7f00000003c0)) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = syz_io_uring_setup(0x1108, &(0x7f0000000880)={0x0, 0x2, 0x80, 0x2, 0x21e}, &(0x7f00000003c0)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r5, r6, &(0x7f0000000380)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200, 0x0, 0x1}) io_uring_enter(r4, 0x471b, 0xfffffffe, 0x20, 0x0, 0xffffffffffffff68) syz_io_uring_submit(r5, r6, &(0x7f00000001c0)=@IORING_OP_RECVMSG={0xa, 0x20, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0, 0x20042, 0x1}) setsockopt$inet6_IPV6_RTHDR(r3, 0x29, 0x39, &(0x7f0000000080)=ANY=[@ANYBLOB="2f0602020000000095b3af83ab09b2b4000000000062eb4d0002000000000000000100"/56], 0x38) 26.84511774s ago: executing program 0 (id=3840): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0, 0x0, 0x9}, 0x18) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000040)={0x2, 0x4e22, @loopback}, 0x10) sendmsg$rds(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000640)=[@rdma_map={0x30, 0x114, 0x3, {{0x0}, 0x0, 0xa}}], 0x30}, 0x0) (fail_nth: 10) 26.778263158s ago: executing program 0 (id=3841): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000200)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0x3}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x1d0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x10, 0x0) set_mempolicy(0x6005, &(0x7f0000000080)=0xfffffffffffffffa, 0x4) r2 = syz_io_uring_setup(0xe42, &(0x7f00000005c0)={0x0, 0x2119, 0x100, 0x0, 0x15b}, &(0x7f0000000140)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000040)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000002c0)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f00000004c0)={0x80000, 0x0, 0x32}, &(0x7f0000000500)='./file0\x00', 0x1d}) io_uring_enter(r2, 0x6f58, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a40)=ANY=[@ANYBLOB="140000001000010000000000000000000200000a20000000000a05000000000000000000070000000900010073797a300000001054000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a3000000000080005400000000c08000340000000080800074000000031"], 0xe4}}, 0x0) sched_setattr(0x0, 0x0, 0x0) r6 = syz_clone(0x4808000, 0x0, 0x6, 0x0, 0x0, 0x0) ptrace(0x10, r6) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r7, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r9}, 0x10) fsetxattr$trusted_overlay_origin(r5, &(0x7f0000000340), &(0x7f00000003c0), 0x2, 0x1) ptrace$getregset(0x4204, r6, 0x201, &(0x7f0000000000)={0x0, 0x300}) r10 = socket$nl_rdma(0x10, 0x3, 0x14) syz_emit_ethernet(0x0, 0x0, 0x0) r11 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r11, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="38000000031401002abd7000fedbdf250900020073797a3100000000080041007369770014003300626f6e6430"], 0x38}, 0x1, 0x0, 0x0, 0x8801}, 0x20000000) sendmsg$RDMA_NLDEV_CMD_SET(r10, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x4000801}, 0x800) 26.527359172s ago: executing program 0 (id=3843): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r1, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000003c0)=0x6, 0xdc) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000006c0)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x1, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x20300}}}}}}]}, 0x48}}, 0x4040004) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000000708050000000000000000000a000002"], 0x14}, 0x1, 0x0, 0x0, 0x20000050}, 0x40) getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0b000000080000000100010009000000"], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x3c, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) syz_mount_image$ext4(&(0x7f0000000640)='ext4\x00', &(0x7f0000000680)='./file0\x00', 0x0, &(0x7f00000006c0), 0x1, 0x62f, &(0x7f0000000700)="$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") 12.159913755s ago: executing program 33 (id=3843): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) r1 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r1, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000003c0)=0x6, 0xdc) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000006c0)=@newlink={0x48, 0x10, 0xffffff1f, 0x0, 0x1, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x20300}}}}}}]}, 0x48}}, 0x4040004) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000000708050000000000000000000a000002"], 0x14}, 0x1, 0x0, 0x0, 0x20000050}, 0x40) getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0b000000080000000100010009000000"], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x3c, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) syz_mount_image$ext4(&(0x7f0000000640)='ext4\x00', &(0x7f0000000680)='./file0\x00', 0x0, &(0x7f00000006c0), 0x1, 0x62f, &(0x7f0000000700)="$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") 1.757144157s ago: executing program 1 (id=4209): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_wakeup_irq', 0x0, 0xb) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000000c0)={@in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x30}}}, 0x0, 0x0, 0xffff, 0x0, "de2170420b42866d263a524b8f533db671e3fb462f6e152472578c7e9359d81409d1a02b9c2248e87414c4cfec9913387fd71cf21f357c8ca38ffddab5d147245ed5bdcdfaf4e9530630c66996c4905b"}, 0xd8) r3 = syz_open_dev$loop(&(0x7f0000000440), 0x81, 0x0) ioctl$LOOP_CONFIGURE(r3, 0x4c0a, &(0x7f0000000140)={r1, 0x800, {0x2a00, 0x80010000, 0x0, 0x5, 0xffffffffffffffff, 0x0, 0x5, 0x17, 0x16, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd6447a4b4e00d9683dda1af1ea09de2b7fb0a0100000000000000000300", "2809e8dbe108598927875397bab22d0000b420a9c81f40f05f819e01177d3d458dac00000000000000000000003b00000000000000000200", "90be8b1c5512406c7f00", [0x6, 0x40000100000000]}}) getsockopt$PNPIPE_IFINDEX(r1, 0x113, 0x2, &(0x7f00000000c0)=0x0, &(0x7f0000000100)=0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095", @ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', r4, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000380)={'macvtap0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4dc1}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r8}, @IFLA_HSR_SLAVE1={0x8, 0x1, r7}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 1.699796493s ago: executing program 1 (id=4216): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_wakeup_irq', 0x0, 0xb) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000000c0)={@in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x30}}}, 0x0, 0x0, 0xffff, 0x0, "de2170420b42866d263a524b8f533db671e3fb462f6e152472578c7e9359d81409d1a02b9c2248e87414c4cfec9913387fd71cf21f357c8ca38ffddab5d147245ed5bdcdfaf4e9530630c66996c4905b"}, 0xd8) r3 = syz_open_dev$loop(&(0x7f0000000440), 0x81, 0x0) ioctl$LOOP_CONFIGURE(r3, 0x4c0a, &(0x7f0000000140)={r1, 0x800, {0x2a00, 0x80010000, 0x0, 0x5, 0xffffffffffffffff, 0x0, 0x5, 0x17, 0x16, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd6447a4b4e00d9683dda1af1ea09de2b7fb0a0100000000000000000300", "2809e8dbe108598927875397bab22d0000b420a9c81f40f05f819e01177d3d458dac00000000000000000000003b00000000000000000200", "90be8b1c5512406c7f00", [0x6, 0x40000100000000]}}) getsockopt$PNPIPE_IFINDEX(r1, 0x113, 0x2, 0x0, &(0x7f0000000100)) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095", @ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000380)={'macvtap0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4dc1}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r7}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 1.588145384s ago: executing program 3 (id=4218): socket$netlink(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000200)={0x18, 0x2, {0xfeff, @local}}, 0x1e) connect$pptp(r0, &(0x7f0000000700)={0x18, 0x2, {0x0, @multicast1}}, 0x1e) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1, 0xffffffffffffffff}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000a40)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7020000080000001823", @ANYRES32=r2], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000600)='./file0\x00', 0xc8d0, &(0x7f0000000140)=ANY=[@ANYRES8=0x0], 0x1, 0x30e, &(0x7f0000000f00)="$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") lstat(&(0x7f0000000280)='./file2\x00', &(0x7f00000003c0)) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = syz_io_uring_setup(0x1108, &(0x7f0000000880)={0x0, 0x2, 0x80, 0x2, 0x21e}, &(0x7f00000003c0)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r6, r7, &(0x7f0000000380)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200, 0x0, 0x1}) io_uring_enter(r5, 0x471b, 0xfffffffe, 0x20, 0x0, 0xffffffffffffff68) syz_io_uring_submit(r6, r7, &(0x7f00000001c0)=@IORING_OP_RECVMSG={0xa, 0x20, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0, 0x20042, 0x1}) setsockopt$inet6_IPV6_RTHDR(r4, 0x29, 0x39, &(0x7f0000000080)=ANY=[@ANYBLOB="2f0602020000000095b3af83ab09b2b4000000000062eb4d0002000000000000000100"/56], 0x38) 1.572798675s ago: executing program 1 (id=4220): symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00') socket(0x10, 0x3, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x10, 0x2}, 0x94) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x2, 0xf4039, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_bp={0x0, 0x6}, 0x9092, 0x0, 0x43a1bd76, 0x9, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000040)='./file2\x00', 0x2814c00, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x1f, 0x249, &(0x7f0000000a00)="$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") bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0000000100f9ff7f0021005972a6c64b04f0f6df6d4b52dce31211fd1daed7c6021af209af97ce0c9583340d279cf518e783042add2adec7f4a00ad9063c9100419eab942533724f5c01ac2fa9b03395b406e0531ad0dcb87321cbb613d33a0982b9c9106dcc99293587f8d0a41c6cd0cd99df08791ce50c63d0ff733ead2a5610274257e142", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) unshare(0x22020600) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="4000000010003b1500"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000200012800b00010065727370616e800010000284080005000000000004001200"], 0x40}}, 0x0) pwritev(r2, 0x0, 0x0, 0x4, 0x81b) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x14000000) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'dummy0\x00'}) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x40000000000009f, 0x0) r5 = socket(0x10, 0x3, 0x0) sendto$inet6(r5, &(0x7f0000000000)="7800000018002507b9409b14ffff00000202be04020506056403040c5c0009003f0020010a0000000d0085a168216b46d32345653600648d27000b000a00080049935ade4a460c89b6ec0cff3959547f509058ba86c902007a00004a32000402160008200800000000000000e218d1ddf66ed538f2523250", 0x78, 0x0, 0x0, 0x0) 1.428208579s ago: executing program 1 (id=4223): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x281442, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x2}}, './file0\x00'}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f00000000c0)=ANY=[@ANYBLOB="2300030000000000"], 0x8) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x8800, 0x0) ioctl$TCSETSW2(r3, 0x5453, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1d, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="9bca80d84bfab158e2a0ed9aa35d20d0b92022d78669c7c30c81b1c79dacf685da9989954c50afbeddedbdcdc4077be4a5fc80b7a2dc8408fcdcd801c4f76e65cfbe2e90b357206061c8b9036d1be42e7a81baae", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000200)='itimer_expire\x00', r5, 0x0, 0xffffffffffff8001}, 0x18) syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x1a00404, &(0x7f0000000080)={[{@grpquota}, {@nomblk_io_submit}]}, 0x1, 0xbac, &(0x7f00000017c0)="$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") r6 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0x42, 0x0) pwrite64(r6, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) lseek(r6, 0x5, 0x4) r7 = socket$netlink(0x10, 0x3, 0xf) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r7, 0x10e, 0x4, &(0x7f0000000080)=0x100, 0x4) bind$netlink(r7, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xb, 0x1, 0x4, 0x0, 0x0, 0x7, 0x590, 0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0xfff, 0x0, 0x3, 0x8, 0x20005, 0x8, 0x0, 0x0, 0x0, 0x64f1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="58000000100000000000000000000000050000030500010007"], 0x58}, 0x1, 0x0, 0x0, 0x8040}, 0x4004010) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xfd13ad03441c30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r8}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x6, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18020000a8ffffff00000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) creat(&(0x7f0000000080)='./bus\x00', 0x0) mount(&(0x7f0000000100), &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x8c, &(0x7f0000000300)='trans=rdma,') writev(r0, &(0x7f0000000040)=[{&(0x7f0000000100)="290000002000190f00003fffffffda060200000000e80001dd0000040d000600ea1100200005000000", 0x29}], 0x1) 1.248452967s ago: executing program 3 (id=4226): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x1}, 0x50) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x3, 0x10, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x25}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$pppl2tp(0x18, 0x1, 0x1) r4 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) pwrite64(r4, &(0x7f00000001c0), 0x0, 0x8000c61) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r5 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) connect$pppl2tp(r3, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r5, 0x4, 0x0, 0x2, 0x0, {0xa, 0x4e21, 0x8000, @empty}}}, 0x32) writev(r3, &(0x7f0000000180)=[{&(0x7f0000000080)}], 0x1) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x28, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) r9 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$binfmt_register(r9, &(0x7f0000000180)={0x3a, 'syz1', 0x3a, 'E', 0x3a, 0x3, 0x3a, '{', 0x3a, '-', 0x3a, './file0', 0x3a, [0x46]}, 0x2a) 1.248026477s ago: executing program 2 (id=4227): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000de0000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r1, 0x0, 0x8008000000010, &(0x7f00000003c0)="17000000020001000003d68c5ee17688a2003208030300ecff3f0000000300000a0000000098fc5ad9485bbb6a880000d6c8db0000dba67e06000000e28900000200df018000000000f50607bdff59100ac45761547a681f009cee4a5acb3da400001fb700674f00c88ebbf9315033bf79ac2dff060115003901000000000000ea000000000000000002ffff02dfccebf6ba0008400200000000e90554062a80e605007f71174aa951f3c63e5c83f1ba2112ce68bf17a6e0", 0xb8) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0xfffc, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x4, 0x0, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @multicast2}}}}}}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r3, 0x0, 0x8008000000010, &(0x7f00000003c0)="17000000020001000003d68c5ee17688a2003208030300ecff3f0000000300000a0000000098fc5ad9485bbb6a880000d6c8db0000dba67e06000000e28900000200df018000000000f50607bdff59100ac45761547a681f009cee4a5acb3da400001fb700674f00c88ebbf9315033bf79ac2dff060115003901000000000000ea000000000000000002ffff02dfccebf6ba0008400200000000e90554062a80e605007f71174aa951f3c63e5c83f1ba2112ce68bf17a6e0", 0xb8) r4 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f00000001c0), 0x4) sendmsg$key(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000007c0)=ANY=[@ANYBLOB="0212000002"], 0x10}}, 0x14) close_range(r3, 0xffffffffffffffff, 0x0) 1.183118814s ago: executing program 2 (id=4228): r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000380)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fdd411efc40800040000000000000000", 0x39}], 0x1) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000400)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000200000000000006040000000000f931", 0x38}], 0x1) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) 1.157116507s ago: executing program 3 (id=4230): socket$netlink(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000200)={0x18, 0x2, {0xfeff, @local}}, 0x1e) connect$pptp(r0, &(0x7f0000000700)={0x18, 0x2, {0x0, @multicast1}}, 0x1e) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1, 0xffffffffffffffff}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000a40)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000600)='./file0\x00', 0xc8d0, &(0x7f0000000140)=ANY=[@ANYRES8=0x0], 0x1, 0x30e, &(0x7f0000000f00)="$eJzs3E1rE10UwPGTNEnTlHayeHhEQXrRjW6GNu7FIC2IAUttxBcQp81EQ8akZEIlIrZduXEhfggXpcvuCtov0I07V27cdSO4sAtxJDOTl7aJrWnSWPv/QZlD7j0z9+Y24dyBzPbdN0/zWVvPGmUJRpUERER2ROISlJqAfwy6cUSaLcvl4W+fzt++d/9mMpWanFFqKjl7JaGUGh17/+zFkN9tY1C24g+3vya+bP2/dXb75+yTnK1ytioUy8pQc8XPZWPOMlUmZ+d1paYt07BNlSvYZslrd5ZELFNlreLCQkUZhcxIbKFk2rYyChWVNyuqXFTlUkUZj41cQem6rkZigoOkV2dmjGSHyfNdHgx6pFRKGgMiMrSvJb3alwEBAIC+8uv/erUfrJb0ndT/oZb1/9qFzfLwnfVRv/7fiFTrf5Gm+v9R41ymygTr9X9URBr1f9HbH3S7/t9fEZ1sr3cvjjhOPYy06n+k+h8nRLX+j/mfX9fKg7VxN6D+BwAAAAAAAAAAAAAAAAAAAADgJNhxHM1xHM07DvivOtqgiETdX5B47X0eJnpk9/o3/lj/06Hx4I7QqIj1ajG9mPaOfodNEbHElHHR5If7/+CrxpFl5XZSVXH5YC35+UuLae+7JJmVnJs/IZrE9+Y7ztSN1OSE8uzOD0usOT8hmvzXOj+xNz9cPUbk0sWmfF00+TgvRbEk4/8yrpb/ckKp67dSe64/5PYDAAAAAOBfoKu6+v59sLld39/u7Y+9dm9/HZLW9we8/fV4y/19SM6F+jVrAAAAAABOF7vyPG9YllnqUbAiIj2+RJugNsPDZtUekNumT0AC7Zq6ENQu3ll6dWxdG0/4UO9YsKOhjkX+cFFaBrXbRu36yHQnZ3Y0kaO+h2fevvv++z7enTGRw5zw6nr0gJl2GkQOmmn42L6AAAAAABybRtFfe+VafwcEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMApdByP4uv3HAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIC/xa8AAAD//46ZAFE=") lstat(&(0x7f0000000280)='./file2\x00', &(0x7f00000003c0)) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = syz_io_uring_setup(0x1108, &(0x7f0000000880)={0x0, 0x2, 0x80, 0x2, 0x21e}, &(0x7f00000003c0)=0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r6, 0x0, &(0x7f0000000380)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x7, 0x0, 0x0, 0x200, 0x0, 0x1}) io_uring_enter(r5, 0x471b, 0xfffffffe, 0x20, 0x0, 0xffffffffffffff68) syz_io_uring_submit(r6, 0x0, &(0x7f00000001c0)=@IORING_OP_RECVMSG={0xa, 0x20, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0, 0x20042, 0x1}) setsockopt$inet6_IPV6_RTHDR(r4, 0x29, 0x39, &(0x7f0000000080)=ANY=[@ANYBLOB="2f0602020000000095b3af83ab09b2b4000000000062eb4d0002000000000000000100"/53], 0x38) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$EVIOCGPROP(r7, 0x40047438, &(0x7f0000000180)=""/246) writev(r7, &(0x7f0000000a40)=[{&(0x7f00000007c0)="4eabf26665e1929a09a8ed", 0xb}, {0x0}], 0x2) 1.123261949s ago: executing program 2 (id=4231): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_wakeup_irq', 0x0, 0xb) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000000c0)={@in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x30}}}, 0x0, 0x0, 0xffff, 0x0, "de2170420b42866d263a524b8f533db671e3fb462f6e152472578c7e9359d81409d1a02b9c2248e87414c4cfec9913387fd71cf21f357c8ca38ffddab5d147245ed5bdcdfaf4e9530630c66996c4905b"}, 0xd8) r3 = syz_open_dev$loop(&(0x7f0000000440), 0x81, 0x0) ioctl$LOOP_CONFIGURE(r3, 0x4c0a, &(0x7f0000000140)={r1, 0x800, {0x2a00, 0x80010000, 0x0, 0x5, 0xffffffffffffffff, 0x0, 0x5, 0x17, 0x16, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd6447a4b4e00d9683dda1af1ea09de2b7fb0a0100000000000000000300", "2809e8dbe108598927875397bab22d0000b420a9c81f40f05f819e01177d3d458dac00000000000000000000003b00000000000000000200", "90be8b1c5512406c7f00", [0x6, 0x40000100000000]}}) getsockopt$PNPIPE_IFINDEX(r1, 0x113, 0x2, 0x0, &(0x7f0000000100)) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095", @ANYRES64=r0, @ANYRESHEX=r0, @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000380)={'macvtap0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4dc1}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_SLAVE2={0x8, 0x2, r7}, @IFLA_HSR_SLAVE1={0x8, 0x1, r6}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 960.902625ms ago: executing program 2 (id=4235): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$inet6(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x3, 0xe, &(0x7f00000022c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) socket(0x400000000010, 0x3, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bridge_slave_0\x00'}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2, 0x0, 0xfffffffffffffffc}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r1}, &(0x7f0000000500), &(0x7f0000000540)=r2}, 0x20) llistxattr(&(0x7f0000000280)='./file1\x00', 0x0, 0x7) 944.557977ms ago: executing program 3 (id=4237): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x0, 0x2, 0xfffffe81, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000540)='./file7\x00', 0x1c0) mount$9p_fd(0x0, &(0x7f0000002500)='./file7\x00', &(0x7f0000002540), 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c616e616d653d62c58c09d6cb19a2712c76657273696f6e3d39703230"]) 941.260527ms ago: executing program 2 (id=4238): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000740)={&(0x7f0000000140)=ANY=[], 0x0, 0x35, 0x0, 0x1, 0xb}, 0x28) timer_create(0x0, 0x0, &(0x7f0000000300)=0x0) r2 = socket$igmp6(0xa, 0x3, 0x3a) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) setsockopt$MRT6_ADD_MFC(r2, 0x29, 0x22, &(0x7f0000000080)={{0xa, 0x4e24, 0x101, @loopback, 0xa3c}, {0xa, 0xfffe, 0xffdffffd, @dev={0xfe, 0x80, '\x00', 0x2}, 0x4}, 0x1000, {[0x9, 0x2, 0xfffffffe, 0xfffffef9, 0x0, 0x40001, 0x2, 0x5]}}, 0x5c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x18) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000006800019f00000000000000000200000000000000080001000100000004"], 0x24}, 0x1, 0x0, 0x0, 0x4005}, 0x8001) sendmmsg(r5, &(0x7f0000000000), 0x4000000000001f2, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000002900)=ANY=[@ANYBLOB="0200000004000000080000000100000080849a4a094a", @ANYRES32=r1, @ANYRES64=r0, @ANYRES32=r0], 0x50) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x200008, &(0x7f0000000400)={[{@grpquota}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x800}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x10000}}]}, 0x1, 0x508, &(0x7f0000000480)="$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") quotactl$Q_SETQUOTA(0xffffffff80000801, &(0x7f0000000040)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000100)={0x4, 0x200000fffffffc, 0x8000000000000001, 0x3, 0x1, 0x100, 0xb, 0xfffffffffffffffe, 0x9b}) 924.749519ms ago: executing program 1 (id=4239): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7dc470d00281f324, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x7fff}, 0x18) r2 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0x1}, 0x0) 905.284721ms ago: executing program 2 (id=4240): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYRESOCT, @ANYRES16=r0, @ANYRES64=r0], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x58, '\x00', 0x0, @fallback=0x2e, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) prctl$PR_MCE_KILL(0x35, 0x0, 0x10) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000500)='status\x00') lseek(r3, 0x9, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, 0x0, &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r4, 0x27, 0xe, 0x0, &(0x7f0000000200)="f802040000000000000000000800", 0x0, 0x405, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCMIWAIT(r5, 0x545c, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x22c7, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_io_uring_setup(0x10d2, &(0x7f0000000480)={0x0, 0x7736, 0x80, 0x2, 0x34f}, &(0x7f00000000c0), &(0x7f0000000080)) ioctl$TIOCMGET(r5, 0x5415, &(0x7f0000000b00)) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x13, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_MCE_KILL_GET(0x22) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r7}, 0x10) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140000001000010000000000000000000700000a7c000000060a030400000000000000000a0000050900010073797a3100000000500004804c0001800b00010074617267657400003c00028024000300733900000455afb9fdd672bad09dfb78c7699c74e891a0c7000000000000000008000240000000000c00010052415445455354000900020073797a32"], 0xa4}, 0x1, 0x0, 0x0, 0x4000850}, 0x20040040) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x40001, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000540)={@map=r1, 0x1e, 0x554446120900450d, 0x9, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, 0x0, &(0x7f00000004c0)=[0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) ioctl$VT_SETMODE(r9, 0x5602, &(0x7f0000000280)={0x8, 0x1, 0x7, 0x2580, 0x4}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0e00000004000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB="0000000000005addfb3368fbc800000000010000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/14], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000006c21000000d5002020207b1af8ff000000febea100000000000007010000f8ffffffb702000008000000b7030000000000008500000070000000181100"/84, @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 863.172815ms ago: executing program 3 (id=4242): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x1}, 0x50) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x3, 0x10, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x25}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$pppl2tp(0x18, 0x1, 0x1) r4 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) pwrite64(r4, &(0x7f00000001c0), 0x0, 0x8000c61) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r5 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) connect$pppl2tp(r3, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r5, 0x4, 0x0, 0x2, 0x0, {0xa, 0x4e21, 0x8000, @empty}}}, 0x32) writev(r3, &(0x7f0000000180)=[{&(0x7f0000000080)='v', 0x180204}], 0x1) r7 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x28, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) r9 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$binfmt_register(r9, &(0x7f0000000180)={0x3a, 'syz1', 0x3a, 'E', 0x3a, 0x3, 0x3a, '{', 0x3a, '-', 0x3a, './file0', 0x3a, [0x46]}, 0x2a) 806.385471ms ago: executing program 5 (id=4243): r0 = fsopen(&(0x7f0000000080)='mqueue\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f00000005c0)={[{@block_validity}, {}, {@sysvgroups}, {@norecovery}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@orlov}, {@nogrpid}, {@noauto_da_alloc}, {@norecovery}]}, 0x3, 0x56a, &(0x7f00000015c0)="$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") setxattr$security_ima(0x0, 0x0, 0x0, 0x700, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0x9d}, 0x18) socket$nl_route(0x10, 0x3, 0x0) rename(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000180)='./file1\x00') close(r0) 726.881258ms ago: executing program 1 (id=4246): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r1}, &(0x7f0000000000), &(0x7f00000005c0)=r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0xe, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) write$binfmt_misc(r0, &(0x7f0000000240), 0xfffffecc) 726.337978ms ago: executing program 3 (id=4247): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000600)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001a40)=ANY=[], &(0x7f0000000340)='syzkaller\x00'}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r3, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%pI4 \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="9800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r4, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r5], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = syz_open_procfs(0x0, &(0x7f0000000000)='net/raw\x00') preadv(r6, &(0x7f00000001c0)=[{&(0x7f00000039c0)=""/4088, 0xff8}], 0x1, 0x15f, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r8) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r8, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)={0x14, r9, 0x9c3fa077fa966179, 0x0, 0x0, {{0x7e}, {@void, @void}}}, 0x14}}, 0x4000054) 673.006194ms ago: executing program 5 (id=4248): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$inet6(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x3, 0xe, &(0x7f00000022c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) socket(0x400000000010, 0x3, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'bridge_slave_0\x00'}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2, 0x0, 0xfffffffffffffffc}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r1}, &(0x7f0000000500), &(0x7f0000000540)=r2}, 0x20) llistxattr(&(0x7f0000000280)='./file1\x00', 0x0, 0x7) 649.057476ms ago: executing program 5 (id=4249): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000de0000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r1, 0x0, 0x8008000000010, &(0x7f00000003c0)="17000000020001000003d68c5ee17688a2003208030300ecff3f0000000300000a0000000098fc5ad9485bbb6a880000d6c8db0000dba67e06000000e28900000200df018000000000f50607bdff59100ac45761547a681f009cee4a5acb3da400001fb700674f00c88ebbf9315033bf79ac2dff060115003901000000000000ea000000000000000002ffff02dfccebf6ba0008400200000000e90554062a80e605007f71174aa951f3c63e5c83f1ba2112ce68bf17a6e0", 0xb8) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0xfffc, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x4, 0x0, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @multicast2}}}}}}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r3, 0x0, 0x8008000000010, &(0x7f00000003c0)="17000000020001000003d68c5ee17688a2003208030300ecff3f0000000300000a0000000098fc5ad9485bbb6a880000d6c8db0000dba67e06000000e28900000200df018000000000f50607bdff59100ac45761547a681f009cee4a5acb3da400001fb700674f00c88ebbf9315033bf79ac2dff060115003901000000000000ea000000000000000002ffff02dfccebf6ba0008400200000000e90554062a80e605007f71174aa951f3c63e5c83f1ba2112ce68bf17a6e0", 0xb8) r4 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f00000001c0), 0x4) sendmsg$key(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000007c0)=ANY=[@ANYBLOB="0212000002"], 0x10}}, 0x14) close_range(r3, 0xffffffffffffffff, 0x0) 625.202978ms ago: executing program 5 (id=4250): r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000380)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fdd411efc40800040000000000000000", 0x39}], 0x1) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000400)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000200000000000006040000000000f931", 0x38}], 0x1) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) 530.405348ms ago: executing program 5 (id=4252): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x0, 0x2, 0xfffffe81, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000400000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000540)='./file7\x00', 0x1c0) pipe2$9p(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) mount$9p_fd(0x0, &(0x7f0000002500)='./file7\x00', &(0x7f0000002540), 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB="2c616e616d653d62c58c09d6cb19a2712c76657273696f6e3d397032303030"]) 447.725966ms ago: executing program 5 (id=4254): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffff27}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) setreuid(0xee01, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0x28f43000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x4, 0x82b) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x40000, 0x0) fcntl$notify(r1, 0x402, 0x1a) fcntl$setownex(r1, 0xf, &(0x7f0000000140)={0x2}) renameat2(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file7\x00', 0x4) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x5, &(0x7f0000000580)=ANY=[@ANYBLOB="180500000000000000000000000000180000000000000000000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x14, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000340)='xdp_devmap_xmit\x00', r3}, 0x18) getpid() r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r4, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) munlockall() r5 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000180)=ANY=[@ANYRESHEX=r2, @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mremap(&(0x7f0000000000/0x9000)=nil, 0x600a00, 0x200000, 0x3, &(0x7f0000a00000/0x600000)=nil) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x400000, 0x3, &(0x7f0000000000/0x400000)=nil) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000002c0)=0x1) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r7, 0x6, 0x1f, 0x0, &(0x7f0000000200)) 346.460686ms ago: executing program 6 (id=4256): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7dc470d00281f324, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x7fff}, 0x18) r2 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0, 0x0, 0x1}, 0x0) 247.419626ms ago: executing program 6 (id=4257): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)=ANY=[], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xf, &(0x7f0000000100)=ANY=[@ANYBLOB="180025f5dc1aac33662388fe7002000000000000fbaefb590000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00', r1}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r2, 0x0, 0x9}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000280)='sched_switch\x00', r4, 0x0, 0x4}, 0x18) socket$igmp6(0xa, 0x3, 0x2) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[], 0x50) r7 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x0, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x0) ioctl$EVIOCGREP(r7, 0x80084503, &(0x7f0000000040)=""/61) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000580)=@bpf_lsm={0x1d, 0x2b, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1800000005000000000000001400000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000094000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000183000000300d7c3d56848edffaf00008d260c000400000018000000e4000000000000000104000018110000", @ANYRES32=0x1, @ANYBLOB="0000000000000000b7080000090000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000b7080000000000007b8af8ff00000000b7080000f7ffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYRES16=r6], &(0x7f0000000280)='GPL\x00', 0x10001, 0xa9, &(0x7f0000000380)=""/169, 0x40f00, 0x20, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x6, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000540)=[{0x2, 0x2, 0xe, 0x2}, {0x3, 0x5, 0x1, 0x7}, {0x4, 0x1, 0x8, 0x3}]}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000380)={0x1}, 0x4) openat$vcsa(0xffffffffffffff9c, &(0x7f00000003c0), 0x8001, 0x0) 223.862108ms ago: executing program 6 (id=4258): r0 = fsopen(&(0x7f0000000080)='mqueue\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f00000005c0)={[{@block_validity}, {}, {@sysvgroups}, {@norecovery}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@orlov}, {@nogrpid}, {@noauto_da_alloc}, {@norecovery}]}, 0x3, 0x56a, &(0x7f00000015c0)="$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") setxattr$security_ima(0x0, 0x0, 0x0, 0x700, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0x9d}, 0x18) socket$nl_route(0x10, 0x3, 0x0) rename(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000180)='./file1\x00') close(r0) 175.583713ms ago: executing program 6 (id=4259): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$inet6(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x3, 0xe, &(0x7f00000022c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) socket(0x400000000010, 0x3, 0x0) socket$unix(0x1, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x9, 0x4, 0x7ffc0002}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0xfffffffffffffffc}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r0}, &(0x7f0000000500), &(0x7f0000000540)=r1}, 0x20) llistxattr(&(0x7f0000000280)='./file1\x00', 0x0, 0x7) 114.853228ms ago: executing program 6 (id=4260): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x1}, 0x50) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x3, 0x10, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x2}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x25}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$pppl2tp(0x18, 0x1, 0x1) r4 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) pwrite64(r4, &(0x7f00000001c0), 0x0, 0x8000c61) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) r5 = socket$inet6_udp(0xa, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) connect$pppl2tp(r3, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r5, 0x4, 0x0, 0x2, 0x0, {0xa, 0x4e21, 0x8000, @empty}}}, 0x32) writev(r3, &(0x7f0000000180)=[{&(0x7f0000000080)='v', 0x180204}], 0x1) r7 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x28, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) r9 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$binfmt_register(r9, &(0x7f0000000180)={0x3a, 'syz1', 0x3a, 'E', 0x3a, 0x3, 0x3a, '{', 0x3a, '-', 0x3a, './file0', 0x3a, [0x46]}, 0x2a) 0s ago: executing program 6 (id=4261): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000de0000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r1, 0x0, 0x8008000000010, &(0x7f00000003c0)="17000000020001000003d68c5ee17688a2003208030300ecff3f0000000300000a0000000098fc5ad9485bbb6a880000d6c8db0000dba67e06000000e28900000200df018000000000f50607bdff59100ac45761547a681f009cee4a5acb3da400001fb700674f00c88ebbf9315033bf79ac2dff060115003901000000000000ea000000000000000002ffff02dfccebf6ba0008400200000000e90554062a80e605007f71174aa951f3c63e5c83f1ba2112ce68bf17a6e0", 0xb8) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @remote, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0xfffc, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x4, 0x0, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote, @multicast2}}}}}}, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r3, 0x0, 0x8008000000010, &(0x7f00000003c0)="17000000020001000003d68c5ee17688a2003208030300ecff3f0000000300000a0000000098fc5ad9485bbb6a880000d6c8db0000dba67e06000000e28900000200df018000000000f50607bdff59100ac45761547a681f009cee4a5acb3da400001fb700674f00c88ebbf9315033bf79ac2dff060115003901000000000000ea000000000000000002ffff02dfccebf6ba0008400200000000e90554062a80e605007f71174aa951f3c63e5c83f1ba2112ce68bf17a6e0", 0xb8) r4 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f00000001c0), 0x4) sendmsg$key(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000007c0)=ANY=[@ANYBLOB="0212000002"], 0x10}}, 0x14) close_range(r3, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): 402 bytes leftover after parsing attributes in process `syz.3.2945'. [ 176.382428][T11444] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2945'. [ 176.397905][T11447] 8021q: adding VLAN 0 to HW filter on device bond1 [ 176.833671][T11317] veth0_vlan: entered promiscuous mode [ 176.873219][T11481] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 176.883693][T11481] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 176.898588][T11317] veth1_vlan: entered promiscuous mode [ 176.922198][T11317] veth0_macvtap: entered promiscuous mode [ 176.931684][T11317] veth1_macvtap: entered promiscuous mode [ 176.958510][T11479] binfmt_misc: register: failed to install interpreter file ./file0 [ 176.974265][T11317] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 176.994162][ T3401] usb 11-1: new low-speed USB device number 2 using vhci_hcd [ 177.000789][T11317] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 177.012968][ T7909] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.022801][ T7909] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.033484][ T7909] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.049275][ T7909] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 177.091339][T11490] netlink: 28 bytes leftover after parsing attributes in process `syz.0.2899'. [ 177.167944][T11506] netlink: 28 bytes leftover after parsing attributes in process `syz.0.2966'. [ 177.254593][T11516] veth4: entered promiscuous mode [ 177.259704][T11516] veth4: entered allmulticast mode [ 177.268655][T11518] netlink: 28 bytes leftover after parsing attributes in process `syz.0.2972'. [ 177.306010][T11522] veth3: entered promiscuous mode [ 177.311230][T11522] veth3: entered allmulticast mode [ 177.322523][T11524] veth5: entered promiscuous mode [ 177.327708][T11524] veth5: entered allmulticast mode [ 177.403616][T11529] tipc: Started in network mode [ 177.408592][T11529] tipc: Node identity 260a5191d9a9, cluster identity 4711 [ 177.415861][T11529] tipc: Enabled bearer , priority 0 [ 177.423042][T11529] FAULT_INJECTION: forcing a failure. [ 177.423042][T11529] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 177.436209][T11529] CPU: 0 UID: 0 PID: 11529 Comm: syz.0.2977 Not tainted syzkaller #0 PREEMPT(voluntary) [ 177.436234][T11529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 177.436273][T11529] Call Trace: [ 177.436279][T11529] [ 177.436285][T11529] __dump_stack+0x1d/0x30 [ 177.436305][T11529] dump_stack_lvl+0xe8/0x140 [ 177.436321][T11529] dump_stack+0x15/0x1b [ 177.436346][T11529] should_fail_ex+0x265/0x280 [ 177.436363][T11529] should_fail+0xb/0x20 [ 177.436376][T11529] should_fail_usercopy+0x1a/0x20 [ 177.436472][T11529] _copy_from_iter+0x254/0xe80 [ 177.436491][T11529] ? __build_skb_around+0x1ab/0x200 [ 177.436514][T11529] skb_copy_datagram_from_iter+0xb1/0x490 [ 177.436530][T11529] ? __netdev_alloc_frag_align+0xd8/0x130 [ 177.436588][T11529] tun_get_user+0xafa/0x26e0 [ 177.436697][T11529] ? ref_tracker_alloc+0x1f2/0x2f0 [ 177.436815][T11529] tun_chr_write_iter+0x15e/0x210 [ 177.436867][T11529] do_iter_readv_writev+0x4a1/0x540 [ 177.436891][T11529] vfs_writev+0x2df/0x8b0 [ 177.436919][T11529] do_writev+0xe7/0x210 [ 177.436951][T11529] __x64_sys_writev+0x45/0x50 [ 177.436970][T11529] x64_sys_call+0x1e9a/0x3000 [ 177.436987][T11529] do_syscall_64+0xd2/0x200 [ 177.437108][T11529] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 177.437199][T11529] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 177.437221][T11529] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 177.437238][T11529] RIP: 0033:0x7f557ad0efc9 [ 177.437252][T11529] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 177.437266][T11529] RSP: 002b:00007f557976f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 177.437314][T11529] RAX: ffffffffffffffda RBX: 00007f557af65fa0 RCX: 00007f557ad0efc9 [ 177.437324][T11529] RDX: 0000000000000002 RSI: 00002000000001c0 RDI: 0000000000000003 [ 177.437334][T11529] RBP: 00007f557976f090 R08: 0000000000000000 R09: 0000000000000000 [ 177.437343][T11529] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 177.437415][T11529] R13: 00007f557af66038 R14: 00007f557af65fa0 R15: 00007ffddd0542c8 [ 177.437430][T11529] [ 177.651862][T11526] tipc: Resetting bearer [ 177.705642][T11526] tipc: Disabling bearer [ 177.866273][ T29] kauditd_printk_skb: 630 callbacks suppressed [ 177.866286][ T29] audit: type=1400 audit(185.130:11555): avc: denied { ioctl } for pid=11549 comm="syz.1.2984" path="socket:[44868]" dev="sockfs" ino=44868 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 178.142116][T11550] team0: Port device team_slave_1 removed [ 178.189917][T11546] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 178.364109][ T52] unregister_netdevice: waiting for team_slave_0 to become free. Usage count = 2 [ 178.373694][ T52] ref_tracker: netdev@ffff88811a200558 has 1/1 users at [ 178.373694][ T52] ib_device_set_netdev+0x212/0x450 [ 178.373694][ T52] rxe_register_device+0x156/0x190 [ 178.373694][ T52] rxe_add+0x8d5/0x8f0 [ 178.373694][ T52] rxe_net_add+0x62/0xb0 [ 178.373694][ T52] rxe_newlink+0xc6/0x180 [ 178.373694][ T52] nldev_newlink+0x369/0x3f0 [ 178.373694][ T52] rdma_nl_rcv+0x47c/0x5a0 [ 178.373694][ T52] netlink_unicast+0x5c0/0x690 [ 178.373694][ T52] netlink_sendmsg+0x58b/0x6b0 [ 178.373694][ T52] __sock_sendmsg+0x145/0x180 [ 178.373694][ T52] ____sys_sendmsg+0x31e/0x4e0 [ 178.373694][ T52] ___sys_sendmsg+0x17b/0x1d0 [ 178.373694][ T52] __x64_sys_sendmsg+0xd4/0x160 [ 178.373694][ T52] x64_sys_call+0x191e/0x3000 [ 178.373694][ T52] do_syscall_64+0xd2/0x200 [ 178.373694][ T52] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 178.373694][ T52] [ 178.561660][T11559] __nla_validate_parse: 3 callbacks suppressed [ 178.561675][T11559] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2987'. [ 178.584126][T11563] netlink: 28 bytes leftover after parsing attributes in process `syz.5.2989'. [ 178.766504][T11572] netlink: 'syz.1.2991': attribute type 6 has an invalid length. [ 179.406071][T11582] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2996'. [ 179.464020][T11584] batman_adv: batadv0: adding TT local entry aa:aa:aa:aa:aa:2a to non-existent VLAN 1280 [ 179.917381][T11607] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3007'. [ 179.992916][T11609] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3007'. [ 180.065507][T11614] netlink: 24 bytes leftover after parsing attributes in process `syz.1.3009'. [ 180.119027][T11618] batman_adv: batadv0: adding TT local entry aa:aa:aa:aa:aa:2a to non-existent VLAN 1280 [ 180.208083][T11629] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 180.240926][T11629] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 180.292557][T11636] netlink: 28 bytes leftover after parsing attributes in process `syz.1.3018'. [ 180.428740][T11641] vlan2: entered allmulticast mode [ 180.434253][T11641] dummy0: entered allmulticast mode [ 180.599519][ T29] audit: type=1326 audit(188.006:11556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11648 comm="syz.5.3023" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 180.633945][ T29] audit: type=1326 audit(188.006:11557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11648 comm="syz.5.3023" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 180.657229][ T29] audit: type=1326 audit(188.006:11558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11648 comm="syz.5.3023" exe="/root/syz-executor" sig=0 arch=c000003e syscall=42 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 180.681080][ T29] audit: type=1326 audit(188.006:11559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11648 comm="syz.5.3023" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 180.704118][ T29] audit: type=1326 audit(188.006:11560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11648 comm="syz.5.3023" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 180.727431][ T29] audit: type=1326 audit(188.006:11561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11648 comm="syz.5.3023" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 180.750525][ T29] audit: type=1326 audit(188.006:11562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11648 comm="syz.5.3023" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 180.773517][ T29] audit: type=1326 audit(188.006:11563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11648 comm="syz.5.3023" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 180.796659][ T29] audit: type=1326 audit(188.006:11564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11648 comm="syz.5.3023" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 181.175840][T11681] binfmt_misc: register: failed to install interpreter file ./file0 [ 181.185498][T11685] netlink: 'syz.2.3031': attribute type 6 has an invalid length. [ 181.224330][T11687] batman_adv: batadv0: adding TT local entry aa:aa:aa:aa:aa:2a to non-existent VLAN 1280 [ 181.322784][T11698] veth12: entered promiscuous mode [ 181.327982][T11698] veth12: entered allmulticast mode [ 181.565055][T11713] batman_adv: batadv0: adding TT local entry aa:aa:aa:aa:aa:2a to non-existent VLAN 1280 [ 181.720174][T11719] netlink: 'syz.2.3050': attribute type 16 has an invalid length. [ 181.728132][T11719] netlink: 'syz.2.3050': attribute type 17 has an invalid length. [ 181.735930][T11719] netlink: 'syz.2.3050': attribute type 27 has an invalid length. [ 181.822805][T11719] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 181.863385][T11718] lo speed is unknown, defaulting to 1000 [ 182.012808][T11726] netlink: 12 bytes leftover after parsing attributes in process `syz.5.3053'. [ 182.061495][T11729] siw: device registration error -23 [ 182.247566][T11732] netlink: 'syz.2.3052': attribute type 6 has an invalid length. [ 182.686085][T11757] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3064'. [ 182.741011][T11763] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3065'. [ 182.793602][ T29] kauditd_printk_skb: 288 callbacks suppressed [ 182.793616][ T29] audit: type=1326 audit(190.305:11853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11765 comm="syz.2.3066" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdc8072efc9 code=0x7ffc0000 [ 182.796233][T11766] sch_tbf: peakrate 7 is lower than or equals to rate 7 ! [ 182.799981][ T29] audit: type=1326 audit(190.305:11854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11765 comm="syz.2.3066" exe="/root/syz-executor" sig=0 arch=c000003e syscall=13 compat=0 ip=0x7fdc8072efc9 code=0x7ffc0000 [ 182.852850][ T29] audit: type=1326 audit(190.305:11855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11765 comm="syz.2.3066" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdc8072efc9 code=0x7ffc0000 [ 182.875994][ T29] audit: type=1326 audit(190.305:11856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11765 comm="syz.2.3066" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fdc8072efc9 code=0x7ffc0000 [ 182.899046][ T29] audit: type=1326 audit(190.305:11857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11765 comm="syz.2.3066" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdc8072efc9 code=0x7ffc0000 [ 182.922195][ T29] audit: type=1326 audit(190.305:11858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11765 comm="syz.2.3066" exe="/root/syz-executor" sig=0 arch=c000003e syscall=285 compat=0 ip=0x7fdc8072efc9 code=0x7ffc0000 [ 182.945408][ T29] audit: type=1326 audit(190.305:11859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11765 comm="syz.2.3066" exe="/root/syz-executor" sig=0 arch=c000003e syscall=96 compat=0 ip=0xffffffffff600000 code=0x7ffc0000 [ 182.968662][ T29] audit: type=1326 audit(190.305:11860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11765 comm="syz.2.3066" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdc8072efc9 code=0x7ffc0000 [ 182.991737][ T29] audit: type=1326 audit(190.305:11861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11765 comm="syz.2.3066" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fdc8072efc9 code=0x7ffc0000 [ 183.014733][ T29] audit: type=1326 audit(190.305:11862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11765 comm="syz.2.3066" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdc8072efc9 code=0x7ffc0000 [ 183.314747][T11786] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 183.481695][T11786] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 183.524132][T11795] netlink: 12 bytes leftover after parsing attributes in process `syz.0.3078'. [ 183.694445][T11786] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 183.844163][T11786] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 184.018115][T11799] binfmt_misc: register: failed to install interpreter file ./file0 [ 184.065007][ T7895] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 184.092378][ T7895] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 184.155829][ T7895] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 184.174154][ T7895] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 184.256297][T11820] bridge0: entered promiscuous mode [ 184.270291][T11820] macsec1: entered promiscuous mode [ 184.278644][T11821] netlink: 12 bytes leftover after parsing attributes in process `syz.5.3090'. [ 184.280547][T11820] bridge0: port 3(macsec1) entered blocking state [ 184.294550][T11820] bridge0: port 3(macsec1) entered disabled state [ 184.309346][T11820] macsec1: entered allmulticast mode [ 184.314689][T11820] bridge0: entered allmulticast mode [ 184.327244][T11820] macsec1: left allmulticast mode [ 184.332326][T11820] bridge0: left allmulticast mode [ 184.344867][T11820] bridge0: left promiscuous mode [ 184.414237][T11828] binfmt_misc: register: failed to install interpreter file ./file0 [ 184.527091][T11854] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 184.568326][T11856] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3105'. [ 184.702860][T11866] bridge0: entered promiscuous mode [ 184.708106][T11866] macsec1: entered promiscuous mode [ 184.717788][T11866] bridge0: port 3(macsec1) entered blocking state [ 184.724377][T11866] bridge0: port 3(macsec1) entered disabled state [ 184.731225][T11866] macsec1: entered allmulticast mode [ 184.736514][T11866] bridge0: entered allmulticast mode [ 184.742900][T11866] macsec1: left allmulticast mode [ 184.748030][T11866] bridge0: left allmulticast mode [ 184.905469][T11866] bridge0: left promiscuous mode [ 184.926609][T11854] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 185.003940][T11874] netlink: 16 bytes leftover after parsing attributes in process `syz.0.3110'. [ 185.018873][T11854] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 185.130714][T11854] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 185.190028][T11878] vlan2: entered allmulticast mode [ 185.215931][T11878] dummy0: entered allmulticast mode [ 185.281181][ T7897] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 185.319457][ T7897] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 185.352917][ T7897] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 185.402243][ T7897] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 185.562581][T11893] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3119'. [ 186.052673][T11914] netlink: 12 bytes leftover after parsing attributes in process `syz.5.3125'. [ 186.208550][T11919] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3127'. [ 186.367810][T11927] veth6: entered promiscuous mode [ 186.372886][T11927] veth6: entered allmulticast mode [ 186.584019][T11953] sch_tbf: peakrate 7 is lower than or equals to rate 7 ! [ 186.865130][T11971] netlink: 12 bytes leftover after parsing attributes in process `syz.3.3138'. [ 187.024684][T11989] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 187.033786][T11989] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 187.240118][T11994] netlink: 'syz.2.3143': attribute type 6 has an invalid length. [ 187.876799][ T29] kauditd_printk_skb: 343 callbacks suppressed [ 187.876812][ T29] audit: type=1401 audit(195.649:12206): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 188.012160][T12015] netlink: 12 bytes leftover after parsing attributes in process `syz.1.3152'. [ 188.216665][T12024] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3156'. [ 188.294999][ T29] audit: type=1326 audit(196.079:12207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12025 comm="syz.1.3157" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f12564aefc9 code=0x7ffc0000 [ 188.347406][ T29] audit: type=1326 audit(196.100:12208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12025 comm="syz.1.3157" exe="/root/syz-executor" sig=0 arch=c000003e syscall=435 compat=0 ip=0x7f12564aefc9 code=0x7ffc0000 [ 188.370426][ T29] audit: type=1326 audit(196.111:12209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12025 comm="syz.1.3157" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f12564aefc9 code=0x7ffc0000 [ 188.393430][ T29] audit: type=1326 audit(196.111:12211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12025 comm="syz.1.3157" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f12564aefc9 code=0x7ffc0000 [ 188.416395][ T29] audit: type=1326 audit(196.111:12210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12027 comm="syz.1.3157" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f12564e1885 code=0x7ffc0000 [ 188.439492][ T29] audit: type=1326 audit(196.121:12212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12025 comm="syz.1.3157" exe="/root/syz-executor" sig=0 arch=c000003e syscall=234 compat=0 ip=0x7f12564aefc9 code=0x7ffc0000 [ 188.462453][ T29] audit: type=1326 audit(196.121:12213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12025 comm="syz.1.3157" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f12564aefc9 code=0x7ffc0000 [ 188.485453][ T29] audit: type=1326 audit(196.121:12214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12025 comm="syz.1.3157" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f12564aefc9 code=0x7ffc0000 [ 188.601501][T12035] vlan2: entered allmulticast mode [ 188.604584][ T29] audit: type=1326 audit(196.289:12215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12030 comm="syz.1.3159" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f12564aefc9 code=0x7ffc0000 [ 188.755748][T12044] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3164'. [ 189.154833][T12053] netlink: 'syz.2.3166': attribute type 6 has an invalid length. [ 189.334998][T12055] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3167'. [ 189.495800][T12059] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 189.625369][T12059] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 190.005983][T12059] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 190.063965][T12059] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 190.152057][ T7895] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.212534][ T7895] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.235521][T12081] vlan2: entered allmulticast mode [ 190.247153][T12081] dummy0: entered allmulticast mode [ 190.281744][ T7895] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.297695][ T7895] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 190.370914][T12088] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3177'. [ 190.471694][T12097] netlink: 16 bytes leftover after parsing attributes in process `syz.0.3180'. [ 191.240262][T12119] netlink: 16 bytes leftover after parsing attributes in process `syz.3.3190'. [ 191.343822][T12127] siw: device registration error -23 [ 191.355160][T12131] netlink: 8 bytes leftover after parsing attributes in process `syz.3.3196'. [ 191.525597][T12149] lo speed is unknown, defaulting to 1000 [ 191.547435][T12154] netlink: 16 bytes leftover after parsing attributes in process `syz.5.3204'. [ 192.115715][T12174] veth6: entered promiscuous mode [ 192.120832][T12174] veth6: entered allmulticast mode [ 192.423129][T12183] siw: device registration error -23 [ 192.673262][T12201] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 192.710745][T12204] IPVS: stopping master sync thread 12205 ... [ 192.716919][T12205] IPVS: sync thread started: state = MASTER, mcast_ifn = hsr0, syncid = 4, id = 0 [ 192.855800][T12201] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 193.021749][T12201] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 193.754980][T12201] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 193.800714][ T29] kauditd_printk_skb: 358 callbacks suppressed [ 193.800728][ T29] audit: type=1326 audit(201.864:12574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12219 comm="syz.2.3231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdc8072efc9 code=0x7ffc0000 [ 193.961433][ T29] audit: type=1326 audit(201.906:12575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12219 comm="syz.2.3231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdc8072efc9 code=0x7ffc0000 [ 193.984504][ T29] audit: type=1326 audit(201.906:12576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12219 comm="syz.2.3231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdc8072efc9 code=0x7ffc0000 [ 194.007473][ T29] audit: type=1326 audit(201.906:12577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12219 comm="syz.2.3231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdc8072efc9 code=0x7ffc0000 [ 194.031151][ T29] audit: type=1326 audit(201.906:12578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12219 comm="syz.2.3231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fdc8072efc9 code=0x7ffc0000 [ 194.054324][ T29] audit: type=1326 audit(201.916:12579): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12219 comm="syz.2.3231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdc8072efc9 code=0x7ffc0000 [ 194.077743][ T29] audit: type=1326 audit(201.916:12580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12219 comm="syz.2.3231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdc8072efc9 code=0x7ffc0000 [ 194.100765][ T29] audit: type=1326 audit(201.916:12581): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12219 comm="syz.2.3231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdc8072efc9 code=0x7ffc0000 [ 194.123815][ T29] audit: type=1326 audit(201.916:12582): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12219 comm="syz.2.3231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdc8072efc9 code=0x7ffc0000 [ 194.147094][ T29] audit: type=1326 audit(201.916:12583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12219 comm="syz.2.3231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fdc8072efc9 code=0x7ffc0000 [ 194.181141][ T7897] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 194.207467][ T7897] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 194.244712][ T7897] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 194.272398][ T7897] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 194.450444][T12244] siw: device registration error -23 [ 194.481134][T12246] siw: device registration error -23 [ 195.120050][T12273] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 195.171708][T12273] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 195.556273][T12284] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 196.645130][T12284] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 196.770137][T12284] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 196.903150][T12284] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 196.938307][T12307] netlink: 'syz.1.3260': attribute type 6 has an invalid length. [ 196.997936][T12308] netlink: 'syz.5.3262': attribute type 6 has an invalid length. [ 197.348757][ T7901] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 197.396356][ T7901] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 197.404661][ T7901] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 197.431102][T12330] netlink: 28 bytes leftover after parsing attributes in process `syz.2.3272'. [ 197.450986][T12331] netlink: 'syz.3.3269': attribute type 6 has an invalid length. [ 197.463823][ T7901] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 197.832085][T12348] netlink: 'syz.2.3276': attribute type 6 has an invalid length. [ 197.868680][T12351] netlink: 8 bytes leftover after parsing attributes in process `syz.5.3278'. [ 198.137795][T12356] macvtap0: entered promiscuous mode [ 198.160359][T12356] macvtap0: left promiscuous mode [ 198.217034][T12360] binfmt_misc: register: failed to install interpreter file ./file0 [ 198.568723][T12383] netlink: 'syz.0.3287': attribute type 6 has an invalid length. [ 198.580205][ T29] kauditd_printk_skb: 556 callbacks suppressed [ 198.580273][ T29] audit: type=1326 audit(206.882:13140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12388 comm="syz.5.3293" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 198.713577][T12394] siw: device registration error -23 [ 198.794561][T12395] netlink: 'syz.3.3290': attribute type 6 has an invalid length. [ 198.795686][ T29] audit: type=1326 audit(206.913:13141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12388 comm="syz.5.3293" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 198.804551][T12397] binfmt_misc: register: failed to install interpreter file ./file0 [ 198.825374][ T29] audit: type=1326 audit(206.913:13142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12388 comm="syz.5.3293" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 198.856870][ T29] audit: type=1326 audit(206.913:13143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12388 comm="syz.5.3293" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 198.879964][ T29] audit: type=1326 audit(206.913:13144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12388 comm="syz.5.3293" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 198.903032][ T29] audit: type=1326 audit(206.913:13145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12388 comm="syz.5.3293" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 198.926072][ T29] audit: type=1326 audit(206.913:13146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12388 comm="syz.5.3293" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 198.949040][ T29] audit: type=1326 audit(206.913:13147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12388 comm="syz.5.3293" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 198.972061][ T29] audit: type=1326 audit(206.913:13148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12388 comm="syz.5.3293" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 198.995170][ T29] audit: type=1326 audit(206.913:13149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12388 comm="syz.5.3293" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 199.002634][T12402] veth6: entered promiscuous mode [ 199.023343][T12402] veth6: entered allmulticast mode [ 199.611048][T12428] netlink: 28 bytes leftover after parsing attributes in process `syz.5.3306'. [ 199.672285][T12431] macvtap0: entered promiscuous mode [ 199.688241][T12431] macvtap0: left promiscuous mode [ 200.429549][T12462] siw: device registration error -23 [ 201.331341][T12497] netlink: 8 bytes leftover after parsing attributes in process `syz.0.3331'. [ 201.375288][T12501] bridge0: entered promiscuous mode [ 201.380923][T12501] macsec1: entered promiscuous mode [ 201.990852][T12512] binfmt_misc: register: failed to install interpreter file ./file0 [ 202.282505][T12538] siw: device registration error -23 [ 202.377203][T12550] siw: device registration error -23 [ 202.509197][T12559] vlan2: entered allmulticast mode [ 202.517143][T12559] dummy0: entered allmulticast mode [ 202.693741][T12571] veth8: entered promiscuous mode [ 202.698839][T12571] veth8: entered allmulticast mode [ 203.128448][T12588] siw: device registration error -23 [ 203.248954][T12594] netlink: 'syz.0.3369': attribute type 4 has an invalid length. [ 203.332289][T12600] vlan2: entered allmulticast mode [ 203.459186][ T29] kauditd_printk_skb: 619 callbacks suppressed [ 203.459201][ T29] audit: type=1326 audit(212.005:13769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12611 comm="syz.0.3376" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f557ad0efc9 code=0x7ffc0000 [ 203.488520][ T29] audit: type=1326 audit(212.005:13770): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12611 comm="syz.0.3376" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f557ad0efc9 code=0x7ffc0000 [ 203.541227][T12613] netlink: 'syz.1.3371': attribute type 6 has an invalid length. [ 203.566477][ T29] audit: type=1326 audit(212.005:13771): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12611 comm="syz.0.3376" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f557ad0efc9 code=0x7ffc0000 [ 203.589701][ T29] audit: type=1326 audit(212.005:13772): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12611 comm="syz.0.3376" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f557ad0efc9 code=0x7ffc0000 [ 203.613009][ T29] audit: type=1326 audit(212.005:13773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12611 comm="syz.0.3376" exe="/root/syz-executor" sig=0 arch=c000003e syscall=49 compat=0 ip=0x7f557ad0efc9 code=0x7ffc0000 [ 203.635929][ T29] audit: type=1326 audit(212.005:13774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12611 comm="syz.0.3376" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f557ad0efc9 code=0x7ffc0000 [ 203.659058][ T29] audit: type=1326 audit(212.005:13775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12611 comm="syz.0.3376" exe="/root/syz-executor" sig=0 arch=c000003e syscall=42 compat=0 ip=0x7f557ad0efc9 code=0x7ffc0000 [ 203.682026][ T29] audit: type=1326 audit(212.005:13776): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12611 comm="syz.0.3376" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f557ad0efc9 code=0x7ffc0000 [ 203.705079][ T29] audit: type=1326 audit(212.005:13777): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12611 comm="syz.0.3376" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f557ad0efc9 code=0x7ffc0000 [ 203.728069][ T29] audit: type=1326 audit(212.005:13778): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12611 comm="syz.0.3376" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f557ad0efc9 code=0x7ffc0000 [ 203.846856][T12623] siw: device registration error -23 [ 204.422350][T12633] netlink: 'syz.1.3383': attribute type 4 has an invalid length. [ 204.792215][T12650] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 204.817384][T12650] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 205.423569][T12665] netlink: 'syz.3.3394': attribute type 4 has an invalid length. [ 205.551971][T12671] netlink: 'syz.5.3396': attribute type 4 has an invalid length. [ 205.923234][T12703] netlink: 'syz.5.3405': attribute type 6 has an invalid length. [ 206.278463][T12707] netlink: 60 bytes leftover after parsing attributes in process `syz.3.3410'. [ 206.287483][T12707] netlink: 12 bytes leftover after parsing attributes in process `syz.3.3410'. [ 206.628153][T12718] siw: device registration error -23 [ 206.805987][T12722] siw: device registration error -23 [ 206.924495][T12741] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 207.131505][T12755] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 207.282491][T12755] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 207.333723][T12746] lo speed is unknown, defaulting to 1000 [ 207.652148][T12775] siw: device registration error -23 [ 207.689918][T12755] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 207.706266][T12774] macvtap0: entered promiscuous mode [ 207.713444][T12774] macvtap0: left promiscuous mode [ 207.772831][T12755] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 207.804876][T12746] chnl_net:caif_netlink_parms(): no params data found [ 207.889143][ T7898] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 207.901355][ T7898] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 207.928220][ T7901] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 207.937124][ T7901] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 207.968231][T12746] bridge0: port 1(bridge_slave_0) entered blocking state [ 207.975502][T12746] bridge0: port 1(bridge_slave_0) entered disabled state [ 207.999137][T12746] bridge_slave_0: entered allmulticast mode [ 208.011836][T12746] bridge_slave_0: entered promiscuous mode [ 208.019205][T12746] bridge0: port 2(bridge_slave_1) entered blocking state [ 208.026409][T12746] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.033821][T12746] bridge_slave_1: entered allmulticast mode [ 208.040918][T12746] bridge_slave_1: entered promiscuous mode [ 208.065887][T12746] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 208.097855][T12746] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 208.129613][T12746] team0: Port device team_slave_0 added [ 208.153432][T12746] team0: Port device team_slave_1 added [ 208.189907][T12746] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 208.197080][T12746] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 208.223381][T12746] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 208.229074][ T29] kauditd_printk_skb: 726 callbacks suppressed [ 208.229167][ T29] audit: type=1326 audit(217.012:14505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12811 comm="syz.0.3441" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f557ad0efc9 code=0x7ffc0000 [ 208.240993][T12746] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 208.270315][T12746] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 208.296445][T12746] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 208.317286][ T29] audit: type=1326 audit(217.075:14506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12811 comm="syz.0.3441" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f557ad0efc9 code=0x7ffc0000 [ 208.328113][T12814] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3442'. [ 208.370316][T12814] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 208.389884][T12814] netlink: 12 bytes leftover after parsing attributes in process `syz.5.3442'. [ 208.403970][ T29] audit: type=1326 audit(217.138:14507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12811 comm="syz.0.3441" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f557ad0efc9 code=0x7ffc0000 [ 208.427228][ T29] audit: type=1326 audit(217.138:14508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12811 comm="syz.0.3441" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f557ad0efc9 code=0x7ffc0000 [ 208.450371][ T29] audit: type=1326 audit(217.138:14509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12811 comm="syz.0.3441" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f557ad0efc9 code=0x7ffc0000 [ 208.473597][ T29] audit: type=1326 audit(217.138:14510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12811 comm="syz.0.3441" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f557ad0efc9 code=0x7ffc0000 [ 208.496711][ T29] audit: type=1326 audit(217.138:14511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12811 comm="syz.0.3441" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f557ad0efc9 code=0x7ffc0000 [ 208.519784][ T29] audit: type=1326 audit(217.138:14512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12811 comm="syz.0.3441" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f557ad0efc9 code=0x7ffc0000 [ 208.542780][ T29] audit: type=1326 audit(217.138:14513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12811 comm="syz.0.3441" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f557ad0efc9 code=0x7ffc0000 [ 208.565668][ T29] audit: type=1326 audit(217.138:14514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12811 comm="syz.0.3441" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f557ad0efc9 code=0x7ffc0000 [ 208.618351][T12746] hsr_slave_0: entered promiscuous mode [ 208.634740][T12746] hsr_slave_1: entered promiscuous mode [ 208.658805][T12746] debugfs: 'hsr0' already exists in 'hsr' [ 208.664563][T12746] Cannot create hsr debugfs directory [ 208.698224][T12827] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 208.722401][T12825] siw: device registration error -23 [ 208.846918][T12827] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 209.336733][T12827] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 209.355560][T12854] macvtap0: entered promiscuous mode [ 209.362013][T12854] macvtap0: left promiscuous mode [ 209.412931][T12827] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 209.511389][ T7901] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 209.529974][ T7901] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 209.556501][T12865] syzkaller0: entered allmulticast mode [ 209.562206][ T7901] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 209.570724][T12865] syzkaller0: entered promiscuous mode [ 209.582523][ T7901] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 209.600521][T12865] syzkaller0 (unregistering): left allmulticast mode [ 209.607252][T12865] syzkaller0 (unregistering): left promiscuous mode [ 209.661430][T12867] siw: device registration error -23 [ 209.720860][T12883] macvtap0: entered promiscuous mode [ 209.727020][T12883] macvtap0: left promiscuous mode [ 209.797034][T12890] FAULT_INJECTION: forcing a failure. [ 209.797034][T12890] name failslab, interval 1, probability 0, space 0, times 0 [ 209.809787][T12890] CPU: 0 UID: 0 PID: 12890 Comm: syz.3.3468 Not tainted syzkaller #0 PREEMPT(voluntary) [ 209.809815][T12890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 209.809826][T12890] Call Trace: [ 209.809833][T12890] [ 209.809840][T12890] __dump_stack+0x1d/0x30 [ 209.809895][T12890] dump_stack_lvl+0xe8/0x140 [ 209.809912][T12890] dump_stack+0x15/0x1b [ 209.809928][T12890] should_fail_ex+0x265/0x280 [ 209.809946][T12890] should_failslab+0x8c/0xb0 [ 209.810010][T12890] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 209.810038][T12890] ? __alloc_skb+0x101/0x320 [ 209.810067][T12890] __alloc_skb+0x101/0x320 [ 209.810151][T12890] ? audit_log_start+0x342/0x720 [ 209.810173][T12890] audit_log_start+0x3a0/0x720 [ 209.810192][T12890] audit_seccomp+0x48/0x100 [ 209.810271][T12890] ? __seccomp_filter+0x82d/0x1250 [ 209.810372][T12890] __seccomp_filter+0x83e/0x1250 [ 209.810402][T12890] __secure_computing+0x82/0x150 [ 209.810427][T12890] syscall_trace_enter+0xcf/0x1e0 [ 209.810474][T12890] do_syscall_64+0xac/0x200 [ 209.810490][T12890] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 209.810511][T12890] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 209.810690][T12890] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 209.810708][T12890] RIP: 0033:0x7fa68f19d9dc [ 209.810722][T12890] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 209.810737][T12890] RSP: 002b:00007fa68dbff030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 209.810786][T12890] RAX: ffffffffffffffda RBX: 00007fa68f3f5fa0 RCX: 00007fa68f19d9dc [ 209.810798][T12890] RDX: 000000000000000f RSI: 00007fa68dbff0a0 RDI: 0000000000000006 [ 209.810810][T12890] RBP: 00007fa68dbff090 R08: 0000000000000000 R09: 0000000000000000 [ 209.810823][T12890] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 209.810835][T12890] R13: 00007fa68f3f6038 R14: 00007fa68f3f5fa0 R15: 00007ffc46e5e2c8 [ 209.810852][T12890] [ 210.041248][T12746] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 210.051044][T12746] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 210.070058][T12746] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 210.083845][T12746] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 210.143382][T12746] 8021q: adding VLAN 0 to HW filter on device bond0 [ 210.156665][T12746] 8021q: adding VLAN 0 to HW filter on device team0 [ 210.175429][T12907] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 210.205883][ T7909] bridge0: port 1(bridge_slave_0) entered blocking state [ 210.212999][ T7909] bridge0: port 1(bridge_slave_0) entered forwarding state [ 210.311442][ T7901] bridge0: port 2(bridge_slave_1) entered blocking state [ 210.318559][ T7901] bridge0: port 2(bridge_slave_1) entered forwarding state [ 210.336309][T12907] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 210.831182][T12907] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 210.880853][T12907] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 210.902155][T12746] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 210.990503][T12933] FAULT_INJECTION: forcing a failure. [ 210.990503][T12933] name failslab, interval 1, probability 0, space 0, times 0 [ 211.003311][T12933] CPU: 1 UID: 0 PID: 12933 Comm: syz.0.3476 Not tainted syzkaller #0 PREEMPT(voluntary) [ 211.003385][T12933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 211.003396][T12933] Call Trace: [ 211.003402][T12933] [ 211.003409][T12933] __dump_stack+0x1d/0x30 [ 211.003500][T12933] dump_stack_lvl+0xe8/0x140 [ 211.003518][T12933] dump_stack+0x15/0x1b [ 211.003545][T12933] should_fail_ex+0x265/0x280 [ 211.003628][T12933] should_failslab+0x8c/0xb0 [ 211.003655][T12933] kmem_cache_alloc_lru_noprof+0x55/0x490 [ 211.003684][T12933] ? __d_alloc+0x3d/0x340 [ 211.003923][T12933] __d_alloc+0x3d/0x340 [ 211.003946][T12933] ? mpol_shared_policy_init+0xbd/0x4c0 [ 211.004023][T12933] d_alloc_pseudo+0x1e/0x80 [ 211.004081][T12933] alloc_file_pseudo+0x71/0x160 [ 211.004103][T12933] __shmem_file_setup+0x1de/0x210 [ 211.004126][T12933] shmem_file_setup+0x3b/0x50 [ 211.004141][T12933] __se_sys_memfd_create+0x2c3/0x590 [ 211.004199][T12933] __x64_sys_memfd_create+0x31/0x40 [ 211.004218][T12933] x64_sys_call+0x2ac2/0x3000 [ 211.004237][T12933] do_syscall_64+0xd2/0x200 [ 211.004256][T12933] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 211.004308][T12933] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 211.004335][T12933] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 211.004356][T12933] RIP: 0033:0x7f557ad0efc9 [ 211.004371][T12933] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 211.004434][T12933] RSP: 002b:00007f557976ee18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 211.004505][T12933] RAX: ffffffffffffffda RBX: 000000000000027a RCX: 00007f557ad0efc9 [ 211.004519][T12933] RDX: 00007f557976eef0 RSI: 0000000000000000 RDI: 00007f557ad92960 [ 211.004532][T12933] RBP: 0000200000000980 R08: 00007f557976ebb7 R09: 00007f557976ee40 [ 211.004588][T12933] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000001000 [ 211.004602][T12933] R13: 00007f557976eef0 R14: 00007f557976eeb0 R15: 0000200000000140 [ 211.004621][T12933] [ 211.031391][T12746] veth0_vlan: entered promiscuous mode [ 211.033677][T12746] veth1_vlan: entered promiscuous mode [ 211.042785][T12746] veth0_macvtap: entered promiscuous mode [ 211.048626][T12746] veth1_macvtap: entered promiscuous mode [ 211.063449][T12746] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 211.069452][T12746] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 211.078915][ T7897] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 211.079039][ T7897] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 211.079154][ T7897] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 211.079187][ T7897] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 211.133459][T12939] siw: device registration error -23 [ 211.331775][T12960] netlink: 'syz.1.3482': attribute type 6 has an invalid length. [ 211.483135][T12962] binfmt_misc: register: failed to install interpreter file ./file0 [ 211.558665][T12967] macvtap0: entered promiscuous mode [ 211.565255][T12967] macvtap0: left promiscuous mode [ 211.672768][T12981] FAULT_INJECTION: forcing a failure. [ 211.672768][T12981] name failslab, interval 1, probability 0, space 0, times 0 [ 211.685437][T12981] CPU: 1 UID: 0 PID: 12981 Comm: syz.2.3491 Not tainted syzkaller #0 PREEMPT(voluntary) [ 211.685540][T12981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 211.685553][T12981] Call Trace: [ 211.685559][T12981] [ 211.685564][T12981] __dump_stack+0x1d/0x30 [ 211.685619][T12981] dump_stack_lvl+0xe8/0x140 [ 211.685630][T12981] dump_stack+0x15/0x1b [ 211.685688][T12981] should_fail_ex+0x265/0x280 [ 211.685699][T12981] should_failslab+0x8c/0xb0 [ 211.685715][T12981] kmem_cache_alloc_lru_noprof+0x55/0x490 [ 211.685731][T12981] ? __d_alloc+0x3d/0x340 [ 211.685786][T12981] __d_alloc+0x3d/0x340 [ 211.685801][T12981] d_alloc+0x2e/0x100 [ 211.685817][T12981] lookup_one_qstr_excl+0x99/0x250 [ 211.685870][T12981] filename_create+0x149/0x230 [ 211.685901][T12981] do_symlinkat+0x65/0x3c0 [ 211.685921][T12981] __x64_sys_symlink+0x50/0x60 [ 211.685934][T12981] x64_sys_call+0x23d0/0x3000 [ 211.685946][T12981] do_syscall_64+0xd2/0x200 [ 211.685989][T12981] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 211.686004][T12981] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 211.686020][T12981] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 211.686031][T12981] RIP: 0033:0x7fdc8072efc9 [ 211.686055][T12981] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 211.686110][T12981] RSP: 002b:00007fdc7f18f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 211.686121][T12981] RAX: ffffffffffffffda RBX: 00007fdc80985fa0 RCX: 00007fdc8072efc9 [ 211.686128][T12981] RDX: 0000000000000000 RSI: 0000200000000640 RDI: 0000200000000340 [ 211.686135][T12981] RBP: 00007fdc7f18f090 R08: 0000000000000000 R09: 0000000000000000 [ 211.686141][T12981] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 211.686150][T12981] R13: 00007fdc80986038 R14: 00007fdc80985fa0 R15: 00007ffdf8fa0df8 [ 211.686192][T12981] [ 211.984410][T12993] netlink: 12 bytes leftover after parsing attributes in process `syz.3.3494'. [ 212.573252][T13008] binfmt_misc: register: failed to install interpreter file ./file0 [ 212.641971][T13015] siw: device registration error -23 [ 212.749136][T13027] macvtap0: entered promiscuous mode [ 212.772489][T13027] macvtap0: left promiscuous mode [ 212.779462][T13032] netlink: 'syz.0.3498': attribute type 6 has an invalid length. [ 213.125773][T13074] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3510'. [ 213.165002][ T7909] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 213.187135][ T7909] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 213.207979][ T7909] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 213.221891][ T7909] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 213.313008][T13088] siw: device registration error -23 [ 213.532715][ T29] kauditd_printk_skb: 634 callbacks suppressed [ 213.532728][ T29] audit: type=1326 audit(222.566:15147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13060 comm="syz.1.3509" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 213.561946][ T29] audit: type=1326 audit(222.566:15148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13060 comm="syz.1.3509" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 213.584962][ T29] audit: type=1326 audit(222.566:15149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13060 comm="syz.1.3509" exe="/root/syz-executor" sig=0 arch=c000003e syscall=152 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 213.607916][ T29] audit: type=1326 audit(222.566:15150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13060 comm="syz.1.3509" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 213.630957][ T29] audit: type=1326 audit(222.566:15151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13060 comm="syz.1.3509" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 213.654039][ T29] audit: type=1326 audit(222.566:15152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13060 comm="syz.1.3509" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 213.676990][ T29] audit: type=1326 audit(222.576:15153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13060 comm="syz.1.3509" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 213.700202][ T29] audit: type=1326 audit(222.576:15154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13060 comm="syz.1.3509" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 213.723221][ T29] audit: type=1326 audit(222.576:15155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13060 comm="syz.1.3509" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 213.746305][ T29] audit: type=1326 audit(222.576:15156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13060 comm="syz.1.3509" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 213.806821][T13104] macvtap0: entered promiscuous mode [ 213.824580][T13104] macvtap0: left promiscuous mode [ 214.182556][T13154] siw: device registration error -23 [ 214.204546][T13155] netlink: 'syz.1.3525': attribute type 6 has an invalid length. [ 214.404323][T13157] macvtap0: entered promiscuous mode [ 214.417053][T13157] macvtap0: left promiscuous mode [ 214.922574][T13183] siw: device registration error -23 [ 214.934211][T13184] binfmt_misc: register: failed to install interpreter file ./file0 [ 215.099432][T13192] macvtap0: entered promiscuous mode [ 215.105593][T13192] macvtap0: left promiscuous mode [ 215.161034][T13196] netlink: 'syz.2.3544': attribute type 4 has an invalid length. [ 215.173047][T13196] netlink: 'syz.2.3544': attribute type 4 has an invalid length. [ 215.230952][T13209] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 215.268645][T13209] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 215.410174][T13213] binfmt_misc: register: failed to install interpreter file ./file0 [ 215.582620][T13209] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 215.735624][T13209] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 216.046267][T13233] netlink: 'syz.1.3557': attribute type 4 has an invalid length. [ 216.079890][T13233] netlink: 'syz.1.3557': attribute type 4 has an invalid length. [ 216.128768][T13238] macvtap0: entered promiscuous mode [ 216.135369][T13238] macvtap0: left promiscuous mode [ 216.680361][T13271] netlink: 'syz.3.3568': attribute type 4 has an invalid length. [ 216.703625][T13271] netlink: 'syz.3.3568': attribute type 4 has an invalid length. [ 216.851364][T13280] macvtap0: entered promiscuous mode [ 216.857495][T13280] macvtap0: left promiscuous mode [ 216.947436][T13294] netlink: 'syz.2.3571': attribute type 6 has an invalid length. [ 217.120765][T13301] wireguard0: entered promiscuous mode [ 217.126358][T13301] wireguard0: entered allmulticast mode [ 217.140125][T13299] SELinux: ebitmap: truncated map [ 217.146324][T13299] SELinux: failed to load policy [ 217.203644][T13307] smc: net device bond0 applied user defined pnetid SYZ0 [ 217.257390][T13313] netlink: 'syz.2.3582': attribute type 4 has an invalid length. [ 217.289432][T13313] netlink: 'syz.2.3582': attribute type 4 has an invalid length. [ 217.481173][T13325] macvtap0: entered promiscuous mode [ 217.487526][T13325] macvtap0: left promiscuous mode [ 217.676639][T13333] netlink: 'syz.1.3588': attribute type 6 has an invalid length. [ 217.836174][T13347] netlink: 'syz.1.3594': attribute type 4 has an invalid length. [ 217.840039][T13346] veth2: entered promiscuous mode [ 217.849156][T13346] veth2: entered allmulticast mode [ 217.893248][T13351] netlink: 'syz.1.3594': attribute type 4 has an invalid length. [ 218.265616][T13356] delete_channel: no stack [ 218.293636][T13365] macvtap0: entered promiscuous mode [ 218.299742][T13365] macvtap0: left promiscuous mode [ 218.309310][ T29] kauditd_printk_skb: 841 callbacks suppressed [ 218.309324][ T29] audit: type=1400 audit(227.594:15998): avc: denied { create } for pid=13363 comm="syz.1.3599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 218.334797][ T29] audit: type=1400 audit(227.594:15999): avc: denied { write } for pid=13363 comm="syz.1.3599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 218.353773][ T29] audit: type=1400 audit(227.594:16000): avc: denied { create } for pid=13363 comm="syz.1.3599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 218.359531][T13364] siw: device registration error -23 [ 218.373939][ T29] audit: type=1400 audit(227.647:16001): avc: denied { write } for pid=13363 comm="syz.1.3599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 218.576373][T13367] netlink: 'syz.0.3601': attribute type 6 has an invalid length. [ 218.615349][ T29] audit: type=1326 audit(227.909:16002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13375 comm="syz.1.3605" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 218.638412][ T29] audit: type=1326 audit(227.909:16003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13375 comm="syz.1.3605" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 218.692219][ T29] audit: type=1326 audit(227.909:16004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13375 comm="syz.1.3605" exe="/root/syz-executor" sig=0 arch=c000003e syscall=435 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 218.715817][ T29] audit: type=1326 audit(227.941:16005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13375 comm="syz.1.3605" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 218.739146][ T29] audit: type=1326 audit(227.941:16006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13377 comm="syz.1.3605" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7ff216041885 code=0x7ffc0000 [ 218.743686][T13382] netlink: 'syz.1.3607': attribute type 4 has an invalid length. [ 218.762219][ T29] audit: type=1326 audit(227.941:16007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13375 comm="syz.1.3605" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 218.802481][T13380] binfmt_misc: register: failed to install interpreter file ./file0 [ 218.882339][T13391] siw: device registration error -23 [ 218.978116][T13400] siw: device registration error -23 [ 219.712749][T13422] binfmt_misc: register: failed to install interpreter file ./file0 [ 219.776800][ T7910] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 219.795552][ T7910] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 219.808183][ T7910] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 219.816834][ T7910] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 219.957702][T13449] siw: device registration error -23 [ 220.124758][T13483] macvtap0: entered promiscuous mode [ 220.131625][T13483] macvtap0: left promiscuous mode [ 220.156321][T13472] binfmt_misc: register: failed to install interpreter file ./file0 [ 220.195595][T13489] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 220.336904][T13489] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 220.369367][T13505] siw: device registration error -23 [ 220.441010][T13489] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 220.520061][T13489] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 220.672172][ T7910] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 220.713697][T13521] macvtap0: entered promiscuous mode [ 220.755669][T13521] macvtap0: left promiscuous mode [ 220.806906][ T7910] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 220.823192][ T7910] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 220.834655][ T7895] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 221.008331][T13527] binfmt_misc: register: failed to install interpreter file ./file0 [ 221.150480][T13546] FAULT_INJECTION: forcing a failure. [ 221.150480][T13546] name failslab, interval 1, probability 0, space 0, times 0 [ 221.163217][T13546] CPU: 0 UID: 0 PID: 13546 Comm: syz.1.3663 Not tainted syzkaller #0 PREEMPT(voluntary) [ 221.163246][T13546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 221.163259][T13546] Call Trace: [ 221.163264][T13546] [ 221.163271][T13546] __dump_stack+0x1d/0x30 [ 221.163294][T13546] dump_stack_lvl+0xe8/0x140 [ 221.163314][T13546] dump_stack+0x15/0x1b [ 221.163401][T13546] should_fail_ex+0x265/0x280 [ 221.163424][T13546] should_failslab+0x8c/0xb0 [ 221.163451][T13546] __kmalloc_node_track_caller_noprof+0xa5/0x580 [ 221.163483][T13546] ? cond_bools_copy+0x30/0x80 [ 221.163521][T13546] ? __pfx_cond_bools_destroy+0x10/0x10 [ 221.163538][T13546] kmemdup_noprof+0x2b/0x70 [ 221.163561][T13546] ? __pfx_cond_bools_destroy+0x10/0x10 [ 221.163609][T13546] cond_bools_copy+0x30/0x80 [ 221.163626][T13546] ? __pfx_cond_bools_destroy+0x10/0x10 [ 221.163645][T13546] hashtab_duplicate+0x11e/0x360 [ 221.163748][T13546] ? __pfx_cond_bools_copy+0x10/0x10 [ 221.163766][T13546] cond_policydb_dup+0xd2/0x4e0 [ 221.163786][T13546] security_set_bools+0xa0/0x340 [ 221.163842][T13546] sel_commit_bools_write+0x1ea/0x270 [ 221.163862][T13546] vfs_writev+0x406/0x8b0 [ 221.163915][T13546] ? __pfx_sel_commit_bools_write+0x10/0x10 [ 221.163954][T13546] ? mutex_lock+0xd/0x30 [ 221.163980][T13546] do_writev+0xe7/0x210 [ 221.164051][T13546] __x64_sys_writev+0x45/0x50 [ 221.164076][T13546] x64_sys_call+0x1e9a/0x3000 [ 221.164132][T13546] do_syscall_64+0xd2/0x200 [ 221.164149][T13546] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 221.164174][T13546] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 221.164266][T13546] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 221.164284][T13546] RIP: 0033:0x7ff21600efc9 [ 221.164363][T13546] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 221.164380][T13546] RSP: 002b:00007ff214a77038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 221.164398][T13546] RAX: ffffffffffffffda RBX: 00007ff216265fa0 RCX: 00007ff21600efc9 [ 221.164409][T13546] RDX: 0000000000000001 RSI: 0000200000000040 RDI: 0000000000000004 [ 221.164420][T13546] RBP: 00007ff214a77090 R08: 0000000000000000 R09: 0000000000000000 [ 221.164493][T13546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 221.164504][T13546] R13: 00007ff216266038 R14: 00007ff216265fa0 R15: 00007ffe2c199ca8 [ 221.164520][T13546] [ 221.482748][T13554] siw: device registration error -23 [ 221.501048][T13558] binfmt_misc: register: failed to install interpreter file ./file0 [ 221.570651][T13563] macvtap0: entered promiscuous mode [ 221.582751][T13563] macvtap0: left promiscuous mode [ 221.618193][T13566] validate_nla: 8 callbacks suppressed [ 221.618207][T13566] netlink: 'syz.3.3670': attribute type 6 has an invalid length. [ 221.651089][T13570] netlink: 'syz.1.3674': attribute type 4 has an invalid length. [ 221.725996][T13565] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 221.880070][T13565] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 221.981432][T13587] netlink: 12 bytes leftover after parsing attributes in process `syz.5.3680'. [ 221.993221][T13565] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 222.041637][T13565] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 222.172120][ T7897] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 222.209672][ T7897] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 222.248970][ T7897] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 222.278084][ T7897] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 222.301773][T13592] binfmt_misc: register: failed to install interpreter file ./file0 [ 222.357129][T13597] siw: device registration error -23 [ 222.447125][T13602] netlink: 'syz.3.3686': attribute type 4 has an invalid length. [ 222.587310][T13612] netlink: 'syz.2.3689': attribute type 6 has an invalid length. [ 222.599644][T13611] macvtap0: entered promiscuous mode [ 222.606228][T13611] macvtap0: left promiscuous mode [ 223.077446][ T29] kauditd_printk_skb: 1039 callbacks suppressed [ 223.077462][ T29] audit: type=1326 audit(232.591:17047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13626 comm="syz.1.3696" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 223.107388][ T29] audit: type=1326 audit(232.602:17048): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13626 comm="syz.1.3696" exe="/root/syz-executor" sig=0 arch=c000003e syscall=49 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 223.130426][ T29] audit: type=1326 audit(232.602:17049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13626 comm="syz.1.3696" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 223.153523][ T29] audit: type=1326 audit(232.602:17050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13626 comm="syz.1.3696" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 223.176553][ T29] audit: type=1326 audit(232.602:17051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13626 comm="syz.1.3696" exe="/root/syz-executor" sig=0 arch=c000003e syscall=42 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 223.199495][ T29] audit: type=1326 audit(232.602:17052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13626 comm="syz.1.3696" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 223.222494][ T29] audit: type=1326 audit(232.602:17053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13626 comm="syz.1.3696" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 223.245471][ T29] audit: type=1326 audit(232.602:17054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13626 comm="syz.1.3696" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 223.268537][ T29] audit: type=1326 audit(232.602:17055): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13626 comm="syz.1.3696" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 223.291497][ T29] audit: type=1326 audit(232.602:17056): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13626 comm="syz.1.3696" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 223.317384][T13634] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 223.382560][T13639] netlink: 'syz.1.3699': attribute type 4 has an invalid length. [ 223.449394][T13645] macvtap0: entered promiscuous mode [ 223.455518][T13645] macvtap0: left promiscuous mode [ 223.464263][T13634] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 223.656621][T13634] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 223.905350][T13653] netlink: 'syz.3.3706': attribute type 6 has an invalid length. [ 223.958092][T13634] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 223.998933][T13661] tipc: Enabling of bearer rejected, failed to enable media [ 224.121475][T13671] siw: device registration error -23 [ 224.221023][T13676] netlink: 'syz.3.3713': attribute type 4 has an invalid length. [ 224.542192][T13694] macvtap0: entered promiscuous mode [ 224.585435][T13694] macvtap0: left promiscuous mode [ 224.665785][T13698] veth2: entered promiscuous mode [ 224.671046][T13698] veth2: entered allmulticast mode [ 224.742630][T13707] netlink: 'syz.3.3720': attribute type 6 has an invalid length. [ 225.387660][T13758] x_tables: ip_tables: udp match: only valid for protocol 17 [ 225.577020][T13772] netlink: 'syz.5.3733': attribute type 6 has an invalid length. [ 225.769883][T13797] FAULT_INJECTION: forcing a failure. [ 225.769883][T13797] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 225.783071][T13797] CPU: 0 UID: 0 PID: 13797 Comm: syz.5.3738 Not tainted syzkaller #0 PREEMPT(voluntary) [ 225.783098][T13797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 225.783110][T13797] Call Trace: [ 225.783118][T13797] [ 225.783125][T13797] __dump_stack+0x1d/0x30 [ 225.783199][T13797] dump_stack_lvl+0xe8/0x140 [ 225.783215][T13797] dump_stack+0x15/0x1b [ 225.783229][T13797] should_fail_ex+0x265/0x280 [ 225.783271][T13797] should_fail+0xb/0x20 [ 225.783288][T13797] should_fail_usercopy+0x1a/0x20 [ 225.783308][T13797] _copy_to_user+0x20/0xa0 [ 225.783332][T13797] simple_read_from_buffer+0xb5/0x130 [ 225.783357][T13797] proc_fail_nth_read+0x10e/0x150 [ 225.783448][T13797] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 225.783472][T13797] vfs_read+0x1a8/0x770 [ 225.783545][T13797] ? __rcu_read_unlock+0x4f/0x70 [ 225.783570][T13797] ? __fget_files+0x184/0x1c0 [ 225.783596][T13797] ksys_read+0xda/0x1a0 [ 225.783619][T13797] __x64_sys_read+0x40/0x50 [ 225.783742][T13797] x64_sys_call+0x27c0/0x3000 [ 225.783762][T13797] do_syscall_64+0xd2/0x200 [ 225.783810][T13797] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 225.783835][T13797] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 225.783862][T13797] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 225.783881][T13797] RIP: 0033:0x7f166a21d9dc [ 225.783896][T13797] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 225.783910][T13797] RSP: 002b:00007f1668c7f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 225.783928][T13797] RAX: ffffffffffffffda RBX: 00007f166a475fa0 RCX: 00007f166a21d9dc [ 225.783940][T13797] RDX: 000000000000000f RSI: 00007f1668c7f0a0 RDI: 0000000000000005 [ 225.783950][T13797] RBP: 00007f1668c7f090 R08: 0000000000000000 R09: 0000000000000000 [ 225.783985][T13797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 225.784012][T13797] R13: 00007f166a476038 R14: 00007f166a475fa0 R15: 00007ffffd941018 [ 225.784028][T13797] [ 226.419535][T13810] siw: device registration error -23 [ 226.517956][T13819] netlink: 'syz.0.3742': attribute type 4 has an invalid length. [ 226.564410][T13826] macvtap0: entered promiscuous mode [ 226.588509][T13826] macvtap0: left promiscuous mode [ 226.761644][T13856] macvtap0: entered promiscuous mode [ 226.774380][T13856] macvtap0: left promiscuous mode [ 227.419585][T13876] FAULT_INJECTION: forcing a failure. [ 227.419585][T13876] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 227.432924][T13876] CPU: 1 UID: 0 PID: 13876 Comm: syz.3.3754 Not tainted syzkaller #0 PREEMPT(voluntary) [ 227.432951][T13876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 227.432972][T13876] Call Trace: [ 227.432979][T13876] [ 227.432987][T13876] __dump_stack+0x1d/0x30 [ 227.433043][T13876] dump_stack_lvl+0xe8/0x140 [ 227.433060][T13876] dump_stack+0x15/0x1b [ 227.433074][T13876] should_fail_ex+0x265/0x280 [ 227.433091][T13876] should_fail+0xb/0x20 [ 227.433104][T13876] should_fail_usercopy+0x1a/0x20 [ 227.433131][T13876] _copy_to_user+0x20/0xa0 [ 227.433151][T13876] simple_read_from_buffer+0xb5/0x130 [ 227.433172][T13876] proc_fail_nth_read+0x10e/0x150 [ 227.433276][T13876] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 227.433304][T13876] vfs_read+0x1a8/0x770 [ 227.433391][T13876] ? poll_select_finish+0x3b1/0x3f0 [ 227.433414][T13876] ? xfd_validate_state+0x45/0xf0 [ 227.433432][T13876] ksys_read+0xda/0x1a0 [ 227.433465][T13876] __x64_sys_read+0x40/0x50 [ 227.433486][T13876] x64_sys_call+0x27c0/0x3000 [ 227.433504][T13876] do_syscall_64+0xd2/0x200 [ 227.433556][T13876] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 227.433594][T13876] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 227.433656][T13876] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 227.433674][T13876] RIP: 0033:0x7fa68f19d9dc [ 227.433687][T13876] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 227.433705][T13876] RSP: 002b:00007fa68dbff030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 227.433725][T13876] RAX: ffffffffffffffda RBX: 00007fa68f3f5fa0 RCX: 00007fa68f19d9dc [ 227.433778][T13876] RDX: 000000000000000f RSI: 00007fa68dbff0a0 RDI: 0000000000000004 [ 227.433789][T13876] RBP: 00007fa68dbff090 R08: 0000000000000000 R09: 0000000000000000 [ 227.433799][T13876] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 227.433810][T13876] R13: 00007fa68f3f6038 R14: 00007fa68f3f5fa0 R15: 00007ffc46e5e2c8 [ 227.433825][T13876] [ 227.853555][ T29] kauditd_printk_skb: 707 callbacks suppressed [ 227.853568][ T29] audit: type=1326 audit(237.609:17764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13886 comm="syz.3.3759" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa68f19efc9 code=0x7ffc0000 [ 227.893353][T13891] siw: device registration error -23 [ 227.919169][ T29] audit: type=1326 audit(237.672:17765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13894 comm="syz.5.3762" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 227.942276][ T29] audit: type=1326 audit(237.672:17766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13894 comm="syz.5.3762" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 227.966116][ T29] audit: type=1326 audit(237.672:17767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13894 comm="syz.5.3762" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 227.975263][T13893] netlink: 'syz.3.3761': attribute type 6 has an invalid length. [ 227.989504][ T29] audit: type=1326 audit(237.672:17768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13894 comm="syz.5.3762" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 228.020174][ T29] audit: type=1326 audit(237.672:17769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13894 comm="syz.5.3762" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 228.043187][ T29] audit: type=1326 audit(237.672:17770): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13894 comm="syz.5.3762" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 228.066258][ T29] audit: type=1326 audit(237.672:17771): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13894 comm="syz.5.3762" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 228.089434][ T29] audit: type=1326 audit(237.672:17772): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13894 comm="syz.5.3762" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 228.112576][ T29] audit: type=1326 audit(237.672:17773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13894 comm="syz.5.3762" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 228.502563][ T7897] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 228.513762][T13918] veth4: entered promiscuous mode [ 228.518997][T13918] veth4: entered allmulticast mode [ 228.565248][T13917] binfmt_misc: register: failed to install interpreter file ./file0 [ 228.567091][ T7897] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 228.614080][ T7897] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 228.640528][ T7897] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 228.759906][T13938] netlink: 'syz.2.3772': attribute type 4 has an invalid length. [ 228.842324][T13954] siw: device registration error -23 [ 230.072355][T14012] netlink: 'syz.0.3785': attribute type 4 has an invalid length. [ 230.177353][T14023] netlink: 'syz.3.3784': attribute type 6 has an invalid length. [ 230.227875][T14028] siw: device registration error -23 [ 230.452330][T14050] macvtap0: entered promiscuous mode [ 230.458389][T14050] macvtap0: left promiscuous mode [ 230.570701][T14066] macvtap0: entered promiscuous mode [ 230.577003][T14066] macvtap0: left promiscuous mode [ 230.585368][T14068] netlink: 'syz.5.3796': attribute type 4 has an invalid length. [ 230.699016][T14072] binfmt_misc: register: failed to install interpreter file ./file0 [ 230.801916][T14101] macvtap0: entered promiscuous mode [ 230.808212][T14101] macvtap0: left promiscuous mode [ 231.051392][T14113] netlink: 'syz.3.3809': attribute type 6 has an invalid length. [ 231.063991][T14115] netlink: 'syz.2.3811': attribute type 4 has an invalid length. [ 231.119442][T14117] netlink: 16 bytes leftover after parsing attributes in process `syz.2.3812'. [ 231.176016][T14117] macvtap0: entered promiscuous mode [ 231.196092][T14117] macvtap0: left promiscuous mode [ 231.224310][T14120] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3812'. [ 231.326700][T14124] macvtap0: entered promiscuous mode [ 231.338342][T14124] macvtap0: left promiscuous mode [ 231.424402][T14127] FAULT_INJECTION: forcing a failure. [ 231.424402][T14127] name failslab, interval 1, probability 0, space 0, times 0 [ 231.437229][T14127] CPU: 0 UID: 0 PID: 14127 Comm: syz.0.3816 Not tainted syzkaller #0 PREEMPT(voluntary) [ 231.437324][T14127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 231.437337][T14127] Call Trace: [ 231.437344][T14127] [ 231.437353][T14127] __dump_stack+0x1d/0x30 [ 231.437380][T14127] dump_stack_lvl+0xe8/0x140 [ 231.437402][T14127] dump_stack+0x15/0x1b [ 231.437475][T14127] should_fail_ex+0x265/0x280 [ 231.437496][T14127] should_failslab+0x8c/0xb0 [ 231.437522][T14127] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 231.437553][T14127] ? __alloc_skb+0x101/0x320 [ 231.437656][T14127] __alloc_skb+0x101/0x320 [ 231.437683][T14127] netlink_alloc_large_skb+0xbf/0xf0 [ 231.437713][T14127] netlink_sendmsg+0x3cf/0x6b0 [ 231.437787][T14127] ? __pfx_netlink_sendmsg+0x10/0x10 [ 231.437805][T14127] __sock_sendmsg+0x145/0x180 [ 231.437831][T14127] ____sys_sendmsg+0x31e/0x4e0 [ 231.437866][T14127] ___sys_sendmsg+0x17b/0x1d0 [ 231.437950][T14127] __x64_sys_sendmsg+0xd4/0x160 [ 231.437987][T14127] x64_sys_call+0x191e/0x3000 [ 231.438008][T14127] do_syscall_64+0xd2/0x200 [ 231.438033][T14127] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 231.438060][T14127] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 231.438094][T14127] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 231.438113][T14127] RIP: 0033:0x7f557ad0efc9 [ 231.438173][T14127] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 231.438193][T14127] RSP: 002b:00007f557976f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 231.438215][T14127] RAX: ffffffffffffffda RBX: 00007f557af65fa0 RCX: 00007f557ad0efc9 [ 231.438227][T14127] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: 0000000000000004 [ 231.438238][T14127] RBP: 00007f557976f090 R08: 0000000000000000 R09: 0000000000000000 [ 231.438249][T14127] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 231.438262][T14127] R13: 00007f557af66038 R14: 00007f557af65fa0 R15: 00007ffddd0542c8 [ 231.438281][T14127] [ 231.732837][T14136] binfmt_misc: register: failed to install interpreter file ./file0 [ 231.818167][T14154] netlink: 'syz.5.3822': attribute type 4 has an invalid length. [ 231.962620][T14173] macvtap0: entered promiscuous mode [ 231.981775][T14171] vhci_hcd: invalid port number 96 [ 231.984616][T14173] macvtap0: left promiscuous mode [ 231.987143][T14171] vhci_hcd: default hub control req: 0300 vfffa i0060 l0 [ 232.019800][T14167] bond0: (slave dummy0): Releasing backup interface [ 232.127931][T14189] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 232.138016][T14193] netlink: 'syz.0.3826': attribute type 6 has an invalid length. [ 232.186094][T14189] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 232.297544][T14189] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 232.357589][T14190] binfmt_misc: register: failed to install interpreter file ./file0 [ 232.600112][T14208] netlink: 'syz.2.3836': attribute type 4 has an invalid length. [ 232.636699][ T29] kauditd_printk_skb: 910 callbacks suppressed [ 232.636728][ T29] audit: type=1326 audit(242.638:18685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14210 comm="syz.1.3835" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7ff216041885 code=0x7ffc0000 [ 232.667210][ T29] audit: type=1326 audit(242.638:18684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14205 comm="syz.1.3835" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 232.770119][ T29] audit: type=1326 audit(242.690:18686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14205 comm="syz.1.3835" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 232.793459][ T29] audit: type=1326 audit(242.701:18687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14205 comm="syz.1.3835" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 232.816656][ T29] audit: type=1326 audit(242.701:18688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14205 comm="syz.1.3835" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 232.840213][ T29] audit: type=1326 audit(242.701:18689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14205 comm="syz.1.3835" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 232.863398][ T29] audit: type=1326 audit(242.701:18690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14205 comm="syz.1.3835" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 232.886645][ T29] audit: type=1326 audit(242.701:18691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14205 comm="syz.1.3835" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 232.910113][ T29] audit: type=1326 audit(242.711:18692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14205 comm="syz.1.3835" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 232.933270][ T29] audit: type=1326 audit(242.711:18693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14205 comm="syz.1.3835" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 233.022866][T14222] FAULT_INJECTION: forcing a failure. [ 233.022866][T14222] name failslab, interval 1, probability 0, space 0, times 0 [ 233.024094][T14189] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 233.035668][T14222] CPU: 0 UID: 0 PID: 14222 Comm: syz.0.3840 Not tainted syzkaller #0 PREEMPT(voluntary) [ 233.035762][T14222] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 233.035775][T14222] Call Trace: [ 233.035782][T14222] [ 233.035789][T14222] __dump_stack+0x1d/0x30 [ 233.035811][T14222] dump_stack_lvl+0xe8/0x140 [ 233.035888][T14222] dump_stack+0x15/0x1b [ 233.035905][T14222] should_fail_ex+0x265/0x280 [ 233.036052][T14222] should_failslab+0x8c/0xb0 [ 233.036079][T14222] __kmalloc_node_track_caller_noprof+0xa5/0x580 [ 233.036174][T14222] ? sidtab_sid2str_get+0xa0/0x130 [ 233.036208][T14222] kmemdup_noprof+0x2b/0x70 [ 233.036229][T14222] sidtab_sid2str_get+0xa0/0x130 [ 233.036328][T14222] security_sid_to_context_core+0x1eb/0x2e0 [ 233.036357][T14222] security_sid_to_context+0x27/0x40 [ 233.036382][T14222] avc_audit_post_callback+0x10f/0x520 [ 233.036426][T14222] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 233.036457][T14222] common_lsm_audit+0x1bb/0x230 [ 233.036541][T14222] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 233.036637][T14222] slow_avc_audit+0x104/0x140 [ 233.036669][T14222] avc_has_perm+0x13a/0x180 [ 233.036688][T14222] selinux_socket_sendmsg+0x175/0x1b0 [ 233.036714][T14222] security_socket_sendmsg+0x48/0x80 [ 233.036881][T14222] __sock_sendmsg+0x30/0x180 [ 233.036921][T14222] ____sys_sendmsg+0x31e/0x4e0 [ 233.036953][T14222] ___sys_sendmsg+0x17b/0x1d0 [ 233.037048][T14222] __x64_sys_sendmsg+0xd4/0x160 [ 233.037080][T14222] x64_sys_call+0x191e/0x3000 [ 233.037101][T14222] do_syscall_64+0xd2/0x200 [ 233.037120][T14222] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 233.037161][T14222] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 233.037194][T14222] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 233.037215][T14222] RIP: 0033:0x7f557ad0efc9 [ 233.037249][T14222] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 233.037267][T14222] RSP: 002b:00007f557976f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 233.037311][T14222] RAX: ffffffffffffffda RBX: 00007f557af65fa0 RCX: 00007f557ad0efc9 [ 233.037324][T14222] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000005 [ 233.037336][T14222] RBP: 00007f557976f090 R08: 0000000000000000 R09: 0000000000000000 [ 233.037348][T14222] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 233.037440][T14222] R13: 00007f557af66038 R14: 00007f557af65fa0 R15: 00007ffddd0542c8 [ 233.037458][T14222] [ 233.410051][T14233] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 233.430016][ T7897] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 233.453505][ T7897] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 233.469323][ T7897] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 233.487612][ T7897] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 233.522406][T14233] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 233.590166][T14233] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 233.761669][T14233] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 233.870786][ T7912] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 233.906174][ T7912] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 233.985367][T14245] netlink: 'syz.5.3848': attribute type 4 has an invalid length. [ 234.001680][ T7912] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 234.057805][ T7912] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 234.114172][T14243] vlan2: entered allmulticast mode [ 234.169154][T14243] vlan2: entered allmulticast mode [ 234.317170][T14256] netlink: 'syz.3.3850': attribute type 6 has an invalid length. [ 234.325970][T14257] batman_adv: batadv0: Adding interface: dummy0 [ 234.332424][T14257] batman_adv: batadv0: The MTU of interface dummy0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 234.365861][T14257] batman_adv: batadv0: Interface activated: dummy0 [ 234.367971][T14260] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3853'. [ 234.384841][T14255] vlan2: entered allmulticast mode [ 234.396095][T14257] batadv0: mtu less than device minimum [ 234.402706][T14257] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 234.413395][T14257] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 234.424060][T14257] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 234.435222][T14257] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 234.446033][T14257] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 234.456855][T14257] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 234.467734][T14257] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 234.478588][T14257] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 234.489322][T14257] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 234.521274][T14255] vlan2: entered allmulticast mode [ 234.559421][T14263] macvtap0: entered promiscuous mode [ 234.576362][T14263] macvtap0: left promiscuous mode [ 234.595954][T14265] siw: device registration error -23 [ 234.734764][T14277] netlink: 'syz.3.3859': attribute type 4 has an invalid length. [ 234.854948][T14291] batman_adv: batadv0: Adding interface: dummy0 [ 234.861272][T14291] batman_adv: batadv0: The MTU of interface dummy0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 234.886757][T14291] batman_adv: batadv0: Interface activated: dummy0 [ 235.072920][T14300] netlink: 'syz.2.3865': attribute type 6 has an invalid length. [ 235.114040][T14302] vlan2: entered allmulticast mode [ 235.196481][T14302] vlan2: entered allmulticast mode [ 235.379686][T14315] siw: device registration error -23 [ 236.063637][T14336] binfmt_misc: register: failed to install interpreter file ./file0 [ 236.138211][T14355] netlink: 12 bytes leftover after parsing attributes in process `syz.1.3882'. [ 236.236386][T14362] vlan2: entered allmulticast mode [ 236.301683][T14368] netlink: 'syz.2.3881': attribute type 6 has an invalid length. [ 236.312542][T14362] vlan2: entered allmulticast mode [ 236.360142][T14367] vlan2: entered allmulticast mode [ 236.372991][T14367] dummy0: entered allmulticast mode [ 236.437712][T14367] vlan2: entered allmulticast mode [ 236.460952][T14372] siw: device registration error -23 [ 236.994107][T14394] binfmt_misc: register: failed to install interpreter file ./file0 [ 237.086677][T14414] netlink: 'syz.5.3898': attribute type 4 has an invalid length. [ 237.112959][T14411] macvtap0: entered promiscuous mode [ 237.148307][T14411] macvtap0: left promiscuous mode [ 237.182221][T14418] siw: device registration error -23 [ 237.260552][T14429] vlan2: entered allmulticast mode [ 237.321155][T14429] vlan2: entered allmulticast mode [ 237.593627][ T29] kauditd_printk_skb: 1231 callbacks suppressed [ 237.593643][ T29] audit: type=1326 audit(247.834:19397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14449 comm="syz.1.3906" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 237.680776][ T29] audit: type=1326 audit(247.887:19398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14449 comm="syz.1.3906" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 237.704315][ T29] audit: type=1326 audit(247.887:19399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14449 comm="syz.1.3906" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 237.727523][ T29] audit: type=1326 audit(247.887:19400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14449 comm="syz.1.3906" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 237.750601][ T29] audit: type=1326 audit(247.887:19401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14449 comm="syz.1.3906" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 237.773933][ T29] audit: type=1326 audit(247.887:19402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14449 comm="syz.1.3906" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 237.797067][ T29] audit: type=1326 audit(247.887:19403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14449 comm="syz.1.3906" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 237.820021][ T29] audit: type=1326 audit(247.887:19404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14449 comm="syz.1.3906" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 237.843040][ T29] audit: type=1326 audit(247.887:19405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14449 comm="syz.1.3906" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 237.866115][ T29] audit: type=1326 audit(247.887:19406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14449 comm="syz.1.3906" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff21600efc9 code=0x7ffc0000 [ 237.894360][T14464] binfmt_misc: register: failed to install interpreter file ./file0 [ 237.920967][T14466] netlink: 'syz.1.3909': attribute type 4 has an invalid length. [ 237.955099][T14475] macvtap0: entered promiscuous mode [ 237.961640][T14475] macvtap0: left promiscuous mode [ 238.987794][T14531] netlink: 'syz.1.3921': attribute type 4 has an invalid length. [ 239.132912][T14529] binfmt_misc: register: failed to install interpreter file ./file0 [ 239.254057][T14550] macvtap0: entered promiscuous mode [ 239.270627][T14550] macvtap0: left promiscuous mode [ 239.554694][T14559] veth6: entered promiscuous mode [ 239.559836][T14559] veth6: entered allmulticast mode [ 240.234297][T14580] netlink: 'syz.2.3930': attribute type 4 has an invalid length. [ 240.377167][T14588] siw: device registration error -23 [ 240.574273][T14608] macvtap0: entered promiscuous mode [ 240.580520][T14608] macvtap0: left promiscuous mode [ 240.614848][T14599] netlink: 'syz.3.3933': attribute type 6 has an invalid length. [ 241.094860][T14647] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 241.138046][T14648] siw: device registration error -23 [ 241.146855][T14651] netlink: 16 bytes leftover after parsing attributes in process `syz.3.3943'. [ 241.199690][T14651] macvtap0: entered promiscuous mode [ 241.233376][T14651] macvtap0: left promiscuous mode [ 241.244952][T14661] netlink: 12 bytes leftover after parsing attributes in process `syz.3.3943'. [ 241.354225][T14664] binfmt_misc: register: failed to install interpreter file ./file0 [ 241.691002][T14693] siw: device registration error -23 [ 241.950777][T14701] macvtap0: entered promiscuous mode [ 241.956834][T14701] macvtap0: left promiscuous mode [ 242.481725][T14728] netlink: 'syz.3.3951': attribute type 6 has an invalid length. [ 242.595833][ T29] kauditd_printk_skb: 560 callbacks suppressed [ 242.595848][ T29] audit: type=1326 audit(253.073:19967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14738 comm="syz.5.3954" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 242.625137][ T29] audit: type=1326 audit(253.073:19968): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14738 comm="syz.5.3954" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 242.648300][ T29] audit: type=1326 audit(253.073:19969): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14738 comm="syz.5.3954" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 242.671321][ T29] audit: type=1326 audit(253.073:19970): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14738 comm="syz.5.3954" exe="/root/syz-executor" sig=0 arch=c000003e syscall=49 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 242.694349][ T29] audit: type=1326 audit(253.073:19971): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14738 comm="syz.5.3954" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 242.717513][ T29] audit: type=1326 audit(253.073:19972): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14738 comm="syz.5.3954" exe="/root/syz-executor" sig=0 arch=c000003e syscall=42 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 242.740580][ T29] audit: type=1326 audit(253.073:19973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14738 comm="syz.5.3954" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 242.763728][ T29] audit: type=1326 audit(253.073:19974): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14738 comm="syz.5.3954" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 242.787087][ T29] audit: type=1326 audit(253.073:19975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14738 comm="syz.5.3954" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 242.810502][ T29] audit: type=1326 audit(253.073:19976): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14738 comm="syz.5.3954" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 242.915535][T14748] binfmt_misc: register: failed to install interpreter file ./file0 [ 242.990640][T14762] netlink: 16 bytes leftover after parsing attributes in process `syz.5.3960'. [ 243.003922][T14762] netlink: 12 bytes leftover after parsing attributes in process `syz.5.3960'. [ 243.032875][T14764] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3961'. [ 243.082912][T14764] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 243.120821][T14775] macvtap0: entered promiscuous mode [ 243.122835][T14764] netlink: 12 bytes leftover after parsing attributes in process `syz.3.3961'. [ 243.146877][T14775] macvtap0: left promiscuous mode [ 243.297791][T14790] net_ratelimit: 30 callbacks suppressed [ 243.297807][T14790] batman_adv: batadv0: Local translation table size (96) exceeds maximum packet size (-320); Ignoring new local tt entry: 80:00:00:1f:00:85 [ 243.348150][T14795] macvtap0: entered promiscuous mode [ 243.356724][T14795] macvtap0: left promiscuous mode [ 243.516603][T14813] siw: device registration error -23 [ 243.758269][T14825] binfmt_misc: register: failed to install interpreter file ./file0 [ 244.174688][T14866] macvtap0: entered promiscuous mode [ 244.187435][T14866] macvtap0: left promiscuous mode [ 244.278814][T14873] vlan2: entered allmulticast mode [ 244.301152][T14872] siw: device registration error -23 [ 244.333192][T14873] vlan2: entered allmulticast mode [ 244.458385][T14883] netlink: 'syz.2.3985': attribute type 4 has an invalid length. [ 244.467676][T14879] binfmt_misc: register: failed to install interpreter file ./file0 [ 244.559826][T14890] siw: device registration error -23 [ 244.568072][T14895] netlink: 'syz.2.3997': attribute type 4 has an invalid length. [ 244.673556][T14899] macvtap0: entered promiscuous mode [ 244.679658][T14899] macvtap0: left promiscuous mode [ 244.710753][T14902] netlink: 'syz.1.3989': attribute type 6 has an invalid length. [ 244.928626][T14912] siw: device registration error -23 [ 245.056848][T14921] vlan2: entered allmulticast mode [ 245.073221][T14920] binfmt_misc: register: failed to install interpreter file ./file0 [ 245.161710][T14921] vlan2: entered allmulticast mode [ 245.272307][T14932] netlink: 'syz.5.4002': attribute type 4 has an invalid length. [ 245.372130][T14934] macvtap0: entered promiscuous mode [ 245.423261][T14934] macvtap0: left promiscuous mode [ 245.816973][T14948] binfmt_misc: register: failed to install interpreter file ./file0 [ 245.850361][T14953] netlink: 'syz.3.4009': attribute type 6 has an invalid length. [ 246.038206][T14955] siw: device registration error -23 [ 246.179741][T14957] netlink: 'syz.1.4012': attribute type 6 has an invalid length. [ 246.303386][T14965] netlink: 'syz.3.4016': attribute type 4 has an invalid length. [ 246.365487][T14969] netlink: 'syz.3.4028': attribute type 4 has an invalid length. [ 246.469937][T14975] syzkaller0: entered allmulticast mode [ 246.492294][T14975] syzkaller0: entered promiscuous mode [ 246.591975][T14982] syzkaller0 (unregistering): left allmulticast mode [ 246.598938][T14982] syzkaller0 (unregistering): left promiscuous mode [ 247.513326][T15003] netlink: 'syz.2.4031': attribute type 4 has an invalid length. [ 247.568237][T15007] netlink: 'syz.3.4030': attribute type 6 has an invalid length. [ 247.801645][T15013] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4035'. [ 247.860506][T15012] vlan2: entered allmulticast mode [ 247.907013][T15014] netlink: 12 bytes leftover after parsing attributes in process `syz.5.4035'. [ 247.946806][ T29] kauditd_printk_skb: 571 callbacks suppressed [ 247.946821][ T29] audit: type=1400 audit(258.700:20548): avc: denied { mounton } for pid=15015 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 248.095750][T15012] vlan2: entered allmulticast mode [ 248.127478][T15029] siw: device registration error -23 [ 248.163635][T15015] lo speed is unknown, defaulting to 1000 [ 248.274303][T15034] macvtap0: entered promiscuous mode [ 248.281310][T15034] macvtap0: left promiscuous mode [ 248.325528][T15015] chnl_net:caif_netlink_parms(): no params data found [ 248.419952][T15015] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.427153][T15015] bridge0: port 1(bridge_slave_0) entered disabled state [ 248.436275][T15015] bridge_slave_0: entered allmulticast mode [ 248.436363][ T29] audit: type=1326 audit(259.225:20549): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15025 comm="syz.5.4037" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 248.442810][T15015] bridge_slave_0: entered promiscuous mode [ 248.472814][T15049] netlink: 'syz.1.4043': attribute type 4 has an invalid length. [ 248.472859][T15015] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.487694][T15015] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.495048][ T29] audit: type=1326 audit(259.256:20550): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15025 comm="syz.5.4037" exe="/root/syz-executor" sig=0 arch=c000003e syscall=152 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 248.495075][T15015] bridge_slave_1: entered allmulticast mode [ 248.518387][ T29] audit: type=1326 audit(259.256:20551): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15025 comm="syz.5.4037" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 248.525833][T15015] bridge_slave_1: entered promiscuous mode [ 248.547594][ T29] audit: type=1326 audit(259.256:20552): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15025 comm="syz.5.4037" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 248.577489][ T29] audit: type=1326 audit(259.256:20553): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15025 comm="syz.5.4037" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 248.601146][ T29] audit: type=1326 audit(259.256:20554): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15025 comm="syz.5.4037" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 248.624724][ T29] audit: type=1326 audit(259.256:20555): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15025 comm="syz.5.4037" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 248.648106][ T29] audit: type=1326 audit(259.256:20556): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15025 comm="syz.5.4037" exe="/root/syz-executor" sig=0 arch=c000003e syscall=25 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 248.671367][ T29] audit: type=1326 audit(259.256:20557): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15025 comm="syz.5.4037" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f166a21efc9 code=0x7ffc0000 [ 248.714969][T15015] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 248.728250][T15015] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 248.760773][T15015] team0: Port device team_slave_0 added [ 248.768436][T15015] team0: Port device team_slave_1 added [ 248.792566][T15015] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 248.799811][T15015] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 248.825820][T15015] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 248.838495][T15015] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 248.845512][T15015] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 248.871563][T15015] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 248.901648][T15015] hsr_slave_0: entered promiscuous mode [ 248.908000][T15015] hsr_slave_1: entered promiscuous mode [ 248.921235][T15015] debugfs: 'hsr0' already exists in 'hsr' [ 248.926999][T15015] Cannot create hsr debugfs directory [ 249.011403][T15065] netlink: 'syz.5.4046': attribute type 6 has an invalid length. [ 249.037721][T15015] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 249.048536][T15015] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 249.113223][T15015] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 249.123490][T15015] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 249.224333][T15079] netlink: 16 bytes leftover after parsing attributes in process `syz.3.4050'. [ 249.237139][T15071] netlink: 'syz.1.4047': attribute type 6 has an invalid length. [ 249.247617][T15079] netlink: 12 bytes leftover after parsing attributes in process `syz.3.4050'. [ 249.283656][T15081] macvtap0: entered promiscuous mode [ 249.290031][T15081] macvtap0: left promiscuous mode [ 249.300125][T15015] 8021q: adding VLAN 0 to HW filter on device bond0 [ 249.313247][T15015] 8021q: adding VLAN 0 to HW filter on device team0 [ 249.331625][ T7898] bridge0: port 1(bridge_slave_0) entered blocking state [ 249.339163][ T7898] bridge0: port 1(bridge_slave_0) entered forwarding state [ 249.355771][ T7898] bridge0: port 2(bridge_slave_1) entered blocking state [ 249.363359][ T7898] bridge0: port 2(bridge_slave_1) entered forwarding state [ 249.413667][T15089] netlink: 'syz.5.4054': attribute type 4 has an invalid length. [ 249.499080][T15092] binfmt_misc: register: failed to install interpreter file ./file0 [ 249.529934][T15015] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 249.548112][T15098] siw: device registration error -23 [ 249.704050][T15015] veth0_vlan: entered promiscuous mode [ 249.713387][T15015] veth1_vlan: entered promiscuous mode [ 249.734650][T15015] veth0_macvtap: entered promiscuous mode [ 249.743226][T15015] veth1_macvtap: entered promiscuous mode [ 249.751643][T15116] netlink: 'syz.1.4057': attribute type 6 has an invalid length. [ 249.756835][T15015] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 249.773294][T15015] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 249.785725][ T7898] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 249.794912][ T7898] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 249.808143][ T7898] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 249.818301][ T7898] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 249.915150][T15119] netlink: 16 bytes leftover after parsing attributes in process `syz.5.4061'. [ 249.981720][T15126] syzkaller0: entered allmulticast mode [ 249.990535][T15126] syzkaller0: entered promiscuous mode [ 249.997312][T15119] netlink: 12 bytes leftover after parsing attributes in process `syz.5.4061'. [ 250.020438][T15126] syzkaller0 (unregistering): left allmulticast mode [ 250.027386][T15126] syzkaller0 (unregistering): left promiscuous mode [ 250.096549][T15132] macvtap0: entered promiscuous mode [ 250.103281][T15132] macvtap0: left promiscuous mode [ 250.114220][T15134] vlan2: entered allmulticast mode [ 250.163110][T15134] vlan2: entered allmulticast mode [ 250.407327][T15159] netlink: 'syz.6.4071': attribute type 6 has an invalid length. [ 250.417845][T15160] netlink: 16 bytes leftover after parsing attributes in process `syz.5.4075'. [ 250.460897][T15160] netlink: 12 bytes leftover after parsing attributes in process `syz.5.4075'. [ 250.728686][T15184] macvtap0: entered promiscuous mode [ 250.774401][T15184] macvtap0: left promiscuous mode [ 250.937811][T15213] vlan2: entered allmulticast mode [ 251.019957][T15213] vlan2: entered allmulticast mode [ 251.160339][T15225] netlink: 'syz.5.4087': attribute type 6 has an invalid length. [ 251.179218][T15228] netlink: 16 bytes leftover after parsing attributes in process `syz.2.4090'. [ 251.198625][T15228] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4090'. [ 251.429365][T15253] macvtap0: entered promiscuous mode [ 251.456886][T15253] macvtap0: left promiscuous mode [ 251.476062][T15258] macvtap0: entered promiscuous mode [ 251.482289][T15258] macvtap0: left promiscuous mode [ 251.494926][T15257] macvtap0: entered promiscuous mode [ 251.503801][T15257] macvtap0: left promiscuous mode [ 251.603877][T15281] netlink: 'syz.5.4101': attribute type 4 has an invalid length. [ 251.725823][T15289] vlan2: entered allmulticast mode [ 251.764028][T15289] vlan2: entered allmulticast mode [ 252.033406][T15309] macvtap0: entered promiscuous mode [ 252.053112][T15309] macvtap0: left promiscuous mode [ 252.375091][T15336] binfmt_misc: register: failed to install interpreter file ./file0 [ 252.385581][T15341] validate_nla: 1 callbacks suppressed [ 252.385598][T15341] netlink: 'syz.2.4113': attribute type 4 has an invalid length. [ 252.427200][T15344] macvtap0: entered promiscuous mode [ 252.434028][T15344] macvtap0: left promiscuous mode [ 252.543899][T15359] vlan2: entered allmulticast mode [ 252.549122][T15359] dummy0: entered allmulticast mode [ 252.638504][T15359] vlan2: entered allmulticast mode [ 252.843180][ T29] kauditd_printk_skb: 1184 callbacks suppressed [ 252.843195][ T29] audit: type=1326 audit(263.844:21742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15389 comm="syz.6.4125" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f630f89efc9 code=0x7ffc0000 [ 252.911676][ T29] audit: type=1326 audit(263.854:21743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15389 comm="syz.6.4125" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f630f89efc9 code=0x7ffc0000 [ 252.913427][T15398] netlink: 'syz.6.4126': attribute type 4 has an invalid length. [ 252.935707][ T29] audit: type=1326 audit(263.854:21744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15389 comm="syz.6.4125" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f630f89efc9 code=0x7ffc0000 [ 252.966652][ T29] audit: type=1326 audit(263.854:21745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15389 comm="syz.6.4125" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f630f89efc9 code=0x7ffc0000 [ 252.989963][ T29] audit: type=1326 audit(263.854:21746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15389 comm="syz.6.4125" exe="/root/syz-executor" sig=0 arch=c000003e syscall=49 compat=0 ip=0x7f630f89efc9 code=0x7ffc0000 [ 253.013412][ T29] audit: type=1326 audit(263.854:21747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15389 comm="syz.6.4125" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f630f89efc9 code=0x7ffc0000 [ 253.036613][ T29] audit: type=1326 audit(263.854:21748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15389 comm="syz.6.4125" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f630f89efc9 code=0x7ffc0000 [ 253.059663][ T29] audit: type=1326 audit(263.854:21749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15389 comm="syz.6.4125" exe="/root/syz-executor" sig=0 arch=c000003e syscall=42 compat=0 ip=0x7f630f89efc9 code=0x7ffc0000 [ 253.082580][ T29] audit: type=1326 audit(263.854:21750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15389 comm="syz.6.4125" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f630f89efc9 code=0x7ffc0000 [ 253.105765][ T29] audit: type=1326 audit(263.854:21751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15389 comm="syz.6.4125" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f630f89efc9 code=0x7ffc0000 [ 253.155829][T15406] __nla_validate_parse: 4 callbacks suppressed [ 253.155847][T15406] netlink: 16 bytes leftover after parsing attributes in process `syz.5.4128'. [ 253.182635][T15406] netlink: 12 bytes leftover after parsing attributes in process `syz.5.4128'. [ 253.287736][T15423] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4130'. [ 253.298584][T15423] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 253.341727][T15428] vlan2: entered allmulticast mode [ 253.438310][T15428] vlan2: entered allmulticast mode [ 253.460185][T15439] netlink: 'syz.6.4138': attribute type 4 has an invalid length. [ 253.507951][T15445] netlink: 16 bytes leftover after parsing attributes in process `syz.6.4141'. [ 253.520052][T15445] netlink: 12 bytes leftover after parsing attributes in process `syz.6.4141'. [ 253.588854][T15452] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4144'. [ 253.604372][T15452] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 253.702684][T15464] netlink: 12 bytes leftover after parsing attributes in process `syz.1.4146'. [ 254.066408][T15478] netlink: 'syz.6.4152': attribute type 6 has an invalid length. [ 254.076599][T15480] netlink: 'syz.2.4153': attribute type 4 has an invalid length. [ 254.591494][T15535] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4159'. [ 254.682203][T15547] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 254.725209][T15552] netlink: 'syz.6.4164': attribute type 4 has an invalid length. [ 254.809185][T15547] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 254.875951][T15547] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 255.020031][T15547] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 255.120509][ T7912] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 255.176778][ T7912] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 255.265798][T15572] netlink: 'syz.6.4165': attribute type 6 has an invalid length. [ 255.309763][ T7912] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 255.333342][ T7912] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 255.613184][T15598] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 255.661082][T15602] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4171'. [ 255.687413][T15598] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 255.772948][T15598] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 255.940147][T15598] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 256.037521][ T7901] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 256.085680][ T7901] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 256.199384][ T7901] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 256.253884][ T7901] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 256.535836][T15647] siw: device registration error -23 [ 256.567545][T15650] netlink: 16 bytes leftover after parsing attributes in process `syz.1.4181'. [ 256.667505][T15652] siw: device registration error -23 [ 256.686154][T15654] binfmt_misc: register: failed to install interpreter file ./file0 [ 256.762450][T15663] netlink: 'syz.2.4187': attribute type 4 has an invalid length. [ 256.774317][T15663] netlink: 'syz.2.4187': attribute type 4 has an invalid length. [ 256.910509][T15671] macvtap0: entered promiscuous mode [ 256.924696][T15671] macvtap0: left promiscuous mode [ 257.130175][T15699] binfmt_misc: register: failed to install interpreter file ./file0 [ 257.195163][T15719] netlink: 'syz.3.4200': attribute type 4 has an invalid length. [ 257.234142][T15722] macvtap0: entered promiscuous mode [ 257.245585][T15722] macvtap0: left promiscuous mode [ 257.569128][T15740] netlink: 'syz.3.4205': attribute type 6 has an invalid length. [ 257.680446][ T29] kauditd_printk_skb: 790 callbacks suppressed [ 257.680462][ T29] audit: type=1326 audit(268.925:22542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15727 comm="syz.2.4204" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdc8072efc9 code=0x7ffc0000 [ 257.737420][ T29] audit: type=1326 audit(268.925:22543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15727 comm="syz.2.4204" exe="/root/syz-executor" sig=0 arch=c000003e syscall=152 compat=0 ip=0x7fdc8072efc9 code=0x7ffc0000 [ 257.760943][ T29] audit: type=1326 audit(268.925:22544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15727 comm="syz.2.4204" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdc8072efc9 code=0x7ffc0000 [ 257.787149][ T29] audit: type=1326 audit(268.925:22545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15727 comm="syz.2.4204" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fdc8072efc9 code=0x7ffc0000 [ 257.811683][ T29] audit: type=1326 audit(268.925:22546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15727 comm="syz.2.4204" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdc8072efc9 code=0x7ffc0000 [ 257.835884][ T29] audit: type=1326 audit(268.925:22547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15727 comm="syz.2.4204" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fdc8072efc9 code=0x7ffc0000 [ 257.860239][ T29] audit: type=1326 audit(268.925:22548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15727 comm="syz.2.4204" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdc8072efc9 code=0x7ffc0000 [ 257.884667][ T29] audit: type=1326 audit(268.925:22549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15727 comm="syz.2.4204" exe="/root/syz-executor" sig=0 arch=c000003e syscall=25 compat=0 ip=0x7fdc8072efc9 code=0x7ffc0000 [ 257.910330][ T29] audit: type=1326 audit(268.925:22550): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15727 comm="syz.2.4204" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdc8072efc9 code=0x7ffc0000 [ 257.934632][ T29] audit: type=1326 audit(268.925:22551): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15727 comm="syz.2.4204" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fdc8072efc9 code=0x7ffc0000 [ 257.964526][T15761] __nla_validate_parse: 4 callbacks suppressed [ 257.964542][T15761] netlink: 16 bytes leftover after parsing attributes in process `syz.6.4207'. [ 258.010158][T15761] netlink: 12 bytes leftover after parsing attributes in process `syz.6.4207'. [ 258.086037][T15775] macvtap0: entered promiscuous mode [ 258.092352][T15775] macvtap0: left promiscuous mode [ 258.111575][T15777] binfmt_misc: register: failed to install interpreter file ./file0 [ 258.233741][T15791] macvtap0: entered promiscuous mode [ 258.248771][T15791] macvtap0: left promiscuous mode [ 258.280690][T15796] netlink: 'syz.3.4212': attribute type 4 has an invalid length. [ 258.410977][T15815] netlink: 16 bytes leftover after parsing attributes in process `syz.2.4221'. [ 258.437663][T15815] netlink: 12 bytes leftover after parsing attributes in process `syz.2.4221'. [ 258.639736][T15827] binfmt_misc: register: failed to install interpreter file ./file0 [ 258.709218][T15840] binfmt_misc: register: failed to install interpreter file ./file0 [ 258.747179][T15850] netlink: 'syz.2.4228': attribute type 4 has an invalid length. [ 258.764383][T15855] netlink: 'syz.1.4223': attribute type 6 has an invalid length. [ 258.844126][T15857] macvtap0: entered promiscuous mode [ 258.844662][T15857] macvtap0: left promiscuous mode [ 259.002245][T15877] 9pnet_fd: Insufficient options for proto=fd [ 259.010058][T15880] 9pnet: Unknown protocol version 9p20 [ 259.148393][T15889] binfmt_misc: register: failed to install interpreter file ./file0 [ 259.303702][T15912] netlink: 'syz.5.4250': attribute type 4 has an invalid length. [ 259.350549][T15914] macvtap0: entered promiscuous mode [ 259.370528][T15914] macvtap0: left promiscuous mode [ 259.410552][T15917] 9pnet_fd: Insufficient options for proto=fd [ 259.479675][T15921] 9pnet: Unknown protocol version 9p20 [ 259.884760][T15935] binfmt_misc: register: failed to install interpreter file ./file0 [ 259.926719][T15868] ================================================================== [ 259.934926][T15868] BUG: KCSAN: data-race in set_nlink / set_nlink [ 259.941267][T15868] [ 259.943608][T15868] read to 0xffff88811a8482b0 of 4 bytes by task 3004 on cpu 1: [ 259.951149][T15868] set_nlink+0x29/0xb0 [ 259.955332][T15868] kernfs_iop_permission+0x1e2/0x220 [ 259.960800][T15868] inode_permission+0x1ca/0x310 [ 259.965734][T15868] link_path_walk+0x162/0x900 [ 259.970591][T15868] path_openat+0x1de/0x2170 [ 259.975099][T15868] do_filp_open+0x109/0x230 [ 259.979878][T15868] do_sys_openat2+0xa6/0x110 [ 259.985350][T15868] __x64_sys_openat+0xf2/0x120 [ 259.990236][T15868] x64_sys_call+0x2eab/0x3000 [ 259.994936][T15868] do_syscall_64+0xd2/0x200 [ 259.999542][T15868] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 260.005439][T15868] [ 260.007782][T15868] write to 0xffff88811a8482b0 of 4 bytes by task 15868 on cpu 0: [ 260.015598][T15868] set_nlink+0x99/0xb0 [ 260.019895][T15868] kernfs_iop_permission+0x1e2/0x220 [ 260.025194][T15868] inode_permission+0x1ca/0x310 [ 260.030414][T15868] link_path_walk+0x162/0x900 [ 260.035460][T15868] path_openat+0x1de/0x2170 [ 260.040064][T15868] do_filp_open+0x109/0x230 [ 260.044756][T15868] do_sys_openat2+0xa6/0x110 [ 260.049345][T15868] __x64_sys_openat+0xf2/0x120 [ 260.054107][T15868] x64_sys_call+0x2eab/0x3000 [ 260.058776][T15868] do_syscall_64+0xd2/0x200 [ 260.063263][T15868] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 260.069143][T15868] [ 260.071451][T15868] value changed: 0x00000004 -> 0x00000003 [ 260.077192][T15868] [ 260.079504][T15868] Reported by Kernel Concurrency Sanitizer on: [ 260.085711][T15868] CPU: 0 UID: 0 PID: 15868 Comm: udevd Not tainted syzkaller #0 PREEMPT(voluntary) [ 260.095165][T15868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 260.105217][T15868] ==================================================================