last executing test programs: 6m51.501155768s ago: executing program 32 (id=304): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000080000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000040008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300000004000000040000000100000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="18"], 0x50) openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x5400, 0x0) 6m24.534906848s ago: executing program 33 (id=703): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000280), 0x7, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) 6m21.680046841s ago: executing program 34 (id=718): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r0, 0x7, &(0x7f00000006c0)={0x0, 0x0, 0xac1d}) fcntl$lock(r0, 0x25, &(0x7f00000000c0)) 6m13.714602861s ago: executing program 35 (id=798): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0xc2) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000140)=0x1, 0x4) connect$inet6(r0, 0x0, 0x0) io_setup(0x6, &(0x7f0000000680)=0x0) setsockopt$SO_BINDTODEVICE_wg(r0, 0x1, 0x19, &(0x7f0000000080)='wg0\x00', 0x4) io_submit(r1, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x180a, 0x0, 0x3, 0x1, 0x0, r0, 0x0}]) 5m52.026812755s ago: executing program 36 (id=1047): bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="640000000001010400000000141a000002000000240001801400018008000100e000000108000200e00000010c00028005000100000000002400028014000180080001000000000008000200ac1e00010c0002800500010000000000080007"], 0x64}}, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x6c, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x2c, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2=0xe0000001}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}]}, 0x6c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)={0x44, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_NAT_SRC={0x4}]}, 0x44}}, 0x0) 5m36.920280326s ago: executing program 9 (id=1237): open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x130) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065fffff530000008003950323030302e75"], 0x15) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000300)=ANY=[], 0x15) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000400)='kfree\x00', r2, 0x0, 0x4}, 0x18) r3 = dup(r1) write$P9_RLERRORu(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) open$dir(&(0x7f0000000080)='./file0\x00', 0x1, 0x4c) 5m36.879268016s ago: executing program 9 (id=1238): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000180), r0) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000002c0)=ANY=[@ANYBLOB="fc0000", @ANYRES16=r1, @ANYBLOB="cd3e00000000fbdbdf25010000000800020005000000ce00010043ecf8a077157cd8bc73e1b93314cdcbb6b9bb84e5bcdb7f9af2eacc913a7640e8332d1daa67516c7f094b740c631f175dd5d0f0a8ebd2679204"], 0xfc}, 0x1, 0x0, 0x0, 0x4004041}, 0x4) 5m36.831435606s ago: executing program 9 (id=1239): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f0850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xd, 0x4, 0x4, 0x40000009, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2000000, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 5m36.789957256s ago: executing program 9 (id=1240): bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0x20, &(0x7f00000002c0)={&(0x7f0000000200)=""/11, 0xb, 0x0, &(0x7f00000005c0)=""/208, 0xd0}}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000031c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = timerfd_create(0x7, 0x0) timerfd_settime(r2, 0x3, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(r2, 0x0, &(0x7f0000000100)={{0x0, 0x3938700}, {0x77359400}}, 0x0) r3 = gettid() syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f0000000240)={[{@grpquota}, {@auto_da_alloc}, {@minixdf}]}, 0x1, 0x50c, &(0x7f0000000ac0)="$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") capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x81, 0xffffffff}) r4 = socket$unix(0x1, 0x5, 0x0) bind$unix(r4, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) creat(&(0x7f0000000040)='./bus\x00', 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) r5 = mq_open(&(0x7f0000000380)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\x01\x00\x00\x00a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|\x00\x17\xc0\xa3\xd5\xf9\xaa\x98/\xa4v\xe4)I\xf3+[e\x95\x89\x99\xca\x8e\xc5\xd3\\T\xf0\x1a|5\xfff\xff\x99\xa4\xbb\x9e#oR\xa4\xf1\xba\x04c\xb3-\xf7R\xb85\xb5\xdb\xe9?\xfa/\xdf\xb4R\xbfx=\v_j\x8e\xb0\'\xf4\xe5\xff!\xe1\xbf\x82e\xb1\x9b\x8d\xf3L\t\xd21\x9cbwV\xc8\xcc\xe4\x96M_w\xbc\xdf9\b\r\xf6\x95\xae\xb5,\x92\x8c\xc0DQm\x80\xd1w\xa2\x1a\x12Z\xe5\xf4H\xf7D\n\x96J\x93\xfb\xf0$\x9f\xf7\xa2\xae$O\xa3\xb6\xf5\x98\xd3\v\x00\x86\xa5\x8b\x81\x04\xaf\x03s\xe5\x86>\x0e\xa6\xe6\x1aV\x17\x8b\xed\xa7\'\xd0\r_\xe8,XVR\x13\xe5%\xb9\x88\xb8W@D\'\x17A\xc8\x80\x02J\xd4V\x00wH(\xc5v\f\xc9\xb6\xdf..$\xe6P(_\xf1\'\xc1:\xa3\xcb\xd9\xd1\xc7\x13\x99Md\x1dc\xf1\'j\x03!\x13\xd1\xb8\xbf\xe6\xb2M\b/\rp\xa5\x00\x00\x00\x00', 0x40, 0x9, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000440)='./file2\x00', 0x10404, &(0x7f0000000380)={[{@errors_remount}, {@i_version}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@nobarrier}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}, {@quota}]}, 0x3, 0x42f, &(0x7f0000000940)="$eJzs289rHFUcAPDvzCat/WViqT+aVo1WMfgjadJae/CiKHhQEPRQjzFJS+y2kSaCLUGjSD1Kwbt4FPwLPOlF1JPgVe9SKJJLq6eV2Z1Jdje7aZJustX9fGCS92be8t53Z97ue/N2AuhZw9mfJGJ/RPweEQO1bGOB4dq/W8uLU38vL04lUam89VdSLXdzeXGqKFq8bl+R6YtIP0viSIt65y9fOT9ZLs9cyvNjCxfeH5u/fOW52QuT52bOzVycOH365InxF05NPN+ROLO4bg59NHf08GvvXHtj6sy1d3/+Ninib4qjQ4bXO/hkpdLh6rrrQF066etiQ9iUUq2bRn+1/w9EKVZP3kC8+mlXGwdsq0qlUnmg/eGlCvA/lkS3WwB0R/FFn81/i22Hhh53hRsv1SZAWdy38q12pC/SvEx/0/y2k4Yj4szSP19lW2zPfQgAgAbfZ+OfZ1uN/9Kovy90b76GMhgR90XEwYg4FRGHIuL+iGrZByPioU3W37xIsnb8k17fUmAblI3/XszXthrHf8XoLwZLee5ANf7+5OxseeZ4/p6MRP/uLD++Th0/vPLbF+2O1Y//si2rvxgL5u243re78TXTkwuTdxJzvRufRAz1tYo/WVkJSCLicEQMbbGO2ae/Odru2O3jX0cH1pkqX0c8VTv/S9EUfyFZf31y7J4ozxwfK66KtX759eqb7eq/o/g7IDv/e1te/yvxDyb167Xzm6/j6h+ft53TbPX635W83bDvw8mFhUvjEbuS12uNrt8/0VRuYrV8Fv/Isdb9/2CsvhNHIiK7iB+OiEci4tG87Y9FxOMRcWyd+H96+Yn3th7/9srin97U+V9N7IrmPa0TpfM/ftdQ6eBm4s/O/8lqaiTfs5HPv420a2tXMwAAAPz3pBGxP5J0dCWdpqOjtd/wH4q9aXlufuGZs3MfXJyuPSMwGP1pcadroO5+6Hg+rS/yE035E/l94y9Le6r50am58nS3g4cet69N/8/8Wep264Bt53kt6F36P/Qu/R96l/4PvatF/9/TjXYAO6/V9//HXWgHsPOa+r9lP+gh5v/Qu/R/6F36P/Sk+T1x+4fkJSTWJCK9K5ohsU2Jbn8yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdMa/AQAA//9QOObV") r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000fc850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) r7 = socket$unix(0x1, 0x1, 0x0) bind$unix(r7, &(0x7f0000000a00)=@file={0x1, './file0\x00'}, 0x6e) fcntl$setlease(r5, 0x400, 0x0) mq_open(&(0x7f0000000b40)='eth0\x00\xdd\xad4=2k\xf1\x05\x9b\x91y\xe1;F\xa2\x8df\xe9\x04\x00\x00\x00\x00\x0078z=\x8f\xd5F\xa4AR\xc7\x9f.\xdc\xdb\"A\x16\xd8\x19\xf1lZ\xc8\x93\xda\xf2\xc9\xe8h[u8\xc6\xfa\x9ep\xbe\a\xe2\xf5\xa3Y\x9f\xe1\x04gM\x99K$\r\xf1G\xee\xe1\xbd\x1e\xdf\xe1\x9c\x19\xda\xd3\x94EL\xca\x88\x85Q\x02\xd9L\x90\xeb%/\xb1\xeb\x11uP7\x1f\xd9b\xebF\xf8\x88\xf0\xac.\x94\xfc\v\xb1W\xef~+n\xb1\x9b\x02n]xr\xb3\x80\xbc>\xe8XX\xe6\x12\xf3\xc9\xd5\xf8\xd1\x8d\xcb9\xbf\xb0(<\xeb\x92\x8a\x16\xb7\x11^\xb6\xb7n\xd5\xb5\x00[\xdf\x94\x00\r\x95\x17\xa1h\xf8\x00\x00\x00\"\xa0\x05\xcc^\x90c\xc9}\xb8\ny\xf4\xe1\xb4.\xa4\a\x05\xbb}\x91\xf4C\xf5O\xf1a\x12\b\x86\xa16\xbb}C\xc9\x1d\\\xedD\x14\xb1w\x1e\xa0\xc1E\xb5\xf8\xab\xfb\xd9\x93\xb8vJ\x85p\xb5n\x1b\xe4\xd5g\xae\xe4\xeb\xca\xae\x1bs\xd4\xf0\xc0\xdag\x19R4\xd4\xd4\x04\xfc\x04Zb\xf6\xba\xf8B\xf6YU\xcd\xf2\xdb\xb5\xa2\xda\xdf\x8dD\xef`\x13\x15$\xceq\xd7j\xd7\xe3V\xf2\xa2\x95\xcf\x18T\xf1\xb0\xf3\xf8O', 0x1, 0x0, 0x0) syz_clone(0x1000, &(0x7f0000000000)="ed364133aabe240a716e527bd447e877e82c1f3cab174837005631a24ee5229c234a13f12123b618959cf81603cec02014614d8fe18a36faabeb031efbfe3b", 0x3f, &(0x7f0000000040), &(0x7f0000000180), &(0x7f0000000240)="bc6252f547adefc7825f24a8c7d37a8b9f09f92abe40d987fcf1cdeb3af81ea63b56ec550caeb560bf83f2f6e9b2402a2e839a7ddd447f6769179c0188f53cb45a2735e22146f5e2de45b78ccc4bf01db64518226022657f334adb27b075cc9381d6d9b60438a9000d7622") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1, 0x0, 0xe8c5}, 0x18) 5m36.563352345s ago: executing program 9 (id=1243): r0 = syz_open_dev$loop(&(0x7f0000001880), 0x22, 0x2801) r1 = getpid() socket$nl_netfilter(0x10, 0x3, 0xc) setreuid(0xee00, 0x0) r2 = syz_pidfd_open(r1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) r5 = socket$inet6(0xa, 0x2, 0x3a) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) socket$netlink(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x50) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1={0xff, 0x4}}, 0x1c) sendmsg$NL80211_CMD_TDLS_CHANNEL_SWITCH(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="a0"], 0xffd8}}, 0x4000000) sendmsg$IEEE802154_LIST_PHY(0xffffffffffffffff, 0x0, 0x4000040) setns(r2, 0x24020000) syz_clone3(&(0x7f00000008c0)={0x14860000, 0x0, 0x0, 0x0, {0x28}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r1], 0x1}, 0x58) socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "806dfcdd83f9a8c8", "25ad6dab0f05423ee0cfa217ce4cc86f", "5eaf5dea", "4f58f43648fab395"}, 0x28) ioctl$BLKDISCARD(r0, 0x1277, &(0x7f00000018c0)=0x6) 5m32.841727575s ago: executing program 2 (id=1284): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = memfd_secret(0x80000) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000380)={'syztnl1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000480)={'erspan0\x00', &(0x7f00000003c0)={'erspan0\x00', 0x0, 0x10, 0x700, 0xe, 0x0, {{0x19, 0x4, 0x1, 0xc, 0x64, 0x68, 0x0, 0xc, 0x29, 0x0, @multicast1, @dev={0xac, 0x14, 0x14, 0x23}, {[@lsrr={0x83, 0x7, 0xc, [@private=0xa010101]}, @timestamp_addr={0x44, 0x24, 0x4c, 0x1, 0x4, [{@remote, 0xfffffff8}, {@multicast1, 0x8}, {@multicast2, 0x9}, {@broadcast, 0x6f5b}]}, @ra={0x94, 0x4}, @ra={0x94, 0x4}, @generic={0x15, 0xb, "28318bc8de1a50421f"}, @rr={0x7, 0xf, 0x2f, [@empty, @empty, @empty]}]}}}}}) r3 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) bind$can_raw(r3, &(0x7f0000000040)={0x1d, r4}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r6, 0x8933, &(0x7f0000001880)={'wg1\x00', 0x0}) r8 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000fc0), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r5, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000280)={0x40, r8, 0xa29, 0x0, 0x0, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r7}, @WGDEVICE_A_PRIVATE_KEY={0x24}]}, 0x40}}, 0x0) sendmsg$WG_CMD_SET_DEVICE(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x40, r8, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r7}]}, 0x40}}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vxcan0\x00', 0x0}) r11 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r11, &(0x7f0000000280)={0x1d, r10}, 0x10) sendmsg$nl_route_sched(r9, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=@getchain={0x24, 0x11, 0x1, 0x0, 0x2000001, {0x0, 0x0, 0x0, r10, {0x7}, {0x9}, {0x1}}}, 0x24}}, 0x40044) socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f00000004c0)=@RTM_NEWMDB={0xb8, 0x54, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@MDBA_SET_ENTRY={0x20, 0x1, {r2, 0x0, 0x3, 0x3, {@ip4=@multicast2}}}, @MDBA_SET_ENTRY={0x20, 0x1, {r4, 0x1, 0x3, 0x1, {@in6_addr=@empty, 0x18b67}}}, @MDBA_SET_ENTRY={0x20, 0x1, {r7, 0x0, 0x3, 0x0, {@in6_addr=@private2, 0x86dd}}}, @MDBA_SET_ENTRY={0x20, 0x1, {r10, 0x0, 0x2, 0x0, {@in6_addr=@dev={0xfe, 0x80, '\x00', 0x3b}, 0xcdb3}}}, @MDBA_SET_ENTRY={0x20, 0x1, {r12, 0x0, 0x2, 0x3, {@in6_addr=@local, 0x8edd}}}]}, 0xb8}, 0x1, 0x0, 0x0, 0x20000000}, 0x24040001) socket$kcm(0x2, 0xa, 0x2) r13 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$TUNGETIFF(r13, 0x800454d2, &(0x7f00000002c0)={'veth0_virt_wifi\x00'}) write$tun(r0, &(0x7f0000000100)={@val={0x800e, 0xcfdc}, @void, @eth={@broadcast, @local, @void, {@generic={0x894f}}}}, 0x12) syz_emit_ethernet(0x86, &(0x7f0000000140)={@random, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x0, 0x64, 0x0, @wg=@response={0x10, 0x0, 0x0, "fdcdae25a7a296872a8a5290e48e30acf8afc7e67d70a62c979cefa10a0028bd", "ae0000000000000000e400", {"35f3c07eeca4a20a9858ac1500", "63081fe8fe001a08ed082ad7121d696f"}}}}}}}, 0x0) 5m32.816125745s ago: executing program 2 (id=1285): r0 = fsopen(&(0x7f0000000080)='sysfs\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x3, 0x0, 0x0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) r1 = getpid() get_mempolicy(0x0, 0x0, 0x2, &(0x7f0000016000/0x3000)=nil, 0x7) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)=0x0) unshare(0x6020400) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000200)=[{&(0x7f0000000080)="7cd1f233f595", 0x6}], 0x1, 0xc) setreuid(0xee00, 0x0) r5 = syz_pidfd_open(r1, 0x0) setns(r5, 0x24020000) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=r3, @ANYRES32=r6, @ANYRESDEC=r5], 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0xfffffffffffffdac, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mq_open(0x0, 0x42, 0x40, 0x0) fallocate(r6, 0x0, 0x100000000, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) syz_clone3(&(0x7f00000008c0)={0x15340180, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r1], 0x1}, 0x58) r8 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r8, &(0x7f0000005b40)=[{{&(0x7f0000000000)={0x2, 0x4e20, @multicast2}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000040)="f37481d90eeaead391345b4da9d27e24c9c670da3afc5c00"/50, 0x32}, {&(0x7f0000000140)="ead5e96719a44591801f33", 0xb}, {&(0x7f0000000180)="f3f97053495b072215aee864193557c0dabdd253711d5ed9b131c5abd8796e5759ab1f639211e68e24bf4471b6ab1429b165c7248cded82bfb4a3f48e8d0", 0x3e}], 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="2c000000000000000000000007000000441c9301ffffffff0000000000000000000000000000000000000000000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB='\x00'/12], 0x50}}, {{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000380)="c1ad061c5d914eadd95de7fb63eb7b0306d91c25f3fba6c97eda8ade2420dfe1fe0f5c7a01d724be33a44f1cd52028110d8f7dd4b3421a3fe4b2066d179f938ba15c3956e1aaad35035bcde7b90ed59ee2de06c8a4af3de95bda", 0x5a}], 0x1}}, {{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000000480)="f41fa963edcd5e2a5d", 0x9}, {&(0x7f00000004c0)="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", 0x4c6}], 0x2}}, {{0x0, 0x0, &(0x7f0000004240)=[{&(0x7f0000003140)="01", 0x1}], 0x300}}], 0x4, 0xc080) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0xa, 0x1, 0x0) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r9, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="6000000002060103000000000000000000000004050001000700000013000300686173683a6e65742c696661636500000900020073797a30000000000500040000000000050005000a000000140007800500150000000000080012"], 0x60}}, 0x0) 5m32.790936375s ago: executing program 37 (id=1285): r0 = fsopen(&(0x7f0000000080)='sysfs\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x3, 0x0, 0x0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) r1 = getpid() get_mempolicy(0x0, 0x0, 0x2, &(0x7f0000016000/0x3000)=nil, 0x7) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)=0x0) unshare(0x6020400) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000200)=[{&(0x7f0000000080)="7cd1f233f595", 0x6}], 0x1, 0xc) setreuid(0xee00, 0x0) r5 = syz_pidfd_open(r1, 0x0) setns(r5, 0x24020000) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=r3, @ANYRES32=r6, @ANYRESDEC=r5], 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0xfffffffffffffdac, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mq_open(0x0, 0x42, 0x40, 0x0) fallocate(r6, 0x0, 0x100000000, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) syz_clone3(&(0x7f00000008c0)={0x15340180, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r1], 0x1}, 0x58) r8 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r8, &(0x7f0000005b40)=[{{&(0x7f0000000000)={0x2, 0x4e20, @multicast2}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000040)="f37481d90eeaead391345b4da9d27e24c9c670da3afc5c00"/50, 0x32}, {&(0x7f0000000140)="ead5e96719a44591801f33", 0xb}, {&(0x7f0000000180)="f3f97053495b072215aee864193557c0dabdd253711d5ed9b131c5abd8796e5759ab1f639211e68e24bf4471b6ab1429b165c7248cded82bfb4a3f48e8d0", 0x3e}], 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="2c000000000000000000000007000000441c9301ffffffff0000000000000000000000000000000000000000000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB='\x00'/12], 0x50}}, {{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000380)="c1ad061c5d914eadd95de7fb63eb7b0306d91c25f3fba6c97eda8ade2420dfe1fe0f5c7a01d724be33a44f1cd52028110d8f7dd4b3421a3fe4b2066d179f938ba15c3956e1aaad35035bcde7b90ed59ee2de06c8a4af3de95bda", 0x5a}], 0x1}}, {{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000000480)="f41fa963edcd5e2a5d", 0x9}, {&(0x7f00000004c0)="0c71e8d7705b19c24e8c3ec98b4243ae0be48cd79f024361b8082d328363e63e360e122e7ec929c89aea0b338987609655fb5f5f91cd457584f30946f63e00fd0e8c536ae0106beb7d02fb4eb35db10c37c4bf3f2c6df9254d540598ae9b7098b74908c7da448e8891bc1b46f58553776f43370d090df693f3a4e4a724dbb498e51860bd766e36c41c0a0ee41019a0b05b519107c1fbb944f26f16f9fc127f3cd86c3fdbcf169912fc1c42a4a7051d3e85591ccd24b19681da775dc34c98ad24ab07c6feab583ba1f5efb430a06d66c039dbf40a84f04cfdfca240676e96579502925e57864815d3fe17edaf5cdbc3a4b48843c22372f9f1cf363d8428fe6341fb474ba53db6be689703ce5f7b6639b3493a5aca4c9316df8b4600d73533021932eb359ce7c1f00a54cb1318076ccb00e27ba0934db1867e078ee47b86d3e367b96ba948c3aa029c365eb0dc99685c5fd7bfbd1916b889da42d6ad1ab2466e989b5c8304b1e2190d4efeb9ccbd3a7a48c3b393470fc215e164cb91e238c5a28c4f40b4b99ee8f9481fe62e0bcf0a9831e491dc1150ad9c023217df6432487219a3083b310958cdbc217f99d02a19414987ff1bc176e3267c205827f466ea1912cbc0e304faf034602b85db010d8796d2ab18c2c4badf39db5312ad908d8555c30d0cc7d3bce8b4fcfc5764ed6e8bf4e8e4af6bbb3f82ac014f021dc6cb81cebe4b7d071e4d019719d1b0354ce0a2ff3b66ba7bf0f4598bde90a9115ddc4f197bcd881e0cd0baabb57316e75d108b14acc668ee906acf7bffdff3aef11ecf107b3eccd67a56c6b26e0a9a72d404a7a2dd3da8759e676c0eef6a95890d4f647269d1bf972d75307bd867819f385df6f57a7c28332307f444d1157c303c30a478b056d6e11111398aafcb6fff1b6a985cf888afa04586e35e7d3b292d254acf08a6bd38fbbd22bc9919052e6693c1e454aade6348679e027d1b102618476c9ab1f9928fc7f505046cb8383b9e1d79b961895502cded12f1842705102dffddc11f7bea0bd53833f1a455e661f6bda92d35b1159e1489cf762da76c125060ffedc7cc54238b3bd2d894a91d92a6c5cce9bf5417674a2bd0e38271912f7481e58ec7ab422db826482ffb80ce45dab2cb43105356c292a2fd1db8a758b37d56f46721163f24c075d980a37917cca20acce274c404828efaed50b881a5481f9ad268e99e25884db25426d5a5f338f405748817bba32b89e4c18b0f061e6758d46b5f0f2865b1c41be4f7ff999d289538a8fca45b2cf76a2fc398b7913db0ea85ee4d00156432f764ef888094dceb05c68da62fdf667b511276ac97dcf0b34819d9307cf0066267f94ab80fcc19c9f3d682e6e375ac25d7d6b71ae6d084ca1ed7e21b46b1ca0abc6cd50b3aa40e341cfc0a75f2040cc71c26e6cff3d76cc6c629051c47d8b950d01de19d324f2705e37a7a41364ecc70e5021ef955b50144860dafe6fc8b14fb6c451c0444aef66c3081097b6072c304f17206810b4e937bd5673720071d5f1d964f8bb21ab4ffbda1ece1e95005c6abdf00f78681f37c34936e8c9ba1bf420ba0dbfb84698931da95003dd2a34f59a179420ce004664f0495d1548e04e544c238599e6c41831d05c568607f0cd59153422fea60f7de8c4c1ab308b977e2280372c1f57506c22caf84ef2d912b3dbdd9d05fd1fe78ea2965f9542b0010009efea9c642f1", 0x4c6}], 0x2}}, {{0x0, 0x0, &(0x7f0000004240)=[{&(0x7f0000003140)="01", 0x1}], 0x300}}], 0x4, 0xc080) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0xa, 0x1, 0x0) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r9, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="6000000002060103000000000000000000000004050001000700000013000300686173683a6e65742c696661636500000900020073797a30000000000500040000000000050005000a000000140007800500150000000000080012"], 0x60}}, 0x0) 5m29.407937757s ago: executing program 38 (id=1306): r0 = syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000200)='./file0\x00', 0x800, &(0x7f0000000180)=ANY=[@ANYRES8=0x0, @ANYRES16, @ANYRES64, @ANYRES16=0x0], 0x1, 0x36e, &(0x7f0000000c00)="$eJzs3c9rI2UYwPEnaZpMumyTgygK0ge96GVoq2c1yC6IAZfuRtwVhNntREPGpMyESERsPXkVb/4DgsseFzwsqP9AL97WixdP9iIIuog4Mr/SJJ00aTZL0/b7gTZP8r7PzPvmF88byJuD9776uFn3zLrVkayhkhEReSRSlqwkMtFFXlLsycuX/nz4/PWbt96uVKtXtlSvVm68sqmqq2s/fPJZMe72oCD75Q8OxPht/+n9Zw/+u/FRw9OGp612Ry293f61Y912bN1ueE1T9ZpjW56tjZZnu1F7O2qvO+2dnZ5are3LKzuu7XlqtXratHvaaWvH7an1odVoqWmaenklbbjnmDFDTu3u1pZVmfGEd2bMw7z94/v+Mc2uW7GWRMzikZba3Sc6LgAAsJBG6v9vkhqhLNl+QZmJ1wL5MB5eBgT1fxKH9X+wWDis/++98FPn0rv3V+P6/0E+rf5/9Zcof6j+D84+9/r/u5HrRyuiM2/3JJ0fq/7HYlgbfkX+frhijwX1f/Bq6K/ov3j/3noYUP8DAAAAAAAAAAAAAAAAAAAAAHAWPPL9ku/7peQy+Tv8CkF8Pbl23BeNceaMe/wL8Y4C/ecDzqXrN2+JEX5xL7cq4nzZrXVr0WXcnnRcl5L8Gz4fYtGGE3thowbK8qOz260txwlL4f+KiIojtmxIScpD+WF89a3qlQ2NRPnh+Xe7tUxuJcivSyPM35SSPJWev5man5eXXhzIN6UkP9+RtjiyHb+PJfmfb6i++U51JL8Y9kvz+pN9SAAAAAAAmDtT1YiXz+Xh9W+0fjdN1bT2YC0vg+vzo58P9NfX66nr81zpudzpzh0AAAAAgIvCy3/atBzHdr3e2KAok/oU4qONNOVkwpGDIDdFn6HgYRgsH9dnaWCG0x45H/+CxrTDcL2eTD3mJPirIKl3ZrKF61CTkX6vThkk85+is3HSh8D1siefu+16a8F4dKbpDATJx0bj+si1WY88Lkh2zp3U+Zmvv/17tlNk4l17B5teu29MmGkYZEZu2ZvwpP3D9yeOZzn93eL7WX5kBgAAAMCCSIr+opfc8sbpDggAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAtortukjQlOe44AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAovg/AAD//5h69bA=") r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) mknodat$null(r1, &(0x7f00000004c0)='./file0\x00', 0x4, 0x103) r2 = openat(r0, &(0x7f0000000500)='./file2\x00', 0x402400, 0x1d6) sendfile(r2, r1, 0x0, 0x80000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r1) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000300)={'wlan1\x00'}) syz_mount_image$ext4(&(0x7f0000000540)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x88, &(0x7f0000000580)={[{@nogrpid}, {@min_batch_time}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@max_batch_time={'max_batch_time', 0x3d, 0x1}}, {@noauto_da_alloc}, {@quota}], [{@dont_hash}]}, 0x3, 0x42f, &(0x7f0000000940)="$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") unlink(&(0x7f0000000180)='./file1\x00') 5m22.92178225s ago: executing program 9 (id=1346): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) socket$inet_udp(0x2, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) write$binfmt_script(r1, &(0x7f0000000180), 0xfea7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r4, &(0x7f0000000500)="a4", 0x34000, 0x2000c851, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback, 0xffffffff}, 0x1c) chdir(&(0x7f0000000340)='./cgroup\x00') open(&(0x7f00000000c0)='.\x00', 0x0, 0x100) 5m22.88741792s ago: executing program 39 (id=1346): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) socket$inet_udp(0x2, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) write$binfmt_script(r1, &(0x7f0000000180), 0xfea7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r4, &(0x7f0000000500)="a4", 0x34000, 0x2000c851, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback, 0xffffffff}, 0x1c) chdir(&(0x7f0000000340)='./cgroup\x00') open(&(0x7f00000000c0)='.\x00', 0x0, 0x100) 33.972940917s ago: executing program 5 (id=6095): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000240)=0x1, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) pipe2$9p(&(0x7f00000001c0), 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x1, 0x4) sendmmsg$inet(r0, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)="a9aabab2ea2b7f828bec64c06361fefaa511741fc584121140d84e44becfb2485320ca0157939af01d0baaa106bfa18f912c3f2eb0bb7295442ac909747b2ff796d8621c22177403b424397292b48ff0a9e3b35b619aa1ef6cc8d0ec1126a3de8a7f2975a5b96c35e21d2b621592c3d016856d557e13b4cb318026000cef5a24bb7ac62640f9e390583e44afb7dfd624a96af9684024f89c3a1d2aa095fdda27f09e1978b2fd7e28a8d7c0375fe3038b6d25931b2fb919b2db814080b74cb4de37e3acdbdf56428d286554d1f83fa52f9fe363a98c287aea9f344e448273a5abc4d0e5e1370ed4", 0xe7}, {&(0x7f0000000740)="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", 0xf1a}], 0x2}}, {{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000400)="5a12a4e2119f5be75b42508885271cf59bc7acc53c335e20a9c5da4c372ffa04822829d31e47be434e6d00bf1c7ea16ea7da199703d653edc1a0f8f970f013ba961d000500000000000056e742fbf578c8de6700f8d996a5a0b695a9d4622edadeff77d8b3cd8846e22a59942f71a8385f6f157d3d25e36070c3b7c56c73ef51ddfec9bf421e4ad400d5e97fa54e5d6388c0866a3de9927554cb4c65fcca0d0505891129195353a823435bc8e5cb81edd05544be51789684e2ba3c2cc6e3b7bcefc5eacb", 0xc4}], 0x1}}], 0x2, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000000), 0x4) close(r0) 33.878964947s ago: executing program 5 (id=6098): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x1}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000340)='ext4_free_blocks\x00'}, 0x18) syz_mount_image$ext4(&(0x7f0000000700)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000040), 0x7, 0x4d6, &(0x7f0000000740)="$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") syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 32.855966794s ago: executing program 5 (id=6103): socket$nl_route(0x10, 0x3, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x2}, 0x11c2cf, 0x2, 0x6, 0x5, 0x3, 0x0, 0x4, 0x0, 0x1, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/199, 0xc7, 0x5) lseek(r0, 0x37, 0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000), 0x1000002, 0x0) r2 = dup(r1) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000380)=0x19) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000140)=0x2) r4 = open(&(0x7f0000000000)='./bus\x00', 0x44542, 0xc2) sendfile(r2, r4, 0x0, 0x8000fffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@initdev, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) lsetxattr$security_capability(&(0x7f0000000540)='./bus\x00', &(0x7f0000000580), &(0x7f0000000700)=@v3={0x3000000, [{0x200, 0x5}, {0xa}], r5}, 0x18, 0x2) clock_gettime(0x7, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) epoll_wait(0xffffffffffffffff, &(0x7f0000000180)=[{}], 0x1, 0x0) creat(&(0x7f0000000500)='./bus\x00', 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="c3a092257d003299000000", @ANYRES32=r4, @ANYBLOB="0500"/20, @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB="01000000040000000200"/28], 0x50) dup3(r1, r2, 0x80000) 32.741632424s ago: executing program 5 (id=6104): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x4) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f0850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0), 0x602, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000040)="93d90400000300", 0x7}], 0x1) chroot(&(0x7f0000000000)='./file0/../file0\x00') mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='./file0/../file0\x00') perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x8) syz_clone(0x2a801400, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0) 32.703396474s ago: executing program 5 (id=6105): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x1}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 32.584439733s ago: executing program 5 (id=6107): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000100), 0x1, 0x500, &(0x7f0000000a00)="$eJzs3U9sI1cZAPBvJn/sTdMmhR4AFbqUwoJWayfeNqp6oZwqhCoheuSwDYkTRbHjKHZKE/aQPXJHohInOHHmgMQBqSfuSBzgxqUckAqsQA0SByOP7V3njzfWbmzvxr+fNJo38+L53tvRvGd91s4LYGJdj4ijiJiNiPcjYqFzPuls8XZ7a/3dZ/fvrh3fv7uWRLP53j+TrL51Lno+0/Jc55r5iPjBOxE/Sk4F/VNE/eBwe7VSKe91ThUb1d1i/eDw1lZ1dbO8Wd4plVaWV5bevP1G6dL6+kr1N59ei4jf/+7Ln/zx6Fs/aTVrvlPX24/L1O76zIM4LdMR8b1hBBuDqU5/Zh/nw4/1IS5TGhGfi4hXs+d/Iaayu3nSydv07RG2DgAYhmZzIZoLvccAwFWXZjmwJC10cgHzkaaFQjuH91LMpZVavXFzo7a/s97OlS3GTLqxVSkvdXKFizGTbGxNl5ezcve4Ui6dOr4dES9GxM9y17Ljwlqtsj7OLz4AMMGeOzX//yfXnv8BgCsu/7CYG2c7AIDRyY+7AQDAyJn/AWDymP8BYPKY/wFg8pj/AWDymP8BYKJ8/913W1vzuPP+6/UPDva3ax/cWi/XtwvV/bXCWm1vt7BZq21m7+ypXnS9Sq22u/x67H9YbJTrjWL94PBOtba/07iTvdf7TnlmJL0CAB7lxVc+/ksSEUdvXcu26Hnf/4Vz9cvDbh0wTOm4GwCMzdS4GwCMzdnVvoBJIR8P9CzRe6/ndP5M4bSPBrp8at1QePrc+OIT5P+BZ5r8P0yux8v/+y4PV4H8P0yuZjOx5j8ATBg5fiC5oL739/+lZs/BYL//AwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwJU0n21JWuisBT4faVooRDwfEYsxk2xsVcpLEfFCRPw5N5NrHS9HhHWDAOBZlv496az/dWPhtfnTtbO5/+ayfUT8+Bfv/fzD1UZjbzliNvnXg/ONjzrnS+NoPwBwke483Z3Huz67f3etu42yPZ9+p724aCvucWdr10zHdLbPZ7mGuX8nneO21veVqUuIf3QvIr5wXv+TLDey2Fn59HT8VuznRxo/PRE/zera+9a/xecvoS0waT5ujT9vn/f8pXE925///OezEerJdce/4zPjX/pg/JvqM/5dHzTG63/47pmTzYV23b2IL01HHHcv3jP+dOMnfeK/NmD8v778lVf71TV/GXEjzut/ciJWsVHdLdYPDm9tVVc3y5vlnVJpZXll6c3bb5SKWY662M1Un/WPt26+0C9+q/9zfeLnL+j/1wfs/6/+9/4Pv/qI+N/82vn3/6VHxG/Nid8YMP7q3G/z/epa8df79P+i+39zwPif/O1wfcA/BQBGoH5wuL1aqZT3hl1Ihx8iKyQRRyPoTruQ+/VP3xlVrCEW4ulohsLTVBj3yAQM28OHftwtAQAAAAAAAAAAAAAA+hnFfycadx8BAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC4uv4fAAD//5iA1Hs=") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.numa_stat\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x8004587d, &(0x7f00000003c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000080)=@req3={0x8000, 0x200, 0x80, 0x20000, 0x0, 0x0, 0x8}, 0x1c) mmap(&(0x7f0000568000/0x2000)=nil, 0x1000000, 0x0, 0x11, r1, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000440)=""/247, 0x26) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000340)={0x31, @time={0x7, 0xfffffff7}, 0x0, {}, 0x9, 0x2}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0xc02c5341, &(0x7f0000000100)) tkill(0x0, 0x7) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) syz_emit_ethernet(0x42, &(0x7f0000000100)={@local, @broadcast, @void, {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x3, @empty, @private1={0xfc, 0x1, '\x00', 0xfa}, @random=' \x00', @private0={0xfc, 0x0, '\x00', 0x1}}}}}, 0x0) 32.565775184s ago: executing program 40 (id=6107): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000100), 0x1, 0x500, &(0x7f0000000a00)="$eJzs3U9sI1cZAPBvJn/sTdMmhR4AFbqUwoJWayfeNqp6oZwqhCoheuSwDYkTRbHjKHZKE/aQPXJHohInOHHmgMQBqSfuSBzgxqUckAqsQA0SByOP7V3njzfWbmzvxr+fNJo38+L53tvRvGd91s4LYGJdj4ijiJiNiPcjYqFzPuls8XZ7a/3dZ/fvrh3fv7uWRLP53j+TrL51Lno+0/Jc55r5iPjBOxE/Sk4F/VNE/eBwe7VSKe91ThUb1d1i/eDw1lZ1dbO8Wd4plVaWV5bevP1G6dL6+kr1N59ei4jf/+7Ln/zx6Fs/aTVrvlPX24/L1O76zIM4LdMR8b1hBBuDqU5/Zh/nw4/1IS5TGhGfi4hXs+d/Iaayu3nSydv07RG2DgAYhmZzIZoLvccAwFWXZjmwJC10cgHzkaaFQjuH91LMpZVavXFzo7a/s97OlS3GTLqxVSkvdXKFizGTbGxNl5ezcve4Ui6dOr4dES9GxM9y17Ljwlqtsj7OLz4AMMGeOzX//yfXnv8BgCsu/7CYG2c7AIDRyY+7AQDAyJn/AWDymP8BYPKY/wFg8pj/AWDymP8BYKJ8/913W1vzuPP+6/UPDva3ax/cWi/XtwvV/bXCWm1vt7BZq21m7+ypXnS9Sq22u/x67H9YbJTrjWL94PBOtba/07iTvdf7TnlmJL0CAB7lxVc+/ksSEUdvXcu26Hnf/4Vz9cvDbh0wTOm4GwCMzdS4GwCMzdnVvoBJIR8P9CzRe6/ndP5M4bSPBrp8at1QePrc+OIT5P+BZ5r8P0yux8v/+y4PV4H8P0yuZjOx5j8ATBg5fiC5oL739/+lZs/BYL//AwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwJU0n21JWuisBT4faVooRDwfEYsxk2xsVcpLEfFCRPw5N5NrHS9HhHWDAOBZlv496az/dWPhtfnTtbO5/+ayfUT8+Bfv/fzD1UZjbzliNvnXg/ONjzrnS+NoPwBwke483Z3Huz67f3etu42yPZ9+p724aCvucWdr10zHdLbPZ7mGuX8nneO21veVqUuIf3QvIr5wXv+TLDey2Fn59HT8VuznRxo/PRE/zera+9a/xecvoS0waT5ujT9vn/f8pXE925///OezEerJdce/4zPjX/pg/JvqM/5dHzTG63/47pmTzYV23b2IL01HHHcv3jP+dOMnfeK/NmD8v778lVf71TV/GXEjzut/ciJWsVHdLdYPDm9tVVc3y5vlnVJpZXll6c3bb5SKWY662M1Un/WPt26+0C9+q/9zfeLnL+j/1wfs/6/+9/4Pv/qI+N/82vn3/6VHxG/Nid8YMP7q3G/z/epa8df79P+i+39zwPif/O1wfcA/BQBGoH5wuL1aqZT3hl1Ihx8iKyQRRyPoTruQ+/VP3xlVrCEW4ulohsLTVBj3yAQM28OHftwtAQAAAAAAAAAAAAAA+hnFfycadx8BAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC4uv4fAAD//5iA1Hs=") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.numa_stat\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x8004587d, &(0x7f00000003c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000080)=@req3={0x8000, 0x200, 0x80, 0x20000, 0x0, 0x0, 0x8}, 0x1c) mmap(&(0x7f0000568000/0x2000)=nil, 0x1000000, 0x0, 0x11, r1, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000440)=""/247, 0x26) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000340)={0x31, @time={0x7, 0xfffffff7}, 0x0, {}, 0x9, 0x2}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0xc02c5341, &(0x7f0000000100)) tkill(0x0, 0x7) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) syz_emit_ethernet(0x42, &(0x7f0000000100)={@local, @broadcast, @void, {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x3, @empty, @private1={0xfc, 0x1, '\x00', 0xfa}, @random=' \x00', @private0={0xfc, 0x0, '\x00', 0x1}}}}}, 0x0) 13.801744125s ago: executing program 4 (id=6424): r0 = fsopen(&(0x7f0000000080)='sysfs\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x3, 0x0, 0x0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) r1 = getpid() get_mempolicy(0x0, 0x0, 0x2, &(0x7f0000016000/0x3000)=nil, 0x7) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)=0x0) unshare(0x6020400) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000200)=[{&(0x7f0000000080)="7cd1f233f595", 0x6}], 0x1, 0xc) setreuid(0xee00, 0x0) r5 = syz_pidfd_open(r1, 0x0) setns(r5, 0x24020000) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=r3, @ANYRES32=r6, @ANYRESDEC=r5], 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0xfffffffffffffdac, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mq_open(&(0x7f0000001140)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xd3\xa7\xd8J\xfd\x94#KT\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\x88N\xb8\xde\xeb)\xcd\xc56m\n\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88|0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc\x02\xea\x91\xe8\xd8\x01YZy\xe6!\x89\x9c\xd1\xa6\x167\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1[\x84\x10aF\x9b\xda\xeb\xc4*\x02q\xb2\x92\x00\x8cv\xac AN\xb9\xaa\xe0\x9d\x97Te\x81\x98L\xfe\x97+u\xd3^\xb1\xf0\xe0\x1f\xbd\a\xbb\xe5\x18\x9ds\x12ha\x00\xeb\x84\x99\xc6\x0f\xf1\xd5LD\xa87\xa0DQ\x8a2\x16!8,\xbc%$\xf1\xf2\xd6\x9cy\xecK\xda\xc5\xdc\xfa\xdd\xf6\b\xc6\xb4\x14\x16\x9c\x7f\x92\x85\xb0\xa2%:\xf0\xf4\x150\x0f\xb4\xa6d\xb4\xe4L\x19W\xd5\x90\xf7l\x1b\xfe\xde\vh\x97=m\x82.\xac\vh\xfe\x84Q}\x838/\x83\xebP\xbe\xd6+:\xceE\\\x95\xd4\xac\x92\x87\xd7\x98\x97\xe3\xec\xad\xd5\xac\x80C\x84R\x88r^g\xbaQ(\x9a>\xe2\xba\xa8=\x17\f04\x8f\x1f\xf2\x88*@v\xe7\xd1\xee\xb3\xc2\x8dT\xda\x81g\xd9\x1a:hzW6s)x\x06\xae\x11\xf2\x1e\xcd\v\xe5L\x19\x96s\xbc\x9e\xf4\x10$\r\xa4\xd8\xa2\xa2\xfcM\xc5R3~$\xc0\xa5n\x9a W\xb1e\xcc<$\xdf\x15\f]\x15\xf5#G\xce\xaf\x88U\xfa\x80\xf24\xf6\xb5\xef\xe2z\xcf\x9eN\x92\xac\x81{\xe6\xbd\xd7\x16\xe6F\xe2\x9e\x91%\x94\v\xb9\xdc\xd6\x87\x8f\xcd\xc1\xb05\x81\x81\xf8\xe9X\xe8Kt9@\xf4\xe1\xa6=\xc9\xe1:p4\nP[f\x1d\xfd\xfa\x839\x8d\x0e\xd1\xf9\xa0\xd2^E\xe5\xedo.\xaa\xf2\xb4\xcdn\x14\f\xcd\x83_yk\xda\xc5\x89\xf0Z\xea\x1d\xbd\xc00\v\xa3\xb3\xbe\xe6\x8b\x18/\xa8\xaaY\xf2\x89\x0f\x9enOOr\x00\xb2\x01\x1f:Z\xb8\xee;\xe3;\x8aPV\xce\xee\xf8[\x16\n\xe6:z\xb8\x1dvk\a{\xc1\x14\xd9+\xdb\t\x11\x90y\xe8\\\xe6\xfc\xca\xb4\xcbC\xd6\xd0\xbeC\xce\xc0L\xdb\xcd\xb3\x907c\xb4\xa6\xce\xdb[\xce\x122N\xa3\xc7Q<\x1a\xa5\xb3)\xc5\x98\x84\x8a\x82\x19\xb0\t\xac\x10\\\x8c\xbe\xcb\raIYe[\xa8\xc4\xac\x0e\xbb\x0f\b^\xdag\xe2\xa9\"\xf5h\'\xcf\xd9\x1b\xef\xe3\xe7y\x82\x1e\xca\x7f\x02 \xcf\x9e\xe0\xd9TM\xb9\n\xa9\xad3\x91\xa5\xe6!\xcd\xa2\xa4\x14\x12\xf9\xbf\xa8b\xcec:\xd7\'\f\f\x957\xc9}\r\xa6\xaa\x0f\xca\x96\xeb', 0x42, 0x40, 0x0) fallocate(r6, 0x0, 0x100000000, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) syz_clone3(&(0x7f00000008c0)={0x15340180, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r1], 0x1}, 0x58) r8 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r8, &(0x7f0000005b40)=[{{&(0x7f0000000000)={0x2, 0x4e20, @multicast2}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000040)="f37481d90eeaead391345b4da9d27e24c9c670da3afc5c00"/47, 0x2f}, {&(0x7f0000000140)="ead5e96719a44591801f33", 0xb}, {&(0x7f0000000180)="f3f97053495b072215aee864193557c0dabdd253711d5ed9b131c5abd8796e5759ab1f639211e68e24bf4471b6ab1429b165c7248cded82bfb4a3f48e8d0", 0x3e}], 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="2c000000000000000000000007000000441c9301ffffffff0000000000000000000000000000000000000000000000001c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB='\x00'/12], 0x50}}, {{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000380)="c1ad061c5d914eadd95de7fb63eb7b0306d91c25f3fba6c97eda8ade2420dfe1fe0f5c7a01d724be33a44f1cd52028110d8f7dd4b3421a3fe4b2066d179f938ba15c3956e1aaad35035bcde7b90ed59ee2de06c8a4af3de95bda", 0x5a}], 0x1}}, {{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000000480)="f41fa963edcd5e2a5d", 0x9}, {&(0x7f00000004c0)="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", 0x4c6}], 0x2}}, {{0x0, 0x0, &(0x7f0000004240)=[{&(0x7f0000003140)="01", 0x1}], 0x1}}], 0x4, 0xc080) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0xa, 0x1, 0x0) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r9, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="6000000002060103000000000000000000000004050001000700000013000300686173683a6e65742c696661636500000900020073797a30000000000500040000000000050005000a000000140007800500150000000000080012"], 0x60}}, 0x0) 12.949979324s ago: executing program 4 (id=6442): bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000001c000000000000002300850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = dup2(r0, r0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) lsm_set_self_attr(0x65, &(0x7f0000003bc0)={0x66, 0xa50d, 0x20}, 0x20, 0x0) 12.915667603s ago: executing program 4 (id=6443): socket$nl_route(0x10, 0x3, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x2}, 0x11c2cf, 0x2, 0x6, 0x5, 0x3, 0x0, 0x4, 0x0, 0x1, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/199, 0xc7, 0x5) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000), 0x1000002, 0x0) r2 = dup(r1) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000380)=0x19) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000140)=0x2) r4 = open(&(0x7f0000000000)='./bus\x00', 0x44542, 0xc2) ftruncate(r4, 0xee72) sendfile(r2, r4, 0x0, 0x8000fffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@initdev, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) lsetxattr$security_capability(&(0x7f0000000540)='./bus\x00', &(0x7f0000000580), &(0x7f0000000700)=@v3={0x3000000, [{0x200, 0x5}, {0xa}], r5}, 0x18, 0x2) 12.633390783s ago: executing program 6 (id=6448): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_SET(r1, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)={0x104, r2, 0x100, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x78, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x3, @private2, 0x80000001}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast2}}}}, @TIPC_NLA_BEARER_NAME={0x11, 0x1, @l2={'eth', 0x3a, 'pim6reg1\x00'}}, @TIPC_NLA_BEARER_NAME={0x15, 0x1, @l2={'ib', 0x3a, 'veth0_macvtap\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfee}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7c1}]}, @TIPC_NLA_BEARER={0x20, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'veth0_to_hsr\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e33, 0x56, @private0, 0x1}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x6, @mcast2, 0x61}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @l2={'ib', 0x3a, 'vlan0\x00'}}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x4000000}, 0x40004) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f00000005c0)='./file0\x00', 0x1008002, &(0x7f0000000040), 0x3, 0x5eb, &(0x7f0000000c00)="$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") r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f00000004c0)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000000c0)='sched_switch\x00', r7}, 0x10) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000100)='\x00') syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_usbip_server_init(0x5) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000440)=@newtaction={0x68, 0x30, 0xffff, 0x70bd25, 0x0, {0x0, 0x0, 0x1300}, [{0x54, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x1, 0x0, 0x1, 0x400, 0x7}, 0x2}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x2}}}}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3, 0x0, 0x2}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) link(&(0x7f0000000780)='./file2\x00', &(0x7f0000001740)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') 11.61366258s ago: executing program 4 (id=6457): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x4) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f0850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0), 0x602, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000040)="93d90400000300", 0x7}], 0x1) chroot(&(0x7f0000000000)='./file0/../file0\x00') mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='./file0/../file0\x00') perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2a801400, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0) 11.43633134s ago: executing program 4 (id=6460): r0 = socket$netlink(0x10, 0x3, 0x8) getsockopt(r0, 0x1, 0x9, 0x0, &(0x7f0000003140)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000500000000000000"], 0x48) bpf$MAP_CREATE(0x1900000000000000, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) pipe(0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/locks\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x8, &(0x7f0000000680)=@raw=[@ringbuf_query, @alu={0x4, 0x0, 0x4, 0xe, 0x3, 0xe1, 0xffffffffffffffff}, @printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x80000000}}, @alu={0x7, 0x0, 0x7, 0x4, 0x7, 0x2, 0x8}], &(0x7f0000000200)='syzkaller\x00', 0x6, 0x1000, &(0x7f0000001e40)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000880)) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r4, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r5, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010005"], 0x3c}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x60, &(0x7f0000000300)={&(0x7f0000000140)=@newlink={0x5c, 0x10, 0xffffff1f, 0xfffffffc, 0x0, {}, [@IFLA_LINKINFO={0x34, 0x12, 0x0, 0x1, @gretap={{0xb}, {0x24, 0x2, 0x0, 0x1, [@IFLA_GRE_TTL={0x5, 0x8, 0x2}, @IFLA_GRE_ENCAP_TYPE={0x6, 0xe, 0x2}, @IFLA_GRE_ENCAP_FLAGS={0x6, 0xf, 0x5}, @IFLA_GRE_REMOTE={0x8, 0x7, @local}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x5c}}, 0x0) 10.912502108s ago: executing program 4 (id=6468): socket$nl_route(0x10, 0x3, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x2}, 0x11c2cf, 0x2, 0x6, 0x5, 0x3, 0x0, 0x4, 0x0, 0x1, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) lseek(r0, 0x37, 0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000), 0x1000002, 0x0) r2 = dup(r1) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000380)=0x19) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000140)=0x2) r4 = open(&(0x7f0000000000)='./bus\x00', 0x44542, 0xc2) ftruncate(r4, 0xee72) sendfile(r2, r4, 0x0, 0x8000fffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@initdev, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) lsetxattr$security_capability(&(0x7f0000000540)='./bus\x00', &(0x7f0000000580), &(0x7f0000000700)=@v3={0x3000000, [{0x200, 0x5}, {0xa}], r5}, 0x18, 0x2) 10.894248088s ago: executing program 41 (id=6468): socket$nl_route(0x10, 0x3, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x2}, 0x11c2cf, 0x2, 0x6, 0x5, 0x3, 0x0, 0x4, 0x0, 0x1, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) lseek(r0, 0x37, 0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000), 0x1000002, 0x0) r2 = dup(r1) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000380)=0x19) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000140)=0x2) r4 = open(&(0x7f0000000000)='./bus\x00', 0x44542, 0xc2) ftruncate(r4, 0xee72) sendfile(r2, r4, 0x0, 0x8000fffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@initdev, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) lsetxattr$security_capability(&(0x7f0000000540)='./bus\x00', &(0x7f0000000580), &(0x7f0000000700)=@v3={0x3000000, [{0x200, 0x5}, {0xa}], r5}, 0x18, 0x2) 10.758826288s ago: executing program 6 (id=6470): socket$nl_route(0x10, 0x3, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x2}, 0x11c2cf, 0x2, 0x6, 0x5, 0x3, 0x0, 0x4, 0x0, 0x1, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000100)=""/199, 0xc7, 0x5) lseek(0xffffffffffffffff, 0x37, 0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000), 0x1000002, 0x0) r1 = dup(r0) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000380)=0x19) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000140)=0x2) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000fffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@initdev, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) lsetxattr$security_capability(&(0x7f0000000540)='./bus\x00', &(0x7f0000000580), &(0x7f0000000700)=@v3={0x3000000, [{0x200, 0x5}, {0xa}], r3}, 0x18, 0x2) clock_gettime(0x7, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) epoll_wait(0xffffffffffffffff, &(0x7f0000000180)=[{}], 0x1, 0x0) creat(&(0x7f0000000500)='./bus\x00', 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="c3a092257d003299000000", @ANYRES32, @ANYBLOB="0500"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="01000000040000000200"/28], 0x50) dup3(r0, r1, 0x80000) 10.711509388s ago: executing program 6 (id=6471): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000240)=0x1, 0x4) connect$inet(r0, &(0x7f00000006c0)={0x2, 0x0, @dev}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) pipe2$9p(0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x1, 0x4) sendmmsg$inet(r0, 0x0, 0x0, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000000), 0x4) close(r0) 10.678111608s ago: executing program 6 (id=6472): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x4) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f0850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0), 0x602, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000040)="93d90400000300", 0x7}], 0x1) chroot(&(0x7f0000000000)='./file0/../file0\x00') mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='./file0/../file0\x00') perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2a801400, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0) 10.654045537s ago: executing program 6 (id=6473): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x1}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 10.384815107s ago: executing program 6 (id=6474): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events.local\x00', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000340)=0x4, 0x12) write$selinux_load(r1, &(0x7f0000000000)=ANY=[], 0x2000) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/pm_trace_dev_match', 0x10840, 0x100) mmap(&(0x7f00005f9000/0x3000)=nil, 0x3000, 0x300000e, 0x10, r0, 0xb47b0000) 10.384496237s ago: executing program 42 (id=6474): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r2 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events.local\x00', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000340)=0x4, 0x12) write$selinux_load(r1, &(0x7f0000000000)=ANY=[], 0x2000) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/pm_trace_dev_match', 0x10840, 0x100) mmap(&(0x7f00005f9000/0x3000)=nil, 0x3000, 0x300000e, 0x10, r0, 0xb47b0000) 6.892534238s ago: executing program 2 (id=6475): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xd, 0x10, &(0x7f0000000580)=ANY=[], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xd, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0, r1}, 0x18) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = dup(0xffffffffffffffff) setsockopt$SO_BINDTODEVICE_wg(r4, 0x1, 0x19, &(0x7f0000000380)='wg2\x00', 0x4) bind$unix(r4, &(0x7f00000001c0)=@abs={0xa, 0x2}, 0x6e) io_uring_register$IORING_REGISTER_SYNC_CANCEL(r4, 0x18, &(0x7f00000001c0)={0x8, r2, 0x0, {0x2, 0x81}, 0x7}, 0x1) fallocate(r0, 0x0, 0x7, 0x10000) sendmsg$nl_route_sched(r3, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000002500)='\f7', 0x2}, {&(0x7f0000000440)='0', 0x1}], 0x2) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000200)='fdb_delete\x00', r7}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000280)={'wg2\x00'}) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r10}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 6.847538868s ago: executing program 2 (id=6504): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x4) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f0850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0), 0x602, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000040)="93d90400000300", 0x7}], 0x1) chroot(&(0x7f0000000000)='./file0/../file0\x00') mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='./file0/../file0\x00') madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x8) syz_clone(0x2a801400, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0) 6.820796287s ago: executing program 2 (id=6505): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000003200)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2, 0x0, 0x318a054d}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$phonet(0x23, 0x2, 0x1) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000340)={'dummy0\x00'}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000000240)={'wg1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000b40)=@newlink={0x40, 0x10, 0x503, 0x70bd26, 0x3, {0x0, 0x0, 0x0, 0x0, 0xc}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_HSR_MULTICAST_SPEC={0x5, 0x3, 0x4}, @IFLA_HSR_SLAVE2={0x8, 0x2, r5}]}}}]}, 0x40}}, 0x0) syz_emit_ethernet(0x2f, &(0x7f0000000080)={@remote, @broadcast, @void, {@llc={0x4, {@llc={0x0, 0x2, "a5", "8504a5ec54e2f2032a408ee4f6c4262ca3a424a04368ff837184374f5d3c"}}}}}, &(0x7f00000000c0)={0x1, 0x4, [0xa8b, 0xc93, 0xdc, 0x5f4]}) 6.098498636s ago: executing program 8 (id=6515): sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000000)={0x1c, 0x0, 0x801, 0x70bd2c, 0xfffffffc, {{}, {@val={0x8}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x40905}, 0x0) syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000100)=ANY=[@ANYBLOB="12010000090024206d041cc340000000000109022400010000a0000904000001030101000921000800012201000905", @ANYRES32], 0x0) syz_usb_connect$printer(0x4, 0x36, &(0x7f0000000180)={{0x12, 0x1, 0x200, 0x0, 0x0, 0x0, 0x8, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x9, 0x90, 0x8, [{{0x9, 0x4, 0x0, 0x7f, 0x1, 0x7, 0x1, 0x3, 0x1, "", {{{0x9, 0x5, 0x1, 0x2, 0x8, 0x9, 0x80, 0x7}}, [{{0x9, 0x5, 0x82, 0x2, 0x40, 0x7, 0x0, 0x9}}]}}}]}}]}}, &(0x7f0000000480)={0xa, &(0x7f00000001c0)={0xa, 0x6, 0x200, 0xff, 0xfa, 0xa, 0x8, 0x5}, 0xeb, &(0x7f0000000240)={0x5, 0xf, 0xeb, 0x3, [@generic={0xcf, 0x10, 0xa, "38efe88571544090a3cbd67f7e86d13befcdab56a8e2f56dc03264550489ada09b9167bfa61aba8901dccae558e7d763f4b8d00c1e5274b38ae4047aea7e60f1e16f4934b05ce37f3f726c1532742993b3fd98e57c4af32f6df5db079457eb8bdaaa7c2ef7873e35df7aac0523e920de8aca47d030ffc6f39ddb328aa13631fc06ac0ce4fe224da7960e67bf79b702de099ccb6d0294bb016c690fed9cfdeddf5163c4531aa8fa9cdba7d896d50f7deca2df68e69f6b427afaa26f4fc7ee75bd4434e602212c296107dd51f9"}, @ss_container_id={0x14, 0x10, 0x4, 0x3, "debfe5a7af0fded821c3c5483fef0429"}, @ptm_cap={0x3}]}, 0x3, [{0x4, &(0x7f0000000340)=@lang_id={0x4, 0x3, 0x407}}, {0xa, &(0x7f0000000380)=@string={0xa, 0x3, "bbab8906f508d2f2"}}, {0x46, &(0x7f0000000400)=@string={0x46, 0x3, "4e5262fc55b3a3f79e35117272b32bd27f9ea6e97e5bd5972217ef625fafff7a610d07aabef666675057809a8a690fec430dbb34302e660adbe315e5aaa96961043e2fc0"}}]}) getdents64(0xffffffffffffffff, &(0x7f0000000040)=""/56, 0x38) socket$nl_route(0x10, 0x3, 0x0) unshare(0x20020480) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0xa, 0x3, 0x2000, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x2000000, 0x9, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_usb_connect(0x0, 0x36, 0x0, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x400, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, 0x0}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, 0x0, 0x0) sendmsg$NFT_BATCH(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000b00)={&(0x7f0000000140)={{0x14}, [@NFT_MSG_NEWRULE={0x4c, 0x6, 0xa, 0x401, 0x0, 0x0, {0x2}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_EXPRESSIONS={0x20, 0x4, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, @xfrm={{0x9}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_XFRM_KEY={0x8}]}}}]}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x74}}, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$RTC_AIE_ON(r3, 0x7001) ioctl$RTC_UIE_ON(r3, 0x7003) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000140)={0x3, 0x0, {0x1, 0x0, 0x0, 0x3, 0x6, 0x60, 0x3, 0x4, 0x1}}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00'}) 5.223783534s ago: executing program 8 (id=6521): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000240)=0x1, 0x4) connect$inet(r0, &(0x7f00000006c0)={0x2, 0x0, @dev}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) pipe2$9p(0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x1, 0x4) sendmmsg$inet(r0, &(0x7f0000008e80)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000280)="a9aabab2ea2b7f828bec64c06361fefaa511741fc584121140d84e44becfb2485320ca0157939af01d0baaa106bfa18f912c3f2eb0bb7295442ac909747b2ff796d8621c22177403b424397292b48ff0a9e3b35b619aa1ef6cc8d0ec1126a3de8a7f2975a5b96c35e21d2b621592c3d016856d557e13b4cb318026000cef5a24bb7ac62640f9e390583e44afb7dfd624a96af9684024f89c3a1d2aa095fdda27f09e1978b2fd7e28a8d7c0375fe3038b6d25931b2fb919b2db814080b74cb4de37e3acdbdf56428d286554d1f83fa52f9fe363a98c287aea9f344e448273a5abc4d0e5e1370ed4", 0xe7}, {&(0x7f0000000740)="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", 0xf1a}], 0x2}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000000), 0x4) close(r0) 5.166456673s ago: executing program 8 (id=6522): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 5.094165063s ago: executing program 8 (id=6525): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xc, 0x8e}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) syz_io_uring_setup(0xd2, &(0x7f0000000480)={0x0, 0x6299, 0x80, 0x0, 0x334}, &(0x7f00000002c0), &(0x7f0000000080)) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='sched_switch\x00', r3}, 0x10) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x2, 0x800800000003}, 0x1100, 0x5dd8, 0x3, 0x5, 0x0, 0x8, 0xff7b, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010200000000000000020000000900010073797a300000000040000000030a01010000000000000000020000000900010073797a30000000000900030073797a32000000001400048008000140000000000800024000000b002c000000030a03000000000000000000020000000900010073797a30000000000900030073797a32"], 0xb4}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 4.337510831s ago: executing program 2 (id=6536): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 4.336652741s ago: executing program 43 (id=6536): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 3.84669628s ago: executing program 1 (id=6541): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x3, &(0x7f0000000580)=@framed={{0x18, 0x5}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) creat(&(0x7f00000000c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) write$P9_RVERSION(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r1 = dup(r0) write$P9_RLERRORu(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kfree\x00', r2}, 0x10) fsopen(&(0x7f0000000200)='sysv\x00', 0x1) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='kfree\x00', r4}, 0x18) creat(&(0x7f0000000380)='./file0\x00', 0x80) 3.71991239s ago: executing program 1 (id=6542): r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x1100, 0x5dd8, 0x0, 0x5, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b40)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r3 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setlease(r3, 0x400, 0x2) bind$netlink(r3, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbfe, 0x4}, 0xc) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_VENDOR(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001740)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010700000000000000a6670000000800c300000000000800c4"], 0x2c}}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r7, 0x0, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000900)=ANY=[@ANYBLOB="440000001000090600"/20, @ANYRES32=0x0, @ANYBLOB="adffa888000000001c00128009000100626f6e64000000000c000280050001000600000008000a0079"], 0x44}}, 0x0) ioctl$PAGEMAP_SCAN(0xffffffffffffffff, 0xc0606610, &(0x7f0000000100)={0x60, 0x0, &(0x7f00001c9000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, 0x0, 0x0, 0xe4, 0x0, 0x0, 0x0, 0x2}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) dup2(r9, 0xffffffffffffffff) r10 = open(&(0x7f0000000000)='./bus\x00', 0x40, 0x0) fgetxattr(r10, &(0x7f00000003c0)=@known='security.selinux\x00', 0x0, 0x0) 3.453969819s ago: executing program 1 (id=6546): write$binfmt_script(0xffffffffffffffff, &(0x7f0000000ac0)={'#! ', './file0', [], 0xa, '\\Z'}, 0xd) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040), 0x208e24b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000f40)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000400028008000a00"], 0x40}, 0x1, 0x0, 0x0, 0x814}, 0x4000) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000000)={0x6, 0x9, &(0x7f0000000140)=ANY=[], &(0x7f0000001540)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7, @void, @value}, 0x94) 3.092215068s ago: executing program 1 (id=6553): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0600000004000000ff0f0000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000000000070200e2f7ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0xe75, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = syz_io_uring_setup(0x24f5, &(0x7f0000000780)={0x0, 0xc297, 0x10100, 0x3}, &(0x7f0000000100)=0x0, &(0x7f0000000800)=0x0) syz_io_uring_submit(r3, r4, &(0x7f00000001c0)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)={&(0x7f0000000340)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x0, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000480)="10ab119b497ad23a1c1142ce24b27ffa12477294d5f95fbf8890c08a1c7a02944cf58f9e6725ddafac32a98ed3ec927d19a01a193c99058915996d97a79d6e364c97cd620d3e639b4374dae2de1c616415fbc228c3f6bbaacf237291ea1c763bc9f9405da6d699a83194b49c8848fe72407cbcd06881dbc687e9a9967c4031632fbbb883db18c6b0c40a546715fa886040c2", 0x5d}], 0x100000000000000f}, 0x0, 0x80840, 0x1}) io_uring_enter(r2, 0x11d30, 0x0, 0x0, 0x0, 0x0) 3.034843918s ago: executing program 1 (id=6554): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x4) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f0850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0), 0x602, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000040)="93d90400000300", 0x7}], 0x1) chroot(&(0x7f0000000000)='./file0/../file0\x00') mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x8) syz_clone(0x2a801400, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0) 2.995629468s ago: executing program 1 (id=6555): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000100), 0x1, 0x500, &(0x7f0000000a00)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.numa_stat\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x8004587d, &(0x7f00000003c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}) r1 = socket$packet(0x11, 0x2, 0x300) mmap(&(0x7f0000568000/0x2000)=nil, 0x1000000, 0x0, 0x11, r1, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = gettid() r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r3, &(0x7f0000000440)=""/247, 0x26) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r3, 0x4040534e, &(0x7f0000000340)={0x31, @time={0x7, 0xfffffff7}, 0x0, {}, 0x9, 0x2}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r3, 0xc02c5341, &(0x7f0000000100)) tkill(r2, 0x7) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) syz_emit_ethernet(0x42, &(0x7f0000000100)={@local, @broadcast, @void, {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x3, @empty, @private1={0xfc, 0x1, '\x00', 0xfa}, @random=' \x00', @private0={0xfc, 0x0, '\x00', 0x1}}}}}, 0x0) 1.961595725s ago: executing program 3 (id=6566): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000100), 0x1, 0x500, &(0x7f0000000a00)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.numa_stat\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x8004587d, &(0x7f00000003c0)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}) r1 = socket$packet(0x11, 0x2, 0x300) mmap(&(0x7f0000568000/0x2000)=nil, 0x1000000, 0x0, 0x11, r1, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = gettid() r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r3, &(0x7f0000000440)=""/247, 0x26) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r3, 0x4040534e, &(0x7f0000000340)={0x31, @time={0x7, 0xfffffff7}, 0x0, {}, 0x9, 0x2}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r3, 0xc02c5341, &(0x7f0000000100)) tkill(r2, 0x7) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) syz_emit_ethernet(0x42, &(0x7f0000000100)={@local, @broadcast, @void, {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x3, @empty, @private1={0xfc, 0x1, '\x00', 0xfa}, @random=' \x00', @private0={0xfc, 0x0, '\x00', 0x1}}}}}, 0x0) 1.527947324s ago: executing program 3 (id=6567): write$binfmt_script(0xffffffffffffffff, &(0x7f0000000ac0)={'#! ', './file0', [], 0xa, '\\Z'}, 0xd) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040), 0x208e24b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000f40)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000400028008000a00"], 0x40}, 0x1, 0x0, 0x0, 0x814}, 0x4000) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) fdatasync(r0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000000)={0x6, 0x9, &(0x7f0000000140)=ANY=[], &(0x7f0000001540)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7, @void, @value}, 0x94) 1.177658343s ago: executing program 0 (id=6568): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x14, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r0, 0x0, 0x10000000000ac6}, 0x18) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000020000eaff00000085000000ae000000951702c4e909b2d05d"], &(0x7f0000001b80)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe, @void, @value}, 0x90) syz_emit_ethernet(0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c2000001a21428e0c08586dd61bcc1d700006cff0000000000000000000000000000000100000000000000004400000000000001"], 0x0) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r3 = socket$inet(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000480)=""/201, 0xc9}], 0x1) connect$inet(r3, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x9, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b704000008000000850000009500000095"], 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0xf, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x50, '\x00', 0x0, @fallback=0xf4f586403af258b6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sys_enter\x00', r4}, 0x10) r5 = open(&(0x7f0000000080)='./bus\x00', 0x400141041, 0x12) fadvise64(r5, 0x0, 0x5, 0x4) memfd_create(&(0x7f0000000b80)='\xdd#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\xf9\xff\xff\xff\x00\x17?$^\xe1Ob\xe1Y\x03\x00\x00\x00\x00\x00\x00\x00\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\xdc\xaa<\x96\xedE>{\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9\x87\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T[\xb7\xa4\xb0\bk&\xede\x8b\xc2\xb2\xcd\xef\xcf\x0fE\xc5\x86]\xc0]}\xdd^\xf6&\x16>c\x9d\x9c\xc9\x01\x04\x00\x00\xe9h\xbd\x10p\x8f\x14\x1f2\"\x1b;\xfda\x19\x8bo^\x96\x9a~Q\xce\x95\x02\xb8e\xbbG\xb0V[\xfe\x80\x94$y\x8a\\@\xa9^\x95!IJ\xcf\xf7\xafoX/qG\x97ITp\x01\xae\f\"n;%\xecT\xf6\xb6\xbf;\xde\xec\xb4z\xaa\xd9%\xa5;wy~\xcb\x9a\xd7\r\xe2\xcd\xf0C\x16\xbf0\x89\xb4\xf5\x86\xf3\x99\x9bq\xd3\x15\xe1:\x86\xe4\x14\x805K\xcf\xf6\xda\xd1A>\xf4r>\xfdyAH\x0f\x00'/426, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x1b) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r6}, 0x10) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000580)='.\x00', 0x0, 0x80) getdents64(r7, &(0x7f0000000f80)=""/4096, 0x1000) 1.007128752s ago: executing program 0 (id=6569): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000240)={'wg0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYRES32=r1], 0x24}}, 0x0) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x6000, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@migrate={0xa0, 0x21, 0x801, 0x70bd27, 0x25dfdbfe, {{@in6=@private1, @in=@dev={0xac, 0x14, 0x14, 0x24}, 0x4e21, 0x1200, 0x4e24, 0x4, 0xa, 0x20, 0x20, 0x84, r1}, 0x6e6bbf, 0x6}, [@migrate={0x50, 0x11, [{@in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in6=@private1, @in6=@loopback, @in=@loopback, 0xff, 0x3, 0x0, 0x3500, 0x2, 0x2}]}]}, 0xa0}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$nl_xfrm(r2, &(0x7f0000000480)={0x0, 0x2500, &(0x7f0000000440)={&(0x7f0000000000)=ANY=[@ANYBLOB="6501000014"], 0x188}}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x45, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x3, 0xd, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000000000000000000000851000000100000095000000000000001800000020646c2500000000002020207b1af8ff00000000bd21ffff0000000007010000f8ffffffb502020008040000b70300000000000085000000a400000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 931.397722ms ago: executing program 8 (id=6530): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x4) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f0850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0), 0x602, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000040)="93d90400000300", 0x7}], 0x1) chroot(&(0x7f0000000000)='./file0/../file0\x00') mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x8) syz_clone(0x2a801400, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0) 929.651702ms ago: executing program 3 (id=6570): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES64=0x0], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r0}, 0x18) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000240)='sys_enter\x00', r1, 0x0, 0x82}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x48) socket$nl_generic(0x10, 0x3, 0x10) mount_setattr(0xffffffffffffffff, 0x0, 0x9800, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffbffffc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='kfree\x00', r3}, 0x18) rseq(&(0x7f00000004c0), 0x20, 0x0, 0x0) fsetxattr$security_ima(r2, &(0x7f0000000080), &(0x7f00000000c0)=@md5={0x1, "77a4a4089d87d1e3f22f341bbe45ceec"}, 0x11, 0x2) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000280)={'batadv0\x00', 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@getchain={0x24, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x0, 0x9}, {0xfff1}, {0x8}}}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 915.148593ms ago: executing program 0 (id=6571): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x3, &(0x7f0000000580)=@framed={{0x18, 0x5}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) creat(&(0x7f00000000c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) write$P9_RVERSION(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r2 = dup(r1) write$P9_RLERRORu(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kfree\x00', r3}, 0x10) fsopen(&(0x7f0000000200)='sysv\x00', 0x1) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) creat(&(0x7f0000000380)='./file0\x00', 0x80) 867.877402ms ago: executing program 0 (id=6572): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x14, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r0, 0x0, 0x10000000000ac6}, 0x18) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000020000eaff00000085000000ae000000951702c4e909b2d05d"], &(0x7f0000001b80)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe, @void, @value}, 0x90) syz_emit_ethernet(0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c2000001a21428e0c08586dd61bcc1d700006cff0000000000000000000000000000000100000000000000004400000000000001"], 0x0) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000480)=""/201, 0xc9}], 0x1) connect$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f00000035c0)=[{&(0x7f0000000240)="60dbc0", 0x3}], 0x1}}], 0x1, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x9, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b704000008000000850000009500000095"], 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0xf, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x50, '\x00', 0x0, @fallback=0xf4f586403af258b6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141041, 0x12) r4 = memfd_create(&(0x7f0000000b80)='\xdd#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\xf9\xff\xff\xff\x00\x17?$^\xe1Ob\xe1Y\x03\x00\x00\x00\x00\x00\x00\x00\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\xdc\xaa<\x96\xedE>{\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9\x87\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T[\xb7\xa4\xb0\bk&\xede\x8b\xc2\xb2\xcd\xef\xcf\x0fE\xc5\x86]\xc0]}\xdd^\xf6&\x16>c\x9d\x9c\xc9\x01\x04\x00\x00\xe9h\xbd\x10p\x8f\x14\x1f2\"\x1b;\xfda\x19\x8bo^\x96\x9a~Q\xce\x95\x02\xb8e\xbbG\xb0V[\xfe\x80\x94$y\x8a\\@\xa9^\x95!IJ\xcf\xf7\xafoX/qG\x97ITp\x01\xae\f\"n;%\xecT\xf6\xb6\xbf;\xde\xec\xb4z\xaa\xd9%\xa5;wy~\xcb\x9a\xd7\r\xe2\xcd\xf0C\x16\xbf0\x89\xb4\xf5\x86\xf3\x99\x9bq\xd3\x15\xe1:\x86\xe4\x14\x805K\xcf\xf6\xda\xd1A>\xf4r>\xfdyAH\x0f\x00'/426, 0x0) fsetxattr$security_ima(r4, &(0x7f0000000080), 0x0, 0x0, 0x0) fsetxattr$security_ima(r4, &(0x7f0000000000), 0x0, 0x0, 0x1) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r5}, 0x10) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000580)='.\x00', 0x0, 0x80) getdents64(r6, &(0x7f0000000f80)=""/4096, 0x1000) open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5868cccd3c030c51, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, @value=r3}, 0x94) 837.282082ms ago: executing program 8 (id=6573): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="16000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) syz_io_uring_setup(0x7b58, &(0x7f0000000300)={0x0, 0xfffffffd, 0x10100, 0x2}, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) 626.155742ms ago: executing program 0 (id=6574): bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) r1 = syz_io_uring_setup(0x24f5, &(0x7f0000000780)={0x0, 0xc297, 0x10100, 0x3}, &(0x7f0000000100)=0x0, &(0x7f0000000800)=0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000440)={&(0x7f0000000340)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x0, {0x2, 0x0, @multicast1}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000480)="10ab119b497ad23a1c1142ce24b27ffa12477294d5f95fbf8890c08a1c7a02944cf58f9e6725ddafac32a98ed3ec927d19a01a193c99058915996d97a79d6e364c97cd620d3e639b4374dae2de1c616415fbc228c3f6bbaacf237291ea1c763bc9f9405da6d699a83194b49c8848fe72407cbcd06881dbc687e9a9967c4031632fbbb883db18c6b0c40a546715fa886040c2", 0x5d}], 0x100000000000000f}, 0x0, 0x80840, 0x1}) io_uring_enter(r1, 0x11d30, 0x0, 0x0, 0x0, 0x0) 617.140161ms ago: executing program 3 (id=6575): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000000000070200e2f7ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0xe75, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/asound/seq/clients\x00', 0x0, 0x0) close(r1) 592.494952ms ago: executing program 0 (id=6576): r0 = fsopen(&(0x7f0000000080)='sysfs\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x3, 0x0, 0x0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) r1 = getpid() get_mempolicy(0x0, 0x0, 0x2, &(0x7f0000016000/0x3000)=nil, 0x7) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)=0x0) unshare(0x6020400) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000200)=[{&(0x7f0000000080)="7cd1f233f595", 0x6}], 0x1, 0xc) setreuid(0xee00, 0x0) r5 = syz_pidfd_open(r1, 0x0) setns(r5, 0x24020000) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=r3, @ANYRES32=r6, @ANYRESDEC=r5], 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0xfffffffffffffdac, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mq_open(&(0x7f0000001140)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xd3\xa7\xd8J\xfd\x94#KT\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\x88N\xb8\xde\xeb)\xcd\xc56m\n\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88|0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc\x02\xea\x91\xe8\xd8\x01YZy\xe6!\x89\x9c\xd1\xa6\x167\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1[\x84\x10aF\x9b\xda\xeb\xc4*\x02q\xb2\x92\x00\x8cv\xac AN\xb9\xaa\xe0\x9d\x97Te\x81\x98L\xfe\x97+u\xd3^\xb1\xf0\xe0\x1f\xbd\a\xbb\xe5\x18\x9ds\x12ha\x00\xeb\x84\x99\xc6\x0f\xf1\xd5LD\xa87\xa0DQ\x8a2\x16!8,\xbc%$\xf1\xf2\xd6\x9cy\xecK\xda\xc5\xdc\xfa\xdd\xf6\b\xc6\xb4\x14\x16\x9c\x7f\x92\x85\xb0\xa2%:\xf0\xf4\x150\x0f\xb4\xa6d\xb4\xe4L\x19W\xd5\x90\xf7l\x1b\xfe\xde\vh\x97=m\x82.\xac\vh\xfe\x84Q}\x838/\x83\xebP\xbe\xd6+:\xceE\\\x95\xd4\xac\x92\x87\xd7\x98\x97\xe3\xec\xad\xd5\xac\x80C\x84R\x88r^g\xbaQ(\x9a>\xe2\xba\xa8=\x17\f04\x8f\x1f\xf2\x88*@v\xe7\xd1\xee\xb3\xc2\x8dT\xda\x81g\xd9\x1a:hzW6s)x\x06\xae\x11\xf2\x1e\xcd\v\xe5L\x19\x96s\xbc\x9e\xf4\x10$\r\xa4\xd8\xa2\xa2\xfcM\xc5R3~$\xc0\xa5n\x9a W\xb1e\xcc<$\xdf\x15\f]\x15\xf5#G\xce\xaf\x88U\xfa\x80\xf24\xf6\xb5\xef\xe2z\xcf\x9eN\x92\xac\x81{\xe6\xbd\xd7\x16\xe6F\xe2\x9e\x91%\x94\v\xb9\xdc\xd6\x87\x8f\xcd\xc1\xb05\x81\x81\xf8\xe9X\xe8Kt9@\xf4\xe1\xa6=\xc9\xe1:p4\nP[f\x1d\xfd\xfa\x839\x8d\x0e\xd1\xf9\xa0\xd2^E\xe5\xedo.\xaa\xf2\xb4\xcdn\x14\f\xcd\x83_yk\xda\xc5\x89\xf0Z\xea\x1d\xbd\xc00\v\xa3\xb3\xbe\xe6\x8b\x18/\xa8\xaaY\xf2\x89\x0f\x9enOOr\x00\xb2\x01\x1f:Z\xb8\xee;\xe3;\x8aPV\xce\xee\xf8[\x16\n\xe6:z\xb8\x1dvk\a{\xc1\x14\xd9+\xdb\t\x11\x90y\xe8\\\xe6\xfc\xca\xb4\xcbC\xd6\xd0\xbeC\xce\xc0L\xdb\xcd\xb3\x907c\xb4\xa6\xce\xdb[\xce\x122N\xa3\xc7Q<\x1a\xa5\xb3)\xc5\x98\x84\x8a\x82\x19\xb0\t\xac\x10\\\x8c\xbe\xcb\raIYe[\xa8\xc4\xac\x0e\xbb\x0f\b^\xdag\xe2\xa9\"\xf5h\'\xcf\xd9\x1b\xef\xe3\xe7y\x82\x1e\xca\x7f\x02 \xcf\x9e\xe0\xd9TM\xb9\n\xa9\xad3\x91\xa5\xe6!\xcd\xa2\xa4\x14\x12\xf9\xbf\xa8b\xcec:\xd7\'\f\f\x957\xc9}\r\xa6\xaa\x0f\xca\x96\xeb', 0x42, 0x40, 0x0) fallocate(r6, 0x0, 0x100000000, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) syz_clone3(&(0x7f00000008c0)={0x15340180, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r1], 0x1}, 0x58) r8 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg$inet(r8, &(0x7f0000005b40)=[{{&(0x7f0000000000)={0x2, 0x4e20, @multicast2}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000040)="f37481d90eeaead391345b4da9d27e24c9c670da3afc5c00"/50, 0x32}, {&(0x7f0000000140)="ead5e96719a44591801f33", 0xb}, {&(0x7f0000000180)="f3f97053495b072215aee864193557c0dabdd253711d5ed9b131c5abd8796e5759ab1f639211e68e24bf4471b6ab1429b165c7248cded82bfb4a3f48e8d0", 0x3e}], 0x3, &(0x7f0000000240)=ANY=[], 0x50}}, {{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000380)="c1ad061c5d914eadd95de7fb63eb7b0306d91c25f3fba6c97eda8ade2420dfe1fe0f5c7a01d724be33a44f1cd52028110d8f7dd4b3421a3fe4b2066d179f938ba15c3956e1aaad35035bcde7b90ed59ee2de06c8a4af3de95bda", 0x5a}], 0x1}}, {{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000000480)="f41fa963edcd5e2a5d", 0x9}, {&(0x7f00000004c0)="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", 0x4c6}], 0x2}}, {{0x0, 0x0, &(0x7f0000004240)=[{&(0x7f0000003140)="01", 0x1}], 0x1}}], 0x4, 0xc080) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$inet6(0xa, 0x1, 0x0) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r9, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="6000000002060103000000000000000000000004050001000700000013000300686173683a6e65742c696661636500000900020073797a30000000000500040000000000050005000a000000140007800500150000000000080012"], 0x60}}, 0x0) 521.706742ms ago: executing program 3 (id=6577): openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x42000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000840)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="0a00000004000000fd0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000020b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='sys_enter\x00', r1}, 0x10) munlock(&(0x7f0000e4a000/0x1000)=nil, 0x1000) 486.564791ms ago: executing program 3 (id=6578): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="16000000000000000400"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) syz_io_uring_setup(0x7b58, &(0x7f0000000300)={0x0, 0xfffffffd, 0x10100, 0x2}, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) 208.830061ms ago: executing program 7 (id=6538): socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_bp={0x0, 0x2}, 0x11c2cf, 0x2, 0x6, 0x5, 0x3, 0x0, 0x4, 0x0, 0x1, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) pread64(r0, &(0x7f0000000100)=""/199, 0xc7, 0x5) lseek(r0, 0x37, 0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000), 0x1000002, 0x0) r2 = dup(r1) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000380)=0x19) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000140)=0x2) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8000fffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@initdev, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) lsetxattr$security_capability(&(0x7f0000000540)='./bus\x00', &(0x7f0000000580), &(0x7f0000000700)=@v3={0x3000000, [{0x200, 0x5}, {0xa}], r4}, 0x18, 0x2) clock_gettime(0x7, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) epoll_wait(0xffffffffffffffff, &(0x7f0000000180)=[{}], 0x1, 0x0) creat(&(0x7f0000000500)='./bus\x00', 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="c3a092257d003299000000", @ANYRES32, @ANYBLOB="0500"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="01000000040000000200"/28], 0x50) dup3(r1, r2, 0x80000) 170.791001ms ago: executing program 7 (id=6579): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = dup2(r0, r0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) lsm_set_self_attr(0x65, &(0x7f0000003bc0)={0x66, 0xa50d, 0x20}, 0x20, 0x0) 109.60384ms ago: executing program 7 (id=6580): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000240)={'wg0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYRES32=r1], 0x24}}, 0x0) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x6000, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=@migrate={0xa0, 0x21, 0x801, 0x70bd27, 0x25dfdbfe, {{@in6=@private1, @in=@dev={0xac, 0x14, 0x14, 0x24}, 0x4e21, 0x1200, 0x4e24, 0x4, 0xa, 0x20, 0x20, 0x84, r1}, 0x6e6bbf, 0x6}, [@migrate={0x50, 0x11, [{@in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in6=@private1, @in6=@loopback, @in=@loopback, 0xff, 0x3, 0x0, 0x3500, 0x2, 0x2}]}]}, 0xa0}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$nl_xfrm(r2, &(0x7f0000000480)={0x0, 0x2500, &(0x7f0000000440)={&(0x7f0000000000)=ANY=[@ANYBLOB="6501000014"], 0x188}}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x45, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x3, 0xd, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000000000000000000000851000000100000095000000000000001800000020646c2500000000002020207b1af8ff00000000bd21ffff0000000007010000f8ffffffb502020008040000b70300000000000085000000a400000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 47.00127ms ago: executing program 7 (id=6581): bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x2, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) syz_emit_ethernet(0x85, &(0x7f0000000180)={@multicast, @local, @void, {@llc={0x4, {@snap={0xaa, 0xaa, '=T', "e32935", 0x800, "2da39e65a397ea9d5a4a20a6d66a25b867d61d127f0316c69fe30a3c284e141e01991a238ea727636420fe755688577cd590acf7e82d05e32c7393169ddf3ecd69f0b662ff4d1ec1e6bfd98a8316333f72fd0ca60022ee801ff0cf511c97ee8f40f5668b8373fde1dc284affe366"}}}}}, &(0x7f0000000040)={0x1, 0x2, [0x251, 0x7f2, 0xbfc, 0x990]}) 29.31341ms ago: executing program 7 (id=6582): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x4) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f0850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0), 0x602, 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000040)="93d90400000300", 0x7}], 0x1) chroot(&(0x7f0000000000)='./file0/../file0\x00') mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x8) syz_clone(0x2a801400, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0) 0s ago: executing program 7 (id=6583): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x14, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r0, 0x0, 0x10000000000ac6}, 0x18) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000020000eaff00000085000000ae000000951702c4e909b2d05d"], &(0x7f0000001b80)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe, @void, @value}, 0x90) syz_emit_ethernet(0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="0180c2000001a21428e0c08586dd61bcc1d700006cff0000000000000000000000000000000100000000000000004400000000000001"], 0x0) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) bind$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000480)=""/201, 0xc9}], 0x1) connect$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f00000035c0)=[{&(0x7f0000000240)="60dbc0", 0x3}], 0x1}}], 0x1, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x9, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b704000008000000850000009500000095"], 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0xf, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x50, '\x00', 0x0, @fallback=0xf4f586403af258b6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = open(&(0x7f0000000080)='./bus\x00', 0x400141041, 0x12) r4 = memfd_create(&(0x7f0000000b80)='\xdd#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x01\x00\xf9\xff\xff\xff\x00\x17?$^\xe1Ob\xe1Y\x03\x00\x00\x00\x00\x00\x00\x00\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\xdc\xaa<\x96\xedE>{\x05\x00\x00\x00\x15\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd\x9eS\x80\xcb\x14G\xfa\xff\xff\xff\xff\xff\xff\xff\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9\x87\xb6^r\xd4\xb5X\\\xdbD\n\x03G\x00\x04\x00\x00\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T[\xb7\xa4\xb0\bk&\xede\x8b\xc2\xb2\xcd\xef\xcf\x0fE\xc5\x86]\xc0]}\xdd^\xf6&\x16>c\x9d\x9c\xc9\x01\x04\x00\x00\xe9h\xbd\x10p\x8f\x14\x1f2\"\x1b;\xfda\x19\x8bo^\x96\x9a~Q\xce\x95\x02\xb8e\xbbG\xb0V[\xfe\x80\x94$y\x8a\\@\xa9^\x95!IJ\xcf\xf7\xafoX/qG\x97ITp\x01\xae\f\"n;%\xecT\xf6\xb6\xbf;\xde\xec\xb4z\xaa\xd9%\xa5;wy~\xcb\x9a\xd7\r\xe2\xcd\xf0C\x16\xbf0\x89\xb4\xf5\x86\xf3\x99\x9bq\xd3\x15\xe1:\x86\xe4\x14\x805K\xcf\xf6\xda\xd1A>\xf4r>\xfdyAH\x0f\x00'/426, 0x0) fsetxattr$security_ima(r4, &(0x7f0000000080), 0x0, 0x0, 0x0) fsetxattr$security_ima(r4, &(0x7f0000000000), 0x0, 0x0, 0x1) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r5}, 0x10) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000580)='.\x00', 0x0, 0x80) getdents64(r6, &(0x7f0000000f80)=""/4096, 0x1000) open(&(0x7f0000000040)='./file2\x00', 0x181042, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5868cccd3c030c51, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, @value=r3}, 0x94) kernel console output (not intermixed with test programs): 3.522612][T21809] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 403.522698][T21809] RSP: 002b:00007f7c7e497030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 403.522715][T21809] RAX: ffffffffffffffda RBX: 00007f7c80045fa0 RCX: 00007f7c7fe2bb7c [ 403.522725][T21809] RDX: 000000000000000f RSI: 00007f7c7e4970a0 RDI: 0000000000000003 [ 403.522735][T21809] RBP: 00007f7c7e497090 R08: 0000000000000000 R09: 0000000000000000 [ 403.522746][T21809] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 403.522756][T21809] R13: 0000000000000000 R14: 00007f7c80045fa0 R15: 00007fff42a1d088 [ 403.522834][T21809] [ 403.744250][T21814] syz.0.5804: attempt to access beyond end of device [ 403.744250][T21814] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 403.910768][T21830] FAULT_INJECTION: forcing a failure. [ 403.910768][T21830] name failslab, interval 1, probability 0, space 0, times 0 [ 403.923550][T21830] CPU: 1 UID: 0 PID: 21830 Comm: syz.5.5811 Not tainted 6.14.0-rc4-syzkaller-00278-gece144f151ac #0 [ 403.923581][T21830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 403.923595][T21830] Call Trace: [ 403.923603][T21830] [ 403.923610][T21830] dump_stack_lvl+0xf2/0x150 [ 403.923645][T21830] dump_stack+0x15/0x1a [ 403.923667][T21830] should_fail_ex+0x24a/0x260 [ 403.923769][T21830] should_failslab+0x8f/0xb0 [ 403.923886][T21830] kmem_cache_alloc_noprof+0x52/0x320 [ 403.923914][T21830] ? getname_flags+0x81/0x3b0 [ 403.923958][T21830] getname_flags+0x81/0x3b0 [ 403.924000][T21830] __x64_sys_mkdirat+0x41/0x60 [ 403.924077][T21830] x64_sys_call+0x1b6f/0x2dc0 [ 403.924110][T21830] do_syscall_64+0xc9/0x1c0 [ 403.924148][T21830] ? clear_bhb_loop+0x55/0xb0 [ 403.924181][T21830] ? clear_bhb_loop+0x55/0xb0 [ 403.924240][T21830] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 403.924274][T21830] RIP: 0033:0x7f8069bab9d7 [ 403.924292][T21830] Code: 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 403.924314][T21830] RSP: 002b:00007f8068216e68 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 403.924336][T21830] RAX: ffffffffffffffda RBX: 00007f8068216ef0 RCX: 00007f8069bab9d7 [ 403.924351][T21830] RDX: 00000000000001ff RSI: 0000400000000040 RDI: 00000000ffffff9c [ 403.924423][T21830] RBP: 0000400000000000 R08: 0000400000000000 R09: 0000000000000000 [ 403.924438][T21830] R10: 0000400000000000 R11: 0000000000000246 R12: 0000400000000040 [ 403.924453][T21830] R13: 00007f8068216eb0 R14: 0000000000000000 R15: 0000000000000000 [ 403.924476][T21830] [ 403.993189][T21836] netlink: 'syz.0.5813': attribute type 10 has an invalid length. [ 403.997315][ T3373] usb usb10-port1: unable to enumerate USB device [ 404.144318][T21841] FAULT_INJECTION: forcing a failure. [ 404.144318][T21841] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 404.157444][T21841] CPU: 1 UID: 0 PID: 21841 Comm: syz.8.5815 Not tainted 6.14.0-rc4-syzkaller-00278-gece144f151ac #0 [ 404.157502][T21841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 404.157517][T21841] Call Trace: [ 404.157525][T21841] [ 404.157534][T21841] dump_stack_lvl+0xf2/0x150 [ 404.157565][T21841] dump_stack+0x15/0x1a [ 404.157597][T21841] should_fail_ex+0x24a/0x260 [ 404.157660][T21841] should_fail+0xb/0x10 [ 404.157690][T21841] should_fail_usercopy+0x1a/0x20 [ 404.157729][T21841] _copy_from_user+0x1c/0xa0 [ 404.157747][T21841] __sys_bpf+0x14e/0x7a0 [ 404.157788][T21841] __x64_sys_bpf+0x43/0x50 [ 404.157820][T21841] x64_sys_call+0x2914/0x2dc0 [ 404.157923][T21841] do_syscall_64+0xc9/0x1c0 [ 404.157999][T21841] ? clear_bhb_loop+0x55/0xb0 [ 404.158032][T21841] ? clear_bhb_loop+0x55/0xb0 [ 404.158066][T21841] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 404.158173][T21841] RIP: 0033:0x7fb45984d169 [ 404.158189][T21841] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 404.158211][T21841] RSP: 002b:00007fb457eb1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 404.158234][T21841] RAX: ffffffffffffffda RBX: 00007fb459a65fa0 RCX: 00007fb45984d169 [ 404.158248][T21841] RDX: 0000000000000001 RSI: 0000400000000040 RDI: 000000000000001e [ 404.158311][T21841] RBP: 00007fb457eb1090 R08: 0000000000000000 R09: 0000000000000000 [ 404.158326][T21841] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 404.158341][T21841] R13: 0000000000000001 R14: 00007fb459a65fa0 R15: 00007fffc4f38508 [ 404.158370][T21841] [ 404.160986][T21840] wireguard1: entered promiscuous mode [ 404.258228][T21847] netlink: 48 bytes leftover after parsing attributes in process `syz.4.5818'. [ 404.273493][T21840] wireguard1: entered allmulticast mode [ 404.576973][T21879] netlink: 'syz.0.5829': attribute type 13 has an invalid length. [ 404.590042][T21870] netlink: 4 bytes leftover after parsing attributes in process `syz.5.5826'. [ 404.599815][T21879] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 404.704123][T21889] loop0: detected capacity change from 0 to 1024 [ 404.719798][T21889] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 404.890413][T21889] netlink: 28 bytes leftover after parsing attributes in process `syz.0.5833'. [ 404.899563][T21889] tipc: Started in network mode [ 404.904484][T21889] tipc: Node identity e008fc07, cluster identity 5 [ 404.911090][T21889] tipc: Node number set to 3758685191 [ 404.919125][ T29] kauditd_printk_skb: 148 callbacks suppressed [ 404.919142][ T29] audit: type=1400 audit(1740908349.182:14909): avc: denied { setattr } for pid=21888 comm="syz.0.5833" name="file0" dev="loop0" ino=12 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 405.000723][T17174] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 405.550548][T21919] netlink: 'syz.8.5843': attribute type 13 has an invalid length. [ 405.567499][ T29] audit: type=1326 audit(1740908349.812:14910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21916 comm="syz.5.5842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8069bad169 code=0x7ffc0000 [ 405.591102][ T29] audit: type=1326 audit(1740908349.812:14911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21916 comm="syz.5.5842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8069bad169 code=0x7ffc0000 [ 405.591140][ T29] audit: type=1326 audit(1740908349.812:14912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21916 comm="syz.5.5842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8069bad169 code=0x7ffc0000 [ 405.638416][ T29] audit: type=1326 audit(1740908349.812:14913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21916 comm="syz.5.5842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat=0 ip=0x7f8069bad169 code=0x7ffc0000 [ 405.662114][ T29] audit: type=1326 audit(1740908349.812:14914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21916 comm="syz.5.5842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8069bad169 code=0x7ffc0000 [ 405.685970][ T29] audit: type=1326 audit(1740908349.822:14915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21916 comm="syz.5.5842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=224 compat=0 ip=0x7f8069bad169 code=0x7ffc0000 [ 405.709653][ T29] audit: type=1326 audit(1740908349.822:14916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21916 comm="syz.5.5842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8069bad169 code=0x7ffc0000 [ 405.734056][T21919] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 405.736566][ T29] audit: type=1326 audit(1740908349.902:14917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21914 comm="syz.0.5841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7c7fe2d169 code=0x7ffc0000 [ 405.773212][ T29] audit: type=1326 audit(1740908349.902:14918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21914 comm="syz.0.5841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=103 compat=0 ip=0x7f7c7fe2d169 code=0x7ffc0000 [ 405.797584][T21921] loop0: detected capacity change from 0 to 1024 [ 405.901747][T21921] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 405.936121][T21933] netlink: 48 bytes leftover after parsing attributes in process `syz.1.5848'. [ 405.957186][T21938] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21938 comm=syz.5.5850 [ 405.983511][T21933] vlan3: entered allmulticast mode [ 406.450465][T17174] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 406.573664][T21944] netlink: 28 bytes leftover after parsing attributes in process `syz.5.5851'. [ 406.582796][T21944] tipc: Started in network mode [ 406.587821][T21944] tipc: Node identity e008fc07, cluster identity 5 [ 406.594330][T21944] tipc: Node number set to 3758685191 [ 406.628822][T21959] netlink: 'syz.4.5857': attribute type 13 has an invalid length. [ 406.646101][T21959] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 406.746611][T21966] 9p: Unknown Cache mode or invalid value m [ 406.899754][T21976] 9p: Unknown Cache mode or invalid value m [ 406.956296][T21971] FAULT_INJECTION: forcing a failure. [ 406.956296][T21971] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 406.969460][T21971] CPU: 1 UID: 0 PID: 21971 Comm: syz.1.5863 Not tainted 6.14.0-rc4-syzkaller-00278-gece144f151ac #0 [ 406.969489][T21971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 406.969501][T21971] Call Trace: [ 406.969508][T21971] [ 406.969516][T21971] dump_stack_lvl+0xf2/0x150 [ 406.969550][T21971] dump_stack+0x15/0x1a [ 406.969650][T21971] should_fail_ex+0x24a/0x260 [ 406.969726][T21971] should_fail+0xb/0x10 [ 406.969752][T21971] should_fail_usercopy+0x1a/0x20 [ 406.969793][T21971] _copy_from_user+0x1c/0xa0 [ 406.969812][T21971] copy_msghdr_from_user+0x54/0x2a0 [ 406.969877][T21971] ? __fget_files+0x17c/0x1c0 [ 406.969916][T21971] __sys_sendmsg+0x13e/0x230 [ 406.969956][T21971] __x64_sys_sendmsg+0x46/0x50 [ 406.970044][T21971] x64_sys_call+0x2734/0x2dc0 [ 406.970073][T21971] do_syscall_64+0xc9/0x1c0 [ 406.970142][T21971] ? clear_bhb_loop+0x55/0xb0 [ 406.970250][T21971] ? clear_bhb_loop+0x55/0xb0 [ 406.970328][T21971] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 406.970356][T21971] RIP: 0033:0x7ff0c08bd169 [ 406.970371][T21971] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 406.970390][T21971] RSP: 002b:00007ff0bef27038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 406.970437][T21971] RAX: ffffffffffffffda RBX: 00007ff0c0ad5fa0 RCX: 00007ff0c08bd169 [ 406.970451][T21971] RDX: 0000000020000000 RSI: 0000400000000140 RDI: 0000000000000005 [ 406.970486][T21971] RBP: 00007ff0bef27090 R08: 0000000000000000 R09: 0000000000000000 [ 406.970500][T21971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 406.970533][T21971] R13: 0000000000000000 R14: 00007ff0c0ad5fa0 R15: 00007ffefc54cb68 [ 406.970551][T21971] [ 407.739508][T22006] wg2: entered promiscuous mode [ 407.744433][T22006] wg2: entered allmulticast mode [ 407.965082][T22015] 9p: Unknown Cache mode or invalid value m [ 408.125235][T22029] futex_wake_op: syz.5.5883 tries to shift op by -1; fix this program [ 408.374840][T22058] 9p: Unknown Cache mode or invalid value m [ 408.390776][T22060] loop8: detected capacity change from 0 to 512 [ 408.397797][T22060] EXT4-fs (loop8): ext4_check_descriptors: Checksum for group 0 failed (17031!=33349) [ 408.409412][T22060] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=8842e02c, mo2=0002] [ 408.417554][T22060] EXT4-fs (loop8): orphan cleanup on readonly fs [ 408.424550][T22060] EXT4-fs error (device loop8): ext4_clear_blocks:876: inode #11: comm +}[@: attempt to clear invalid blocks 1024 len 1 [ 408.460654][T22060] EXT4-fs (loop8): Remounting filesystem read-only [ 408.470664][T22060] EXT4-fs (loop8): 1 truncate cleaned up [ 408.485002][T22066] xt_l2tp: v2 tid > 0xffff: 150994944 [ 408.500621][T22060] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000007 ro without journal. Quota mode: none. [ 408.522622][T22060] SELinux: (dev loop8, type ext4) getxattr errno 5 [ 408.532377][T22060] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000007. [ 408.532829][T22071] netlink: 48 bytes leftover after parsing attributes in process `syz.4.5898'. [ 408.557978][T22071] vlan1: entered allmulticast mode [ 409.209724][T22087] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 409.227725][T22087] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 409.267607][T22095] 9p: Unknown Cache mode or invalid value m [ 409.285267][T22093] netlink: 'syz.5.5906': attribute type 10 has an invalid length. [ 409.478561][T22103] netlink: 'syz.8.5910': attribute type 13 has an invalid length. [ 409.492275][T22103] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 409.632590][T22101] FAULT_INJECTION: forcing a failure. [ 409.632590][T22101] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 409.645871][T22101] CPU: 1 UID: 0 PID: 22101 Comm: syz.4.5909 Not tainted 6.14.0-rc4-syzkaller-00278-gece144f151ac #0 [ 409.645936][T22101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 409.645952][T22101] Call Trace: [ 409.645961][T22101] [ 409.645971][T22101] dump_stack_lvl+0xf2/0x150 [ 409.645999][T22101] dump_stack+0x15/0x1a [ 409.646021][T22101] should_fail_ex+0x24a/0x260 [ 409.646071][T22101] should_fail+0xb/0x10 [ 409.646110][T22101] should_fail_usercopy+0x1a/0x20 [ 409.646178][T22101] _copy_from_user+0x1c/0xa0 [ 409.646196][T22101] copy_msghdr_from_user+0x54/0x2a0 [ 409.646367][T22101] ? __fget_files+0x17c/0x1c0 [ 409.646430][T22101] __sys_sendmsg+0x13e/0x230 [ 409.646497][T22101] __x64_sys_sendmsg+0x46/0x50 [ 409.646523][T22101] x64_sys_call+0x2734/0x2dc0 [ 409.646553][T22101] do_syscall_64+0xc9/0x1c0 [ 409.646586][T22101] ? clear_bhb_loop+0x55/0xb0 [ 409.646615][T22101] ? clear_bhb_loop+0x55/0xb0 [ 409.646744][T22101] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 409.646774][T22101] RIP: 0033:0x7fae91d2d169 [ 409.646790][T22101] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 409.646810][T22101] RSP: 002b:00007fae90376038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 409.646997][T22101] RAX: ffffffffffffffda RBX: 00007fae91f46080 RCX: 00007fae91d2d169 [ 409.647011][T22101] RDX: 0000000000000040 RSI: 00004000000004c0 RDI: 0000000000000008 [ 409.647025][T22101] RBP: 00007fae90376090 R08: 0000000000000000 R09: 0000000000000000 [ 409.647046][T22101] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 409.647059][T22101] R13: 0000000000000000 R14: 00007fae91f46080 R15: 00007ffdf6379458 [ 409.647085][T22101] [ 409.986626][T22125] netlink: 48 bytes leftover after parsing attributes in process `syz.5.5919'. [ 409.986819][T22124] 9p: Unknown Cache mode or invalid value m [ 410.005373][T22125] vlan3: entered allmulticast mode [ 410.010575][T22125] bridge_slave_0: entered allmulticast mode [ 410.017557][T22125] bridge_slave_0: left allmulticast mode [ 410.066987][T22129] wg2: entered promiscuous mode [ 410.071959][T22129] wg2: entered allmulticast mode [ 410.137067][T22134] netlink: 'syz.8.5922': attribute type 10 has an invalid length. [ 410.243373][T22143] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 410.251954][T22143] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 410.274783][ T29] kauditd_printk_skb: 225 callbacks suppressed [ 410.274826][ T29] audit: type=1326 audit(1740908354.532:15144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22140 comm="syz.4.5925" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fae91d2d169 code=0x7ffc0000 [ 410.317630][ T29] audit: type=1326 audit(1740908354.562:15145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22140 comm="syz.4.5925" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fae91d2d169 code=0x7ffc0000 [ 410.341438][ T29] audit: type=1326 audit(1740908354.562:15146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22140 comm="syz.4.5925" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fae91d2d169 code=0x7ffc0000 [ 410.365268][ T29] audit: type=1326 audit(1740908354.562:15147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22140 comm="syz.4.5925" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fae91d2d169 code=0x7ffc0000 [ 410.388892][ T29] audit: type=1326 audit(1740908354.562:15148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22140 comm="syz.4.5925" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fae91d2d169 code=0x7ffc0000 [ 410.412600][ T29] audit: type=1326 audit(1740908354.562:15149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22140 comm="syz.4.5925" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fae91d2d169 code=0x7ffc0000 [ 410.436241][ T29] audit: type=1326 audit(1740908354.562:15150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22140 comm="syz.4.5925" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fae91d2d169 code=0x7ffc0000 [ 410.459975][ T29] audit: type=1326 audit(1740908354.572:15151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22140 comm="syz.4.5925" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fae91d2d169 code=0x7ffc0000 [ 410.483586][ T29] audit: type=1326 audit(1740908354.572:15152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22140 comm="syz.4.5925" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fae91d2d169 code=0x7ffc0000 [ 410.507214][ T29] audit: type=1326 audit(1740908354.572:15153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22140 comm="syz.4.5925" exe="/root/syz-executor" sig=0 arch=c000003e syscall=217 compat=0 ip=0x7fae91d2d169 code=0x7ffc0000 [ 410.579140][T22154] block device autoloading is deprecated and will be removed. [ 410.587019][T22154] syz.8.5931: attempt to access beyond end of device [ 410.587019][T22154] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 410.624458][T22157] wg2: entered promiscuous mode [ 410.629405][T22157] wg2: entered allmulticast mode [ 411.020885][T22195] netlink: 48 bytes leftover after parsing attributes in process `syz.4.5949'. [ 411.041173][T22195] vlan1: entered allmulticast mode [ 411.069966][T22201] wireguard2: entered promiscuous mode [ 411.075551][T22201] wireguard2: entered allmulticast mode [ 411.280534][T22213] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 411.289234][T22213] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 411.803062][T22222] vlan3: entered allmulticast mode [ 412.027232][T22232] loop0: detected capacity change from 0 to 512 [ 412.079507][T22232] EXT4-fs error (device loop0): ext4_validate_block_bitmap:432: comm syz.0.5958: bg 0: block 5: invalid block bitmap [ 412.094639][T22232] EXT4-fs error (device loop0) in ext4_mb_clear_bb:6550: Corrupt filesystem [ 412.104082][T22232] EXT4-fs error (device loop0): ext4_free_branches:1023: inode #11: comm syz.0.5958: invalid indirect mapped block 3 (level 2) [ 412.118116][T22232] EXT4-fs (loop0): 1 orphan inode deleted [ 412.123873][T22232] EXT4-fs (loop0): 1 truncate cleaned up [ 412.130605][T22232] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 412.450119][T22241] FAULT_INJECTION: forcing a failure. [ 412.450119][T22241] name failslab, interval 1, probability 0, space 0, times 0 [ 412.462984][T22241] CPU: 1 UID: 0 PID: 22241 Comm: syz.5.5963 Not tainted 6.14.0-rc4-syzkaller-00278-gece144f151ac #0 [ 412.463035][T22241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 412.463050][T22241] Call Trace: [ 412.463056][T22241] [ 412.463064][T22241] dump_stack_lvl+0xf2/0x150 [ 412.463092][T22241] dump_stack+0x15/0x1a [ 412.463118][T22241] should_fail_ex+0x24a/0x260 [ 412.463196][T22241] should_failslab+0x8f/0xb0 [ 412.463227][T22241] kmem_cache_alloc_noprof+0x52/0x320 [ 412.463248][T22241] ? audit_log_start+0x34c/0x6b0 [ 412.463305][T22241] audit_log_start+0x34c/0x6b0 [ 412.463373][T22241] audit_seccomp+0x4b/0x130 [ 412.463422][T22241] __seccomp_filter+0x6fa/0x1180 [ 412.463447][T22241] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 412.463481][T22241] ? vfs_write+0x644/0x920 [ 412.463518][T22241] __secure_computing+0x9f/0x1c0 [ 412.463565][T22241] syscall_trace_enter+0xd1/0x1f0 [ 412.463636][T22241] ? fpregs_assert_state_consistent+0x83/0xa0 [ 412.463664][T22241] do_syscall_64+0xaa/0x1c0 [ 412.463701][T22241] ? clear_bhb_loop+0x55/0xb0 [ 412.463731][T22241] ? clear_bhb_loop+0x55/0xb0 [ 412.463773][T22241] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 412.463806][T22241] RIP: 0033:0x7f8069bad169 [ 412.463823][T22241] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 412.463859][T22241] RSP: 002b:00007f8068217038 EFLAGS: 00000246 ORIG_RAX: 0000000000000044 [ 412.463882][T22241] RAX: ffffffffffffffda RBX: 00007f8069dc5fa0 RCX: 00007f8069bad169 [ 412.463896][T22241] RDX: 0000000000000000 RSI: 0000000000000790 RDI: 0000000000000000 [ 412.463911][T22241] RBP: 00007f8068217090 R08: 0000000000000000 R09: 0000000000000000 [ 412.463967][T22241] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 412.463979][T22241] R13: 0000000000000000 R14: 00007f8069dc5fa0 R15: 00007ffdfb484b78 [ 412.463997][T22241] [ 412.710452][T22252] netlink: 96 bytes leftover after parsing attributes in process `syz.5.5967'. [ 412.724685][T22252] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 412.734730][T22252] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 412.760375][T17174] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 412.768690][T22256] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 412.779739][T22256] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 412.789616][T22257] netlink: 4 bytes leftover after parsing attributes in process `syz.8.5965'. [ 412.802790][T22259] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22259 comm=syz.4.5969 [ 412.821856][T22259] block device autoloading is deprecated and will be removed. [ 412.831233][T22261] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5968'. [ 412.840824][T22261] netlink: 24 bytes leftover after parsing attributes in process `syz.0.5968'. [ 412.890502][T22263] vlan2: entered allmulticast mode [ 412.895742][T22263] bridge_slave_0: entered allmulticast mode [ 412.905126][T22263] bridge_slave_0: left allmulticast mode [ 413.378702][T22291] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5981'. [ 413.588998][T22316] FAULT_INJECTION: forcing a failure. [ 413.588998][T22316] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 413.602361][T22316] CPU: 0 UID: 0 PID: 22316 Comm: syz.5.5986 Not tainted 6.14.0-rc4-syzkaller-00278-gece144f151ac #0 [ 413.602388][T22316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 413.602400][T22316] Call Trace: [ 413.602407][T22316] [ 413.602415][T22316] dump_stack_lvl+0xf2/0x150 [ 413.602530][T22316] dump_stack+0x15/0x1a [ 413.602553][T22316] should_fail_ex+0x24a/0x260 [ 413.602590][T22316] should_fail_alloc_page+0xfd/0x110 [ 413.602629][T22316] __alloc_frozen_pages_noprof+0x109/0x340 [ 413.602678][T22316] alloc_pages_mpol+0xb4/0x260 [ 413.602702][T22316] folio_alloc_mpol_noprof+0x36/0x80 [ 413.602727][T22316] shmem_get_folio_gfp+0x3d1/0xd90 [ 413.602842][T22316] shmem_write_begin+0xa2/0x180 [ 413.602863][T22316] generic_perform_write+0x1a8/0x4a0 [ 413.602895][T22316] shmem_file_write_iter+0xc2/0xe0 [ 413.602923][T22316] vfs_write+0x77b/0x920 [ 413.602973][T22316] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 413.603010][T22316] ksys_write+0xe8/0x1b0 [ 413.603043][T22316] __x64_sys_write+0x42/0x50 [ 413.603106][T22316] x64_sys_call+0x287e/0x2dc0 [ 413.603132][T22316] do_syscall_64+0xc9/0x1c0 [ 413.603170][T22316] ? clear_bhb_loop+0x55/0xb0 [ 413.603234][T22316] ? clear_bhb_loop+0x55/0xb0 [ 413.603268][T22316] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 413.603309][T22316] RIP: 0033:0x7f8069bad169 [ 413.603324][T22316] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 413.603343][T22316] RSP: 002b:00007f80681f6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 413.603365][T22316] RAX: ffffffffffffffda RBX: 00007f8069dc6080 RCX: 00007f8069bad169 [ 413.603380][T22316] RDX: 000000000208e24b RSI: 0000400000000040 RDI: 0000000000000006 [ 413.603395][T22316] RBP: 00007f80681f6090 R08: 0000000000000000 R09: 0000000000000000 [ 413.603407][T22316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 413.603419][T22316] R13: 0000000000000000 R14: 00007f8069dc6080 R15: 00007ffdfb484b78 [ 413.603481][T22316] [ 413.854244][T22324] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 413.862823][T22324] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 414.393539][T22338] FAULT_INJECTION: forcing a failure. [ 414.393539][T22338] name failslab, interval 1, probability 0, space 0, times 0 [ 414.406261][T22338] CPU: 1 UID: 0 PID: 22338 Comm: syz.5.5996 Not tainted 6.14.0-rc4-syzkaller-00278-gece144f151ac #0 [ 414.406287][T22338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 414.406301][T22338] Call Trace: [ 414.406308][T22338] [ 414.406316][T22338] dump_stack_lvl+0xf2/0x150 [ 414.406349][T22338] dump_stack+0x15/0x1a [ 414.406376][T22338] should_fail_ex+0x24a/0x260 [ 414.406413][T22338] should_failslab+0x8f/0xb0 [ 414.406520][T22338] kmem_cache_alloc_noprof+0x52/0x320 [ 414.406548][T22338] ? audit_log_start+0x34c/0x6b0 [ 414.406586][T22338] audit_log_start+0x34c/0x6b0 [ 414.406617][T22338] audit_seccomp+0x4b/0x130 [ 414.406724][T22338] __seccomp_filter+0x6fa/0x1180 [ 414.406744][T22338] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 414.406770][T22338] ? vfs_write+0x644/0x920 [ 414.406868][T22338] __secure_computing+0x9f/0x1c0 [ 414.406936][T22338] syscall_trace_enter+0xd1/0x1f0 [ 414.406956][T22338] ? fpregs_assert_state_consistent+0x83/0xa0 [ 414.406976][T22338] do_syscall_64+0xaa/0x1c0 [ 414.407056][T22338] ? clear_bhb_loop+0x55/0xb0 [ 414.407079][T22338] ? clear_bhb_loop+0x55/0xb0 [ 414.407113][T22338] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 414.407137][T22338] RIP: 0033:0x7f8069bad169 [ 414.407150][T22338] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 414.407165][T22338] RSP: 002b:00007f8068217038 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 414.407181][T22338] RAX: ffffffffffffffda RBX: 00007f8069dc5fa0 RCX: 00007f8069bad169 [ 414.407192][T22338] RDX: 000000000000ffb5 RSI: 0000400000000040 RDI: 0000000000000003 [ 414.407203][T22338] RBP: 00007f8068217090 R08: 0000000000000000 R09: 0000000000000000 [ 414.407268][T22338] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 414.407279][T22338] R13: 0000000000000000 R14: 00007f8069dc5fa0 R15: 00007ffdfb484b78 [ 414.407293][T22338] [ 414.878108][T22356] FAULT_INJECTION: forcing a failure. [ 414.878108][T22356] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 414.891391][T22356] CPU: 0 UID: 0 PID: 22356 Comm: syz.8.6002 Not tainted 6.14.0-rc4-syzkaller-00278-gece144f151ac #0 [ 414.891418][T22356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 414.891432][T22356] Call Trace: [ 414.891439][T22356] [ 414.891447][T22356] dump_stack_lvl+0xf2/0x150 [ 414.891489][T22356] dump_stack+0x15/0x1a [ 414.891515][T22356] should_fail_ex+0x24a/0x260 [ 414.891552][T22356] should_fail+0xb/0x10 [ 414.891582][T22356] should_fail_usercopy+0x1a/0x20 [ 414.891621][T22356] _copy_from_user+0x1c/0xa0 [ 414.891664][T22356] copy_msghdr_from_user+0x54/0x2a0 [ 414.891718][T22356] ? __fget_files+0x17c/0x1c0 [ 414.891762][T22356] __sys_sendmsg+0x13e/0x230 [ 414.891808][T22356] __x64_sys_sendmsg+0x46/0x50 [ 414.891874][T22356] x64_sys_call+0x2734/0x2dc0 [ 414.891907][T22356] do_syscall_64+0xc9/0x1c0 [ 414.892012][T22356] ? clear_bhb_loop+0x55/0xb0 [ 414.892045][T22356] ? clear_bhb_loop+0x55/0xb0 [ 414.892126][T22356] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 414.892236][T22356] RIP: 0033:0x7fb45984d169 [ 414.892254][T22356] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 414.892273][T22356] RSP: 002b:00007fb457eb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 414.892292][T22356] RAX: ffffffffffffffda RBX: 00007fb459a65fa0 RCX: 00007fb45984d169 [ 414.892304][T22356] RDX: 0000000000000000 RSI: 00004000000002c0 RDI: 0000000000000005 [ 414.892316][T22356] RBP: 00007fb457eb1090 R08: 0000000000000000 R09: 0000000000000000 [ 414.892331][T22356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 414.892346][T22356] R13: 0000000000000000 R14: 00007fb459a65fa0 R15: 00007fffc4f38508 [ 414.892444][T22356] [ 415.074143][T22356] netlink: 16 bytes leftover after parsing attributes in process `syz.8.6002'. [ 415.083244][T22356] netlink: 16 bytes leftover after parsing attributes in process `syz.8.6002'. [ 415.092244][T22356] netlink: 16 bytes leftover after parsing attributes in process `syz.8.6002'. [ 415.104899][T22362] netlink: 16 bytes leftover after parsing attributes in process `syz.0.6005'. [ 415.113981][T22362] netlink: 16 bytes leftover after parsing attributes in process `syz.0.6005'. [ 415.151338][T22360] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=27669 sclass=netlink_xfrm_socket pid=22360 comm=syz.8.6002 [ 415.346887][T22381] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 415.407733][T22381] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 415.937392][ T29] kauditd_printk_skb: 166 callbacks suppressed [ 415.937410][ T29] audit: type=1326 audit(1740908360.192:15316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22392 comm="syz.5.6015" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8069bad169 code=0x7ffc0000 [ 415.967722][ T29] audit: type=1326 audit(1740908360.202:15317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22392 comm="syz.5.6015" exe="/root/syz-executor" sig=0 arch=c000003e syscall=103 compat=0 ip=0x7f8069bad169 code=0x7ffc0000 [ 415.991474][ T29] audit: type=1326 audit(1740908360.202:15318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22392 comm="syz.5.6015" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8069bad169 code=0x7ffc0000 [ 416.015089][ T29] audit: type=1326 audit(1740908360.202:15319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22392 comm="syz.5.6015" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8069bad169 code=0x7ffc0000 [ 416.038654][ T29] audit: type=1326 audit(1740908360.202:15320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22392 comm="syz.5.6015" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8069bad169 code=0x7ffc0000 [ 416.062293][ T29] audit: type=1326 audit(1740908360.202:15321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22392 comm="syz.5.6015" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8069bad169 code=0x7ffc0000 [ 416.097288][ T29] audit: type=1326 audit(1740908360.352:15322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22400 comm="syz.0.6018" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f7c7fe2d169 code=0x0 [ 416.120976][ T29] audit: type=1326 audit(1740908360.382:15323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22392 comm="syz.5.6015" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8069bad169 code=0x7ffc0000 [ 416.175360][T22405] FAULT_INJECTION: forcing a failure. [ 416.175360][T22405] name failslab, interval 1, probability 0, space 0, times 0 [ 416.184553][ T29] audit: type=1326 audit(1740908360.402:15324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22392 comm="syz.5.6015" exe="/root/syz-executor" sig=0 arch=c000003e syscall=2 compat=0 ip=0x7f8069bad169 code=0x7ffc0000 [ 416.188063][T22405] CPU: 1 UID: 0 PID: 22405 Comm: syz.8.6019 Not tainted 6.14.0-rc4-syzkaller-00278-gece144f151ac #0 [ 416.188108][T22405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 416.188126][T22405] Call Trace: [ 416.188135][T22405] [ 416.188194][T22405] dump_stack_lvl+0xf2/0x150 [ 416.188230][T22405] dump_stack+0x15/0x1a [ 416.188258][T22405] should_fail_ex+0x24a/0x260 [ 416.188344][T22405] ? audit_log_d_path+0x8e/0x150 [ 416.188388][T22405] should_failslab+0x8f/0xb0 [ 416.188427][T22405] __kmalloc_cache_noprof+0x4e/0x320 [ 416.188489][T22405] audit_log_d_path+0x8e/0x150 [ 416.188532][T22405] audit_log_d_path_exe+0x42/0x70 [ 416.188627][T22405] audit_log_task+0x1ec/0x250 [ 416.188668][T22405] audit_seccomp+0x68/0x130 [ 416.188706][T22405] __seccomp_filter+0x6fa/0x1180 [ 416.188810][T22405] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 416.188914][T22405] ? vfs_write+0x644/0x920 [ 416.188953][T22405] __secure_computing+0x9f/0x1c0 [ 416.188984][T22405] syscall_trace_enter+0xd1/0x1f0 [ 416.189021][T22405] ? fpregs_assert_state_consistent+0x83/0xa0 [ 416.189050][T22405] do_syscall_64+0xaa/0x1c0 [ 416.189134][T22405] ? clear_bhb_loop+0x55/0xb0 [ 416.189168][T22405] ? clear_bhb_loop+0x55/0xb0 [ 416.189203][T22405] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 416.189238][T22405] RIP: 0033:0x7fb45984d169 [ 416.189322][T22405] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 416.189355][T22405] RSP: 002b:00007fb457eb1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 416.189379][T22405] RAX: ffffffffffffffda RBX: 00007fb459a65fa0 RCX: 00007fb45984d169 [ 416.189395][T22405] RDX: 0000000000043000 RSI: 0000000000000000 RDI: ffffffffffffffff [ 416.189411][T22405] RBP: 00007fb457eb1090 R08: 0000000000000000 R09: 0000000000000000 [ 416.189426][T22405] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 416.189497][T22405] R13: 0000000000000000 R14: 00007fb459a65fa0 R15: 00007fffc4f38508 [ 416.189522][T22405] [ 416.415554][ T29] audit: type=1326 audit(1740908360.402:15325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22392 comm="syz.5.6015" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8069bad169 code=0x7ffc0000 [ 416.660221][T22429] wireguard2: entered promiscuous mode [ 416.665876][T22429] wireguard2: entered allmulticast mode [ 417.030604][T22438] syz.5.6031: attempt to access beyond end of device [ 417.030604][T22438] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 417.077321][T22439] syz.0.6032: attempt to access beyond end of device [ 417.077321][T22439] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 417.221146][T22453] vlan3: entered allmulticast mode [ 417.226405][T22453] bridge_slave_0: entered allmulticast mode [ 417.238515][T22455] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22455 comm=syz.4.6039 [ 417.251203][T22453] bridge_slave_0: left allmulticast mode [ 418.078466][T22509] __nla_validate_parse: 5 callbacks suppressed [ 418.078483][T22509] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6057'. [ 418.124591][T22513] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6058'. [ 418.803933][T22537] netlink: 48 bytes leftover after parsing attributes in process `syz.0.6067'. [ 418.842425][T22537] vlan3: entered allmulticast mode [ 419.052723][T22547] lo speed is unknown, defaulting to 1000 [ 419.062318][T22547] lo speed is unknown, defaulting to 1000 [ 419.070665][T22547] lo speed is unknown, defaulting to 1000 [ 419.077873][T22547] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 419.087443][T22547] lo speed is unknown, defaulting to 1000 [ 419.093599][T22547] lo speed is unknown, defaulting to 1000 [ 419.100082][T22547] lo speed is unknown, defaulting to 1000 [ 419.106366][T22547] lo speed is unknown, defaulting to 1000 [ 419.112525][T22547] lo speed is unknown, defaulting to 1000 [ 419.113673][T22556] netlink: 'syz.8.6071': attribute type 4 has an invalid length. [ 419.119541][T22547] lo speed is unknown, defaulting to 1000 [ 419.133090][T22547] lo speed is unknown, defaulting to 1000 [ 419.137205][T22556] netlink: 'syz.8.6071': attribute type 4 has an invalid length. [ 419.149784][T22547] lo speed is unknown, defaulting to 1000 [ 419.155921][T22547] lo speed is unknown, defaulting to 1000 [ 419.188023][T22558] lo speed is unknown, defaulting to 1000 [ 419.600108][T22565] wg2: left promiscuous mode [ 419.604762][T22565] wg2: left allmulticast mode [ 419.611983][T22565] wg2: entered promiscuous mode [ 419.616863][T22565] wg2: entered allmulticast mode [ 419.701886][T22574] wg2: left promiscuous mode [ 419.706822][T22574] wg2: left allmulticast mode [ 419.729985][T22574] wg2: entered promiscuous mode [ 419.734891][T22574] wg2: entered allmulticast mode [ 420.577631][T22593] vhci_hcd vhci_hcd.0: pdev(8) rhport(0) sockfd(10) [ 420.584335][T22593] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 420.592070][T22593] vhci_hcd vhci_hcd.0: Device attached [ 420.709625][T22598] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22598 comm=syz.1.6087 [ 420.747218][T22598] block device autoloading is deprecated and will be removed. [ 420.927952][T22595] vhci_hcd: connection closed [ 420.940537][ T11] vhci_hcd: stop threads [ 420.949651][ T11] vhci_hcd: release socket [ 420.954082][ T11] vhci_hcd: disconnect device [ 421.114919][ T29] kauditd_printk_skb: 424 callbacks suppressed [ 421.114937][ T29] audit: type=1326 audit(1740908365.372:15750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22603 comm="syz.5.6089" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8069bad169 code=0x7ffc0000 [ 421.149589][ T29] audit: type=1326 audit(1740908365.402:15751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22603 comm="syz.5.6089" exe="/root/syz-executor" sig=0 arch=c000003e syscall=232 compat=0 ip=0x7f8069bad169 code=0x7ffc0000 [ 421.173601][ T29] audit: type=1326 audit(1740908365.402:15752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22603 comm="syz.5.6089" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8069bad169 code=0x7ffc0000 [ 421.197517][ T29] audit: type=1326 audit(1740908365.402:15753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22603 comm="syz.5.6089" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8069bad169 code=0x7ffc0000 [ 421.306254][T22618] FAULT_INJECTION: forcing a failure. [ 421.306254][T22618] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 421.319520][T22618] CPU: 1 UID: 0 PID: 22618 Comm: syz.4.6091 Not tainted 6.14.0-rc4-syzkaller-00278-gece144f151ac #0 [ 421.319552][T22618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 421.319569][T22618] Call Trace: [ 421.319576][T22618] [ 421.319585][T22618] dump_stack_lvl+0xf2/0x150 [ 421.319620][T22618] dump_stack+0x15/0x1a [ 421.319714][T22618] should_fail_ex+0x24a/0x260 [ 421.319827][T22618] should_fail+0xb/0x10 [ 421.319860][T22618] should_fail_usercopy+0x1a/0x20 [ 421.319900][T22618] _copy_to_user+0x20/0xa0 [ 421.319975][T22618] simple_read_from_buffer+0xa0/0x110 [ 421.320009][T22618] proc_fail_nth_read+0xf9/0x140 [ 421.320047][T22618] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 421.320156][T22618] vfs_read+0x19b/0x6f0 [ 421.320181][T22618] ? __rcu_read_unlock+0x4e/0x70 [ 421.320203][T22618] ? __fget_files+0x17c/0x1c0 [ 421.320257][T22618] ksys_read+0xe8/0x1b0 [ 421.320284][T22618] __x64_sys_read+0x42/0x50 [ 421.320310][T22618] x64_sys_call+0x2874/0x2dc0 [ 421.320338][T22618] do_syscall_64+0xc9/0x1c0 [ 421.320448][T22618] ? clear_bhb_loop+0x55/0xb0 [ 421.320479][T22618] ? clear_bhb_loop+0x55/0xb0 [ 421.320588][T22618] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 421.320616][T22618] RIP: 0033:0x7fae91d2bb7c [ 421.320631][T22618] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 421.320717][T22618] RSP: 002b:00007fae90355030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 421.320735][T22618] RAX: ffffffffffffffda RBX: 00007fae91f46160 RCX: 00007fae91d2bb7c [ 421.320747][T22618] RDX: 000000000000000f RSI: 00007fae903550a0 RDI: 000000000000000e [ 421.320759][T22618] RBP: 00007fae90355090 R08: 0000000000000000 R09: 0000000000000000 [ 421.320770][T22618] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 421.320807][T22618] R13: 0000000000000000 R14: 00007fae91f46160 R15: 00007ffdf6379458 [ 421.320829][T22618] [ 421.751621][T22631] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(7) [ 421.758209][T22631] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 421.766042][T22631] vhci_hcd vhci_hcd.0: Device attached [ 421.898639][T22639] netlink: 48 bytes leftover after parsing attributes in process `syz.0.6099'. [ 421.914555][T22639] vlan3: entered allmulticast mode [ 421.920633][T22641] netlink: 20 bytes leftover after parsing attributes in process `syz.4.6096'. [ 421.929699][T22641] netlink: 8 bytes leftover after parsing attributes in process `syz.4.6096'. [ 422.509404][ T29] audit: type=1326 audit(1740908366.772:15754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22630 comm="syz.1.6097" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff0c08bd169 code=0x7ffc0000 [ 422.551772][ T29] audit: type=1326 audit(1740908366.792:15755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22630 comm="syz.1.6097" exe="/root/syz-executor" sig=0 arch=c000003e syscall=232 compat=0 ip=0x7ff0c08bd169 code=0x7ffc0000 [ 422.575637][ T29] audit: type=1326 audit(1740908366.792:15756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22630 comm="syz.1.6097" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff0c08bd169 code=0x7ffc0000 [ 422.577233][T22635] vhci_hcd: connection closed [ 422.599729][ T29] audit: type=1326 audit(1740908366.792:15757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22630 comm="syz.1.6097" exe="/root/syz-executor" sig=0 arch=c000003e syscall=85 compat=0 ip=0x7ff0c08bd169 code=0x7ffc0000 [ 422.606795][ T11] vhci_hcd: stop threads [ 422.629185][ T29] audit: type=1326 audit(1740908366.792:15758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22630 comm="syz.1.6097" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff0c08bd169 code=0x7ffc0000 [ 422.633094][ T11] vhci_hcd: release socket [ 422.633112][ T11] vhci_hcd: disconnect device [ 422.633171][ T3373] usb 9-1: new low-speed USB device number 2 using vhci_hcd [ 422.656662][ T29] audit: type=1326 audit(1740908366.792:15759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22630 comm="syz.1.6097" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff0c08bd169 code=0x7ffc0000 [ 422.664000][ T3373] usb 9-1: enqueue for inactive port 0 [ 422.755122][ T3373] usb 9-1: enqueue for inactive port 0 [ 422.760846][ T3373] usb 9-1: enqueue for inactive port 0 [ 422.828040][ T3373] vhci_hcd: vhci_device speed not set [ 423.262394][T22668] chnl_net:caif_netlink_parms(): no params data found [ 423.287706][T22688] vlan1: entered allmulticast mode [ 423.313310][T22668] bridge0: port 1(bridge_slave_0) entered blocking state [ 423.320466][T22668] bridge0: port 1(bridge_slave_0) entered disabled state [ 423.328391][T22668] bridge_slave_0: entered allmulticast mode [ 423.334965][T22668] bridge_slave_0: entered promiscuous mode [ 423.341991][T22668] bridge0: port 2(bridge_slave_1) entered blocking state [ 423.349137][T22668] bridge0: port 2(bridge_slave_1) entered disabled state [ 423.356397][T22668] bridge_slave_1: entered allmulticast mode [ 423.362906][T22668] bridge_slave_1: entered promiscuous mode [ 423.381346][T22668] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 423.392062][T22668] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 423.412423][T22668] team0: Port device team_slave_0 added [ 423.419366][T22668] team0: Port device team_slave_1 added [ 423.436962][T22668] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 423.444092][T22668] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 423.470175][T22668] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 423.481492][T22668] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 423.488484][T22668] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 423.514475][T22668] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 423.545161][T22668] hsr_slave_0: entered promiscuous mode [ 423.552969][T22668] hsr_slave_1: entered promiscuous mode [ 423.559196][T22668] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 423.566773][T22668] Cannot create hsr debugfs directory [ 423.630511][T22701] netlink: 'syz.1.6116': attribute type 10 has an invalid length. [ 423.651481][T22701] hsr_slave_0: left promiscuous mode [ 423.660899][T22701] hsr_slave_1: left promiscuous mode [ 424.183948][T22709] netlink: 'syz.0.6119': attribute type 10 has an invalid length. [ 424.254171][T22668] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 424.276118][T22668] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 424.297875][T22668] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 424.321019][T22668] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 424.387924][T22668] 8021q: adding VLAN 0 to HW filter on device bond0 [ 424.404021][T22668] 8021q: adding VLAN 0 to HW filter on device team0 [ 424.416329][T15166] bridge0: port 1(bridge_slave_0) entered blocking state [ 424.423468][T15166] bridge0: port 1(bridge_slave_0) entered forwarding state [ 424.424700][T22728] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6121'. [ 424.444274][T22728] bond0: (slave bond_slave_0): Releasing backup interface [ 424.463856][T15166] bridge0: port 2(bridge_slave_1) entered blocking state [ 424.471095][T15166] bridge0: port 2(bridge_slave_1) entered forwarding state [ 424.490177][T22668] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 424.500611][T22668] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 424.563558][T22739] vlan2: entered allmulticast mode [ 424.568787][T22739] bridge_slave_0: entered allmulticast mode [ 424.575601][T22739] bridge_slave_0: left allmulticast mode [ 424.590059][T22668] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 424.696141][T22668] veth0_vlan: entered promiscuous mode [ 424.704358][T22668] veth1_vlan: entered promiscuous mode [ 424.721858][T22668] veth0_macvtap: entered promiscuous mode [ 424.730075][T22668] veth1_macvtap: entered promiscuous mode [ 424.741420][T22668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 424.752010][T22668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 424.762794][T22668] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 424.774686][T22668] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 424.785296][T22668] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 424.796274][T22668] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 424.806547][T22668] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 424.815444][T22668] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 424.824217][T22668] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 424.832953][T22668] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 424.958681][T22768] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22768 comm=syz.6.6132 [ 424.973739][T22768] block device autoloading is deprecated and will be removed. [ 424.983038][T22768] netlink: 197 bytes leftover after parsing attributes in process `syz.6.6132'. [ 425.080989][T22773] FAULT_INJECTION: forcing a failure. [ 425.080989][T22773] name failslab, interval 1, probability 0, space 0, times 0 [ 425.093881][T22773] CPU: 1 UID: 0 PID: 22773 Comm: syz.6.6134 Not tainted 6.14.0-rc4-syzkaller-00278-gece144f151ac #0 [ 425.093914][T22773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 425.093930][T22773] Call Trace: [ 425.093938][T22773] [ 425.094076][T22773] dump_stack_lvl+0xf2/0x150 [ 425.094110][T22773] dump_stack+0x15/0x1a [ 425.094136][T22773] should_fail_ex+0x24a/0x260 [ 425.094173][T22773] should_failslab+0x8f/0xb0 [ 425.094271][T22773] kmem_cache_alloc_lru_noprof+0x57/0x320 [ 425.094356][T22773] ? shmem_alloc_inode+0x34/0x50 [ 425.094386][T22773] shmem_alloc_inode+0x34/0x50 [ 425.094421][T22773] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 425.094471][T22773] alloc_inode+0x3c/0x160 [ 425.094533][T22773] new_inode+0x1e/0x100 [ 425.094573][T22773] shmem_get_inode+0x24e/0x730 [ 425.094689][T22773] __shmem_file_setup+0x127/0x1f0 [ 425.094734][T22773] shmem_file_setup+0x3b/0x50 [ 425.094769][T22773] __se_sys_memfd_create+0x2e1/0x5a0 [ 425.094926][T22773] __x64_sys_memfd_create+0x31/0x40 [ 425.094955][T22773] x64_sys_call+0x2d4c/0x2dc0 [ 425.094987][T22773] do_syscall_64+0xc9/0x1c0 [ 425.095069][T22773] ? clear_bhb_loop+0x55/0xb0 [ 425.095102][T22773] ? clear_bhb_loop+0x55/0xb0 [ 425.095177][T22773] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 425.095216][T22773] RIP: 0033:0x7f2c4db7d169 [ 425.095232][T22773] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 425.095253][T22773] RSP: 002b:00007f2c4c1e0e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 425.095271][T22773] RAX: ffffffffffffffda RBX: 0000000000000513 RCX: 00007f2c4db7d169 [ 425.095283][T22773] RDX: 00007f2c4c1e0ef0 RSI: 0000000000000000 RDI: 00007f2c4dbfec3c [ 425.095295][T22773] RBP: 0000400000000380 R08: 00007f2c4c1e0bb7 R09: 00007f2c4c1e0e40 [ 425.095309][T22773] R10: 000000000000000a R11: 0000000000000202 R12: 0000400000000080 [ 425.095324][T22773] R13: 00007f2c4c1e0ef0 R14: 00007f2c4c1e0eb0 R15: 0000400000000000 [ 425.095402][T22773] [ 425.319219][T22775] netlink: 12 bytes leftover after parsing attributes in process `syz.1.6135'. [ 425.339570][T22775] bond1: entered promiscuous mode [ 425.344698][T22775] bond1: entered allmulticast mode [ 425.354681][T22775] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6135'. [ 425.369560][T22775] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 425.378469][T22775] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 425.387269][T22775] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 425.396030][T22775] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 425.443926][T22775] geneve2: entered promiscuous mode [ 425.449290][T22775] geneve2: entered allmulticast mode [ 425.454975][T22775] bond1: (slave geneve2): Enslaving as an active interface with an up link [ 425.521257][T22785] netlink: 'syz.4.6140': attribute type 10 has an invalid length. [ 425.908081][T22799] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=32749 sclass=netlink_route_socket pid=22799 comm=syz.8.6144 [ 425.958519][T22802] wg2: left promiscuous mode [ 425.963175][T22802] wg2: left allmulticast mode [ 425.972444][T22802] wg2: entered promiscuous mode [ 425.977348][T22802] wg2: entered allmulticast mode [ 426.025669][T22809] netlink: 32 bytes leftover after parsing attributes in process `syz.8.6148'. [ 426.075453][T22813] vlan3: entered allmulticast mode [ 426.323281][ T29] kauditd_printk_skb: 192 callbacks suppressed [ 426.323301][ T29] audit: type=1326 audit(1740908370.582:15952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22819 comm="syz.6.6153" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c4db7d169 code=0x7ffc0000 [ 426.367029][ T29] audit: type=1326 audit(1740908370.582:15953): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22819 comm="syz.6.6153" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c4db7d169 code=0x7ffc0000 [ 426.390776][ T29] audit: type=1326 audit(1740908370.582:15954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22819 comm="syz.6.6153" exe="/root/syz-executor" sig=0 arch=c000003e syscall=103 compat=0 ip=0x7f2c4db7d169 code=0x7ffc0000 [ 426.414506][ T29] audit: type=1326 audit(1740908370.582:15955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22819 comm="syz.6.6153" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c4db7d169 code=0x7ffc0000 [ 426.438133][ T29] audit: type=1326 audit(1740908370.582:15956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22819 comm="syz.6.6153" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2c4db7d169 code=0x7ffc0000 [ 426.461728][ T29] audit: type=1326 audit(1740908370.582:15957): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22819 comm="syz.6.6153" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c4db7d169 code=0x7ffc0000 [ 426.485317][ T29] audit: type=1326 audit(1740908370.582:15958): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22819 comm="syz.6.6153" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2c4db7d169 code=0x7ffc0000 [ 426.509130][ T29] audit: type=1326 audit(1740908370.612:15959): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22819 comm="syz.6.6153" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c4db7d169 code=0x7ffc0000 [ 426.532897][ T29] audit: type=1326 audit(1740908370.612:15960): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22819 comm="syz.6.6153" exe="/root/syz-executor" sig=0 arch=c000003e syscall=2 compat=0 ip=0x7f2c4db7d169 code=0x7ffc0000 [ 426.556397][ T29] audit: type=1326 audit(1740908370.612:15961): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22819 comm="syz.6.6153" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c4db7d169 code=0x7ffc0000 [ 426.787202][T22827] FAULT_INJECTION: forcing a failure. [ 426.787202][T22827] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 426.800405][T22827] CPU: 1 UID: 0 PID: 22827 Comm: syz.4.6157 Not tainted 6.14.0-rc4-syzkaller-00278-gece144f151ac #0 [ 426.800436][T22827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 426.800452][T22827] Call Trace: [ 426.800461][T22827] [ 426.800471][T22827] dump_stack_lvl+0xf2/0x150 [ 426.800500][T22827] dump_stack+0x15/0x1a [ 426.800545][T22827] should_fail_ex+0x24a/0x260 [ 426.800581][T22827] should_fail+0xb/0x10 [ 426.800614][T22827] should_fail_usercopy+0x1a/0x20 [ 426.800652][T22827] _copy_to_user+0x20/0xa0 [ 426.800671][T22827] simple_read_from_buffer+0xa0/0x110 [ 426.800772][T22827] proc_fail_nth_read+0xf9/0x140 [ 426.800854][T22827] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 426.800882][T22827] vfs_read+0x19b/0x6f0 [ 426.800927][T22827] ? __rcu_read_unlock+0x4e/0x70 [ 426.800951][T22827] ? __fget_files+0x17c/0x1c0 [ 426.800989][T22827] ksys_read+0xe8/0x1b0 [ 426.801099][T22827] __x64_sys_read+0x42/0x50 [ 426.801191][T22827] x64_sys_call+0x2874/0x2dc0 [ 426.801281][T22827] do_syscall_64+0xc9/0x1c0 [ 426.801399][T22827] ? clear_bhb_loop+0x55/0xb0 [ 426.801501][T22827] ? clear_bhb_loop+0x55/0xb0 [ 426.801597][T22827] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 426.801691][T22827] RIP: 0033:0x7fae91d2bb7c [ 426.801739][T22827] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 426.801761][T22827] RSP: 002b:00007fae90397030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 426.801779][T22827] RAX: ffffffffffffffda RBX: 00007fae91f45fa0 RCX: 00007fae91d2bb7c [ 426.801791][T22827] RDX: 000000000000000f RSI: 00007fae903970a0 RDI: 0000000000000003 [ 426.801803][T22827] RBP: 00007fae90397090 R08: 0000000000000000 R09: 0000000000000000 [ 426.801817][T22827] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 426.801829][T22827] R13: 0000000000000001 R14: 00007fae91f45fa0 R15: 00007ffdf6379458 [ 426.801847][T22827] [ 427.041720][T22833] netlink: 32 bytes leftover after parsing attributes in process `syz.4.6159'. [ 427.126536][T22851] netlink: 48 bytes leftover after parsing attributes in process `syz.6.6165'. [ 427.136877][T22845] netlink: 4 bytes leftover after parsing attributes in process `syz.8.6163'. [ 427.150386][T22851] vlan2: entered allmulticast mode [ 427.214372][T22860] netlink: 'syz.0.6168': attribute type 10 has an invalid length. [ 427.294666][T22867] vlan1: entered allmulticast mode [ 427.324411][T22870] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6170'. [ 427.948347][T22880] netlink: 32 bytes leftover after parsing attributes in process `syz.1.6172'. [ 428.004091][T22888] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22888 comm=syz.6.6176 [ 428.111285][T22901] netlink: 'syz.8.6180': attribute type 10 has an invalid length. [ 428.202883][T22913] vlan1: entered allmulticast mode [ 428.262667][T22926] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22926 comm=syz.8.6190 [ 428.351503][T22940] vlan2: entered allmulticast mode [ 428.356687][T22940] bridge_slave_0: entered allmulticast mode [ 428.363868][T22940] bridge_slave_0: left allmulticast mode [ 429.057215][T22950] netlink: 'syz.4.6197': attribute type 10 has an invalid length. [ 429.110465][T22954] FAULT_INJECTION: forcing a failure. [ 429.110465][T22954] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 429.123726][T22954] CPU: 0 UID: 0 PID: 22954 Comm: syz.6.6198 Not tainted 6.14.0-rc4-syzkaller-00278-gece144f151ac #0 [ 429.123757][T22954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 429.123773][T22954] Call Trace: [ 429.123780][T22954] [ 429.123789][T22954] dump_stack_lvl+0xf2/0x150 [ 429.123838][T22954] dump_stack+0x15/0x1a [ 429.123861][T22954] should_fail_ex+0x24a/0x260 [ 429.123887][T22954] should_fail+0xb/0x10 [ 429.123909][T22954] should_fail_usercopy+0x1a/0x20 [ 429.123996][T22954] strncpy_from_user+0x25/0x210 [ 429.124026][T22954] ? kmem_cache_alloc_noprof+0x18e/0x320 [ 429.124069][T22954] ? getname_flags+0x81/0x3b0 [ 429.124120][T22954] getname_flags+0xb0/0x3b0 [ 429.124148][T22954] getname_uflags+0x24/0x30 [ 429.124175][T22954] __x64_sys_execveat+0x5e/0x90 [ 429.124270][T22954] x64_sys_call+0x291e/0x2dc0 [ 429.124293][T22954] do_syscall_64+0xc9/0x1c0 [ 429.124320][T22954] ? clear_bhb_loop+0x55/0xb0 [ 429.124377][T22954] ? clear_bhb_loop+0x55/0xb0 [ 429.124399][T22954] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 429.124422][T22954] RIP: 0033:0x7f2c4db7d169 [ 429.124501][T22954] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 429.124516][T22954] RSP: 002b:00007f2c4c1e1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 429.124532][T22954] RAX: ffffffffffffffda RBX: 00007f2c4dd95fa0 RCX: 00007f2c4db7d169 [ 429.124543][T22954] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffffffffff [ 429.124631][T22954] RBP: 00007f2c4c1e1090 R08: 0000000000001000 R09: 0000000000000000 [ 429.124654][T22954] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 429.124670][T22954] R13: 0000000000000000 R14: 00007f2c4dd95fa0 R15: 00007ffefe278b28 [ 429.124691][T22954] [ 429.500500][T22976] usb usb8: usbfs: process 22976 (syz.0.6206) did not claim interface 0 before use [ 429.512038][T22976] syz_tun: entered allmulticast mode [ 429.519035][T22976] syz_tun: left allmulticast mode [ 429.639092][T22980] __nla_validate_parse: 8 callbacks suppressed [ 429.639109][T22980] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6208'. [ 429.876409][T22998] netlink: 'syz.0.6212': attribute type 10 has an invalid length. [ 430.013396][T23002] netlink: 32 bytes leftover after parsing attributes in process `syz.0.6214'. [ 430.185874][T23009] vlan2: entered allmulticast mode [ 430.191127][T23009] bridge_slave_0: entered allmulticast mode [ 430.197933][T23009] bridge_slave_0: left allmulticast mode [ 430.309200][T23018] wireguard1: entered promiscuous mode [ 430.314748][T23018] wireguard1: entered allmulticast mode [ 430.370477][T23020] wireguard2: entered promiscuous mode [ 430.376003][T23020] wireguard2: entered allmulticast mode [ 430.476099][T23024] netlink: 4 bytes leftover after parsing attributes in process `syz.6.6221'. [ 430.486515][T23024] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 430.494104][T23024] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 430.502448][T23024] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 430.510188][T23024] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 430.641640][T23031] veth0_vlan: entered allmulticast mode [ 430.691432][T23033] netlink: 'syz.6.6224': attribute type 10 has an invalid length. [ 430.700319][T23033] hsr_slave_0: left promiscuous mode [ 430.706349][T23033] hsr_slave_1: left promiscuous mode [ 431.354846][ T29] kauditd_printk_skb: 239 callbacks suppressed [ 431.354868][ T29] audit: type=1326 audit(1740908375.562:16201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23058 comm="syz.6.6232" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c4db7d169 code=0x7ffc0000 [ 431.384793][ T29] audit: type=1326 audit(1740908375.562:16202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23058 comm="syz.6.6232" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c4db7d169 code=0x7ffc0000 [ 431.408689][ T29] audit: type=1326 audit(1740908375.562:16203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23058 comm="syz.6.6232" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2c4db7d169 code=0x7ffc0000 [ 431.432392][ T29] audit: type=1326 audit(1740908375.562:16204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23058 comm="syz.6.6232" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c4db7d169 code=0x7ffc0000 [ 431.456100][ T29] audit: type=1326 audit(1740908375.562:16205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23058 comm="syz.6.6232" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c4db7d169 code=0x7ffc0000 [ 431.479777][ T29] audit: type=1326 audit(1740908375.562:16206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23058 comm="syz.6.6232" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2c4db7d169 code=0x7ffc0000 [ 431.503389][ T29] audit: type=1326 audit(1740908375.562:16207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23058 comm="syz.6.6232" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c4db7d169 code=0x7ffc0000 [ 431.527128][ T29] audit: type=1326 audit(1740908375.562:16208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23058 comm="syz.6.6232" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c4db7d169 code=0x7ffc0000 [ 431.550701][ T29] audit: type=1326 audit(1740908375.572:16209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23058 comm="syz.6.6232" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2c4db7d169 code=0x7ffc0000 [ 431.574314][ T29] audit: type=1326 audit(1740908375.572:16210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23058 comm="syz.6.6232" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c4db7d169 code=0x7ffc0000 [ 432.249970][T23091] netlink: 48 bytes leftover after parsing attributes in process `syz.6.6240'. [ 432.271258][T23091] vlan2: entered allmulticast mode [ 432.310210][T23093] vlan3: entered allmulticast mode [ 433.363439][T23137] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6258'. [ 433.407171][T23146] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6260'. [ 433.439435][T23153] netlink: 48 bytes leftover after parsing attributes in process `syz.0.6261'. [ 433.460819][T23153] vlan3: entered allmulticast mode [ 433.481539][T23156] vlan2: entered allmulticast mode [ 433.486789][T23156] bridge_slave_0: entered allmulticast mode [ 433.494982][T23156] bridge_slave_0: left allmulticast mode [ 433.588849][T23165] wg2: entered promiscuous mode [ 433.593798][T23165] wg2: entered allmulticast mode [ 433.691256][T23173] netlink: 'syz.4.6270': attribute type 10 has an invalid length. [ 433.776231][T15172] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 433.786910][T15172] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 433.796642][T15172] bond0 (unregistering): Released all slaves [ 433.887472][T15172] tipc: Left network mode [ 433.948621][T15172] team0 (unregistering): Port device team_slave_1 removed [ 433.963708][T15172] team0 (unregistering): Port device team_slave_0 removed [ 434.485506][T23192] netlink: 'syz.6.6277': attribute type 13 has an invalid length. [ 434.519328][T23192] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 435.052165][T23209] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6283'. [ 435.090212][T23219] netlink: 48 bytes leftover after parsing attributes in process `syz.6.6285'. [ 435.119078][T23219] vlan2: entered allmulticast mode [ 435.383417][T23232] netlink: 'syz.0.6290': attribute type 10 has an invalid length. [ 435.993187][T23259] wg2: left promiscuous mode [ 435.998094][T23259] wg2: left allmulticast mode [ 436.009111][T23259] wg2: entered promiscuous mode [ 436.014029][T23259] wg2: entered allmulticast mode [ 436.044926][T23262] netlink: 8 bytes leftover after parsing attributes in process `syz.4.6302'. [ 436.073514][T23265] netlink: 48 bytes leftover after parsing attributes in process `syz.4.6303'. [ 436.308414][T23265] vlan1: entered allmulticast mode [ 436.614364][ T29] kauditd_printk_skb: 179 callbacks suppressed [ 436.614383][ T29] audit: type=1326 audit(1740908380.872:16390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23284 comm="syz.1.6309" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff0c08bd169 code=0x7ffc0000 [ 436.640523][T23288] netlink: 48 bytes leftover after parsing attributes in process `syz.1.6310'. [ 436.649854][ T29] audit: type=1326 audit(1740908380.872:16391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23284 comm="syz.1.6309" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff0c08bd169 code=0x7ffc0000 [ 436.659096][T23288] vlan3: entered allmulticast mode [ 436.676988][ T29] audit: type=1326 audit(1740908380.872:16392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23284 comm="syz.1.6309" exe="/root/syz-executor" sig=0 arch=c000003e syscall=232 compat=0 ip=0x7ff0c08bd169 code=0x7ffc0000 [ 436.706053][ T29] audit: type=1326 audit(1740908380.872:16393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23284 comm="syz.1.6309" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff0c08bd169 code=0x7ffc0000 [ 436.729804][ T29] audit: type=1326 audit(1740908380.872:16394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23284 comm="syz.1.6309" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff0c08bd169 code=0x7ffc0000 [ 436.823226][ T29] audit: type=1326 audit(1740908381.082:16395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23290 comm="syz.0.6311" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7c7fe2d169 code=0x7ffc0000 [ 436.846920][ T29] audit: type=1326 audit(1740908381.082:16396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23290 comm="syz.0.6311" exe="/root/syz-executor" sig=0 arch=c000003e syscall=103 compat=0 ip=0x7f7c7fe2d169 code=0x7ffc0000 [ 436.870622][ T29] audit: type=1326 audit(1740908381.082:16397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23290 comm="syz.0.6311" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7c7fe2d169 code=0x7ffc0000 [ 436.894349][ T29] audit: type=1326 audit(1740908381.082:16398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23290 comm="syz.0.6311" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7c7fe2d169 code=0x7ffc0000 [ 436.918231][ T29] audit: type=1326 audit(1740908381.082:16399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23290 comm="syz.0.6311" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7c7fe2d169 code=0x7ffc0000 [ 436.947523][T23298] netlink: 8 bytes leftover after parsing attributes in process `syz.6.6313'. [ 437.010488][T23303] sg_write: data in/out 209152/1 bytes for SCSI command 0xf2-- guessing data in; [ 437.010488][T23303] program syz.6.6315 not setting count and/or reply_len properly [ 437.665098][T23323] wg2: left promiscuous mode [ 437.669932][T23323] wg2: left allmulticast mode [ 437.682808][T23323] wg2: entered promiscuous mode [ 437.687855][T23323] wg2: entered allmulticast mode [ 437.720585][T23326] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6323'. [ 437.761628][T23335] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6325'. [ 438.111410][T23368] wg2: left promiscuous mode [ 438.116063][T23368] wg2: left allmulticast mode [ 438.126412][T23368] wg2: entered promiscuous mode [ 438.131413][T23368] wg2: entered allmulticast mode [ 438.219558][T23371] wireguard2: entered promiscuous mode [ 438.225139][T23371] wireguard2: entered allmulticast mode [ 438.346522][T23375] netlink: 4 bytes leftover after parsing attributes in process `syz.6.6337'. [ 438.407914][T23384] netlink: 'syz.4.6339': attribute type 13 has an invalid length. [ 438.435840][T23384] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 438.715545][T23410] netlink: 4 bytes leftover after parsing attributes in process `syz.8.6349'. [ 438.813424][T23426] netlink: 'syz.8.6355': attribute type 13 has an invalid length. [ 438.851802][T23429] wireguard2: entered promiscuous mode [ 438.857329][T23429] wireguard2: entered allmulticast mode [ 438.872434][T23426] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 439.364047][T23472] wg2: left promiscuous mode [ 439.368787][T23472] wg2: left allmulticast mode [ 439.376590][T23472] wg2: entered promiscuous mode [ 439.381556][T23472] wg2: entered allmulticast mode [ 439.457945][T23475] wireguard2: entered promiscuous mode [ 439.463494][T23475] wireguard2: entered allmulticast mode [ 439.654997][T23483] netlink: 'syz.8.6373': attribute type 10 has an invalid length. [ 439.787798][T23509] wg2: entered promiscuous mode [ 439.792721][T23509] wg2: entered allmulticast mode [ 440.179108][T23516] wireguard3: entered promiscuous mode [ 440.184735][T23516] wireguard3: entered allmulticast mode [ 440.418941][T23541] wg2: left promiscuous mode [ 440.423620][T23541] wg2: left allmulticast mode [ 440.432257][T23541] wg2: entered promiscuous mode [ 440.437213][T23541] wg2: entered allmulticast mode [ 440.615387][T23555] FAULT_INJECTION: forcing a failure. [ 440.615387][T23555] name failslab, interval 1, probability 0, space 0, times 0 [ 440.624943][T23549] netlink: 'syz.4.6396': attribute type 10 has an invalid length. [ 440.628096][T23555] CPU: 0 UID: 0 PID: 23555 Comm: syz.0.6398 Not tainted 6.14.0-rc4-syzkaller-00278-gece144f151ac #0 [ 440.628124][T23555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 440.628138][T23555] Call Trace: [ 440.628154][T23555] [ 440.628163][T23555] dump_stack_lvl+0xf2/0x150 [ 440.628202][T23555] dump_stack+0x15/0x1a [ 440.628290][T23555] should_fail_ex+0x24a/0x260 [ 440.628330][T23555] should_failslab+0x8f/0xb0 [ 440.628369][T23555] kmem_cache_alloc_noprof+0x52/0x320 [ 440.628396][T23555] ? skb_clone+0x154/0x1f0 [ 440.628463][T23555] skb_clone+0x154/0x1f0 [ 440.628495][T23555] __netlink_deliver_tap+0x2bd/0x4f0 [ 440.628613][T23555] netlink_unicast+0x64a/0x670 [ 440.628652][T23555] netlink_sendmsg+0x5cc/0x6e0 [ 440.628745][T23555] ? __pfx_netlink_sendmsg+0x10/0x10 [ 440.628788][T23555] __sock_sendmsg+0x140/0x180 [ 440.628829][T23555] ____sys_sendmsg+0x326/0x4b0 [ 440.628925][T23555] __sys_sendmsg+0x19d/0x230 [ 440.628972][T23555] __x64_sys_sendmsg+0x46/0x50 [ 440.629020][T23555] x64_sys_call+0x2734/0x2dc0 [ 440.629053][T23555] do_syscall_64+0xc9/0x1c0 [ 440.629094][T23555] ? clear_bhb_loop+0x55/0xb0 [ 440.629128][T23555] ? clear_bhb_loop+0x55/0xb0 [ 440.629218][T23555] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 440.629252][T23555] RIP: 0033:0x7f7c7fe2d169 [ 440.629272][T23555] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 440.629354][T23555] RSP: 002b:00007f7c7e497038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 440.629378][T23555] RAX: ffffffffffffffda RBX: 00007f7c80045fa0 RCX: 00007f7c7fe2d169 [ 440.629394][T23555] RDX: 0000000000000000 RSI: 0000400000000100 RDI: 0000000000000003 [ 440.629408][T23555] RBP: 00007f7c7e497090 R08: 0000000000000000 R09: 0000000000000000 [ 440.629424][T23555] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 440.629439][T23555] R13: 0000000000000000 R14: 00007f7c80045fa0 R15: 00007fff42a1d088 [ 440.629462][T23555] [ 440.912466][T23559] vhci_hcd vhci_hcd.0: pdev(8) rhport(0) sockfd(10) [ 440.919157][T23559] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 440.926911][T23559] vhci_hcd vhci_hcd.0: Device attached [ 441.085703][T23577] wg2: left promiscuous mode [ 441.090500][T23577] wg2: left allmulticast mode [ 441.096146][T23579] __nla_validate_parse: 2 callbacks suppressed [ 441.096164][T23579] netlink: 12 bytes leftover after parsing attributes in process `syz.4.6407'. [ 441.113513][T23579] FAULT_INJECTION: forcing a failure. [ 441.113513][T23579] name failslab, interval 1, probability 0, space 0, times 0 [ 441.126375][T23579] CPU: 1 UID: 0 PID: 23579 Comm: syz.4.6407 Not tainted 6.14.0-rc4-syzkaller-00278-gece144f151ac #0 [ 441.126422][T23579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 441.126437][T23579] Call Trace: [ 441.126445][T23579] [ 441.126455][T23579] dump_stack_lvl+0xf2/0x150 [ 441.126488][T23579] dump_stack+0x15/0x1a [ 441.126525][T23579] should_fail_ex+0x24a/0x260 [ 441.126571][T23579] should_failslab+0x8f/0xb0 [ 441.126607][T23579] kmem_cache_alloc_node_noprof+0x59/0x320 [ 441.126677][T23579] ? __alloc_skb+0x10b/0x310 [ 441.126702][T23579] __alloc_skb+0x10b/0x310 [ 441.126766][T23579] netlink_ack+0xef/0x4f0 [ 441.126802][T23579] ? ref_tracker_free+0x3a5/0x410 [ 441.126842][T23579] netlink_rcv_skb+0x19c/0x230 [ 441.126878][T23579] ? __pfx_genl_rcv_msg+0x10/0x10 [ 441.126922][T23579] genl_rcv+0x28/0x40 [ 441.126946][T23579] netlink_unicast+0x599/0x670 [ 441.127034][T23579] netlink_sendmsg+0x5cc/0x6e0 [ 441.127077][T23579] ? __pfx_netlink_sendmsg+0x10/0x10 [ 441.127105][T23579] __sock_sendmsg+0x140/0x180 [ 441.127174][T23579] ____sys_sendmsg+0x326/0x4b0 [ 441.127210][T23579] __sys_sendmsg+0x19d/0x230 [ 441.127253][T23579] __x64_sys_sendmsg+0x46/0x50 [ 441.127274][T23579] x64_sys_call+0x2734/0x2dc0 [ 441.127314][T23579] do_syscall_64+0xc9/0x1c0 [ 441.127428][T23579] ? clear_bhb_loop+0x55/0xb0 [ 441.127472][T23579] ? clear_bhb_loop+0x55/0xb0 [ 441.127506][T23579] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 441.127550][T23579] RIP: 0033:0x7fae91d2d169 [ 441.127568][T23579] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 441.127583][T23579] RSP: 002b:00007fae90397038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 441.127599][T23579] RAX: ffffffffffffffda RBX: 00007fae91f45fa0 RCX: 00007fae91d2d169 [ 441.127610][T23579] RDX: 0000000024008000 RSI: 0000400000000840 RDI: 0000000000000007 [ 441.127621][T23579] RBP: 00007fae90397090 R08: 0000000000000000 R09: 0000000000000000 [ 441.127631][T23579] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 441.127665][T23579] R13: 0000000000000000 R14: 00007fae91f45fa0 R15: 00007ffdf6379458 [ 441.127681][T23579] [ 441.344801][T23577] wg2: entered promiscuous mode [ 441.345039][T23562] vhci_hcd: connection closed [ 441.349743][T23577] wg2: entered allmulticast mode [ 441.364374][T15172] vhci_hcd: stop threads [ 441.368712][T15172] vhci_hcd: release socket [ 441.373148][T15172] vhci_hcd: disconnect device [ 441.407851][T23588] netlink: 44 bytes leftover after parsing attributes in process `syz.0.6411'. [ 441.417429][ T3373] usb 18-1: enqueue for inactive port 0 [ 441.470304][T23592] syz!: rxe_newlink: already configured on team_slave_0 [ 441.574471][T23604] netlink: 'syz.4.6418': attribute type 10 has an invalid length. [ 441.627486][ T3373] usb 18-1: enqueue for inactive port 0 [ 441.654912][T23609] wg2: left promiscuous mode [ 441.659634][T23609] wg2: left allmulticast mode [ 441.668882][T23609] wg2: entered promiscuous mode [ 441.673816][T23609] wg2: entered allmulticast mode [ 442.046619][ T29] kauditd_printk_skb: 468 callbacks suppressed [ 442.046637][ T29] audit: type=1326 audit(1740908386.302:16868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23630 comm="syz.6.6429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c4db7d169 code=0x7ffc0000 [ 442.079411][ T29] audit: type=1326 audit(1740908386.312:16869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23630 comm="syz.6.6429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2c4db7d169 code=0x7ffc0000 [ 442.103142][ T29] audit: type=1326 audit(1740908386.312:16870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23630 comm="syz.6.6429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c4db7d169 code=0x7ffc0000 [ 442.126890][ T29] audit: type=1326 audit(1740908386.312:16871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23630 comm="syz.6.6429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c4db7d169 code=0x7ffc0000 [ 442.131000][T23634] netlink: 48 bytes leftover after parsing attributes in process `syz.6.6430'. [ 442.150606][ T29] audit: type=1326 audit(1740908386.312:16872): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23630 comm="syz.6.6429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2c4db7d169 code=0x7ffc0000 [ 442.183610][ T29] audit: type=1326 audit(1740908386.312:16873): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23630 comm="syz.6.6429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c4db7d169 code=0x7ffc0000 [ 442.207255][ T29] audit: type=1326 audit(1740908386.312:16874): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23630 comm="syz.6.6429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c4db7d169 code=0x7ffc0000 [ 442.230931][ T29] audit: type=1326 audit(1740908386.312:16875): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23630 comm="syz.6.6429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2c4db7d169 code=0x7ffc0000 [ 442.254604][ T29] audit: type=1326 audit(1740908386.312:16876): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23630 comm="syz.6.6429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c4db7d169 code=0x7ffc0000 [ 442.278239][ T29] audit: type=1326 audit(1740908386.312:16877): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23630 comm="syz.6.6429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f2c4db7d169 code=0x7ffc0000 [ 442.309290][T23634] vlan2: entered allmulticast mode [ 442.330408][T23638] netlink: 'syz.0.6431': attribute type 10 has an invalid length. [ 442.383081][T23640] wg2: left promiscuous mode [ 442.387797][T23640] wg2: left allmulticast mode [ 442.398035][T23640] wg2: entered promiscuous mode [ 442.402952][T23640] wg2: entered allmulticast mode [ 442.442017][T23642] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6433'. [ 442.582590][T23662] wireguard2: entered promiscuous mode [ 442.588318][T23662] wireguard2: entered allmulticast mode [ 442.763628][ T3373] usb usb18-port1: attempt power cycle [ 442.855110][T23679] wireguard2: entered promiscuous mode [ 442.860692][T23679] wireguard2: entered allmulticast mode [ 442.877841][T23682] wg2: left promiscuous mode [ 442.882502][T23682] wg2: left allmulticast mode [ 442.890673][T23682] wg2: entered promiscuous mode [ 442.895575][T23682] wg2: entered allmulticast mode [ 442.944426][T23685] netlink: 'syz.0.6447': attribute type 10 has an invalid length. [ 443.148528][T23701] netlink: 4 bytes leftover after parsing attributes in process `syz.8.6453'. [ 443.361612][T23709] vhci_hcd vhci_hcd.0: pdev(6) rhport(0) sockfd(10) [ 443.368257][T23709] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 443.376034][T23709] vhci_hcd vhci_hcd.0: Device attached [ 443.518182][T23714] wireguard2: entered promiscuous mode [ 443.523737][T23714] wireguard2: entered allmulticast mode [ 443.747680][ T3372] usb 14-1: SetAddress Request (2) to port 0 [ 443.763400][ T3372] usb 14-1: new SuperSpeed USB device number 2 using vhci_hcd [ 443.974665][T23712] vhci_hcd: connection closed [ 444.034388][T23713] vhci_hcd: sendmsg failed!, ret=-32 for 48 [ 444.134469][T15166] vhci_hcd: stop threads [ 444.138849][T15166] vhci_hcd: release socket [ 444.143362][T15166] vhci_hcd: disconnect device [ 444.174048][T23736] netlink: 4 bytes leftover after parsing attributes in process `syz.8.6458'. [ 444.257540][T23738] netlink: 'syz.1.6461': attribute type 10 has an invalid length. [ 444.722564][T15172] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 444.792208][T15172] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 444.861314][T15172] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 444.902109][T15172] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 444.985914][T23761] chnl_net:caif_netlink_parms(): no params data found [ 445.003070][T15172] bridge_slave_1: left allmulticast mode [ 445.008800][T15172] bridge_slave_1: left promiscuous mode [ 445.014510][T15172] bridge0: port 2(bridge_slave_1) entered disabled state [ 445.022538][T15172] bridge_slave_0: left allmulticast mode [ 445.028330][T15172] bridge_slave_0: left promiscuous mode [ 445.034069][T15172] bridge0: port 1(bridge_slave_0) entered disabled state [ 445.119716][T15172] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 445.130832][T15172] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 445.140746][T15172] bond0 (unregistering): Released all slaves [ 445.174094][T23761] bridge0: port 1(bridge_slave_0) entered blocking state [ 445.181409][T23761] bridge0: port 1(bridge_slave_0) entered disabled state [ 445.189787][T23761] bridge_slave_0: entered allmulticast mode [ 445.198584][T23761] bridge_slave_0: entered promiscuous mode [ 445.206826][T23761] bridge0: port 2(bridge_slave_1) entered blocking state [ 445.214004][T23761] bridge0: port 2(bridge_slave_1) entered disabled state [ 445.221617][T23761] bridge_slave_1: entered allmulticast mode [ 445.232197][T23761] bridge_slave_1: entered promiscuous mode [ 445.254045][T15172] veth1_macvtap: left promiscuous mode [ 445.259666][T15172] veth0_macvtap: left promiscuous mode [ 445.310078][T15172] team0 (unregistering): Port device team_slave_1 removed [ 445.319649][T15172] team0 (unregistering): Port device team_slave_0 removed [ 445.361265][T23761] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 445.373773][T23761] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 445.410938][T23761] team0: Port device team_slave_0 added [ 445.425480][T23761] team0: Port device team_slave_1 added [ 445.443692][T23761] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 445.450813][T23761] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 445.476838][T23761] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 445.490613][T23761] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 445.497657][T23761] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 445.523622][T23761] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 445.542303][T23799] netlink: 'syz.0.6478': attribute type 10 has an invalid length. [ 445.596765][T23805] netlink: 8 bytes leftover after parsing attributes in process `syz.8.6480'. [ 445.705296][T23761] hsr_slave_0: entered promiscuous mode [ 445.711473][T23761] hsr_slave_1: entered promiscuous mode [ 445.927655][T23816] wireguard2: entered promiscuous mode [ 445.933241][T23816] wireguard2: entered allmulticast mode [ 445.958167][ T3373] usb usb18-port1: unable to enumerate USB device [ 445.993714][T23825] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6484'. [ 446.212439][T23785] chnl_net:caif_netlink_parms(): no params data found [ 446.256341][T23785] bridge0: port 1(bridge_slave_0) entered blocking state [ 446.263561][T23785] bridge0: port 1(bridge_slave_0) entered disabled state [ 446.270898][T23785] bridge_slave_0: entered allmulticast mode [ 446.277536][T23785] bridge_slave_0: entered promiscuous mode [ 446.284593][T23785] bridge0: port 2(bridge_slave_1) entered blocking state [ 446.291967][T23785] bridge0: port 2(bridge_slave_1) entered disabled state [ 446.299368][T23785] bridge_slave_1: entered allmulticast mode [ 446.305935][T23785] bridge_slave_1: entered promiscuous mode [ 446.334668][T23785] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 446.347921][T23785] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 446.382951][T23785] team0: Port device team_slave_0 added [ 446.391024][T23785] team0: Port device team_slave_1 added [ 446.432376][T15172] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 446.445351][T23785] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 446.452352][T23785] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 446.478350][T23785] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 446.508702][T23785] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 446.515819][T23785] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 446.541974][T23785] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 446.570548][T15172] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 446.595915][T23785] hsr_slave_0: entered promiscuous mode [ 446.603090][T23785] hsr_slave_1: entered promiscuous mode [ 446.609268][T23785] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 446.617089][T23785] Cannot create hsr debugfs directory [ 446.625620][T15172] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 446.672101][T15172] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 446.690216][T23761] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 446.701266][T23761] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 446.712685][T23761] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 446.730974][T23761] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 446.771223][T23854] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1015 sclass=netlink_route_socket pid=23854 comm=syz.8.6491 [ 446.785000][T23785] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 446.804499][T15172] bridge_slave_1: left allmulticast mode [ 446.810225][T15172] bridge_slave_1: left promiscuous mode [ 446.815880][T15172] bridge0: port 2(bridge_slave_1) entered disabled state [ 446.824560][T15172] bridge_slave_0: left allmulticast mode [ 446.830285][T15172] bridge_slave_0: left promiscuous mode [ 446.835900][T15172] bridge0: port 1(bridge_slave_0) entered disabled state [ 446.854548][T23856] netlink: 48 bytes leftover after parsing attributes in process `syz.8.6492'. [ 446.940093][T15172] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 446.950221][T15172] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 446.960338][T15172] bond0 (unregistering): Released all slaves [ 446.971663][T23785] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 446.985271][T23856] vlan2: entered allmulticast mode [ 446.990458][T23856] bridge_slave_0: entered allmulticast mode [ 446.996971][T23856] bridge_slave_0: left allmulticast mode [ 447.022230][T23761] 8021q: adding VLAN 0 to HW filter on device bond0 [ 447.034307][T23761] 8021q: adding VLAN 0 to HW filter on device team0 [ 447.044099][T15156] bridge0: port 1(bridge_slave_0) entered blocking state [ 447.051293][T15156] bridge0: port 1(bridge_slave_0) entered forwarding state [ 447.071401][T23785] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 447.086335][T15163] bridge0: port 2(bridge_slave_1) entered blocking state [ 447.093470][T15163] bridge0: port 2(bridge_slave_1) entered forwarding state [ 447.111596][T15172] veth1_macvtap: left promiscuous mode [ 447.117157][T15172] veth0_macvtap: left promiscuous mode [ 447.123045][T23860] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6493'. [ 447.123853][T15172] veth1_vlan: left promiscuous mode [ 447.137322][T15172] veth0_vlan: left promiscuous mode [ 447.199270][T15172] team0 (unregistering): Port device team_slave_1 removed [ 447.209533][T15172] team0 (unregistering): Port device team_slave_0 removed [ 447.245272][T23785] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 447.270278][T23761] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 447.280753][T23761] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 447.339177][T23872] wireguard2: entered promiscuous mode [ 447.344689][T23872] wireguard2: entered allmulticast mode [ 447.375453][T23761] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 447.385959][T23785] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 447.402169][T23785] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 447.415622][T23785] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 447.427422][T23785] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 447.513758][T23785] 8021q: adding VLAN 0 to HW filter on device bond0 [ 447.528105][T23785] 8021q: adding VLAN 0 to HW filter on device team0 [ 447.537482][T15174] bridge0: port 1(bridge_slave_0) entered blocking state [ 447.544578][T15174] bridge0: port 1(bridge_slave_0) entered forwarding state [ 447.559918][T15174] bridge0: port 2(bridge_slave_1) entered blocking state [ 447.567065][T15174] bridge0: port 2(bridge_slave_1) entered forwarding state [ 447.593864][T23785] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 447.604330][T23785] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 447.616565][ T29] kauditd_printk_skb: 192 callbacks suppressed [ 447.616582][ T29] audit: type=1326 audit(1740908391.872:17070): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23884 comm="syz.0.6496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7c7fe2d169 code=0x7ffc0000 [ 447.631060][T23885] FAULT_INJECTION: forcing a failure. [ 447.631060][T23885] name failslab, interval 1, probability 0, space 0, times 0 [ 447.648018][ T29] audit: type=1326 audit(1740908391.892:17071): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23884 comm="syz.0.6496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f7c7fe2d169 code=0x7ffc0000 [ 447.659252][T23885] CPU: 1 UID: 0 PID: 23885 Comm: syz.0.6496 Not tainted 6.14.0-rc4-syzkaller-00278-gece144f151ac #0 [ 447.659345][T23885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 447.659416][T23885] Call Trace: [ 447.659425][T23885] [ 447.659435][T23885] dump_stack_lvl+0xf2/0x150 [ 447.659472][T23885] dump_stack+0x15/0x1a [ 447.659499][T23885] should_fail_ex+0x24a/0x260 [ 447.659612][T23885] ? audit_log_d_path+0x8e/0x150 [ 447.659710][T23885] should_failslab+0x8f/0xb0 [ 447.659749][T23885] __kmalloc_cache_noprof+0x4e/0x320 [ 447.659818][T23885] audit_log_d_path+0x8e/0x150 [ 447.659860][T23885] audit_log_d_path_exe+0x42/0x70 [ 447.659905][T23885] audit_log_task+0x1ec/0x250 [ 447.659989][T23885] audit_seccomp+0x68/0x130 [ 447.660026][T23885] __seccomp_filter+0x6fa/0x1180 [ 447.660057][T23885] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 447.660147][T23885] ? vfs_write+0x644/0x920 [ 447.660185][T23885] __secure_computing+0x9f/0x1c0 [ 447.660215][T23885] syscall_trace_enter+0xd1/0x1f0 [ 447.660245][T23885] ? fpregs_assert_state_consistent+0x83/0xa0 [ 447.660277][T23885] do_syscall_64+0xaa/0x1c0 [ 447.660387][T23885] ? clear_bhb_loop+0x55/0xb0 [ 447.660421][T23885] ? clear_bhb_loop+0x55/0xb0 [ 447.660469][T23885] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 447.660503][T23885] RIP: 0033:0x7f7c7fe2d169 [ 447.660524][T23885] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 447.660547][T23885] RSP: 002b:00007f7c7e497038 EFLAGS: 00000246 ORIG_RAX: 0000000000000080 [ 447.660570][T23885] RAX: ffffffffffffffda RBX: 00007f7c80045fa0 RCX: 00007f7c7fe2d169 [ 447.660586][T23885] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000400000000040 [ 447.660602][T23885] RBP: 00007f7c7e497090 R08: 0000000000000000 R09: 0000000000000000 [ 447.660636][T23885] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000000001 [ 447.660661][T23885] R13: 0000000000000000 R14: 00007f7c80045fa0 R15: 00007fff42a1d088 [ 447.660683][T23885] [ 447.682354][T23761] veth0_vlan: entered promiscuous mode [ 447.682967][ T29] audit: type=1326 audit(1740908391.892:17072): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23884 comm="syz.0.6496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7c7fe2d169 code=0x7ffc0000 [ 447.706226][T23761] veth1_vlan: entered promiscuous mode [ 447.707078][ T29] audit: type=1326 audit(1740908391.892:17073): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23884 comm="syz.0.6496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7c7fe2d169 code=0x7ffc0000 [ 447.776365][T23785] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 447.777551][ T29] audit: type=1326 audit(1740908391.892:17074): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23884 comm="syz.0.6496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7c7fe2d169 code=0x7ffc0000 [ 447.808648][T23761] veth0_macvtap: entered promiscuous mode [ 447.813059][ T29] audit: type=1326 audit(1740908391.892:17075): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23884 comm="syz.0.6496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7c7fe2d169 code=0x7ffc0000 [ 447.813091][ T29] audit: type=1326 audit(1740908391.892:17076): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23884 comm="syz.0.6496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=72 compat=0 ip=0x7f7c7fe2d169 code=0x7ffc0000 [ 447.856240][T23761] veth1_macvtap: entered promiscuous mode [ 447.857584][ T29] audit: type=1326 audit(1740908391.892:17077): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23884 comm="syz.0.6496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7c7fe2d169 code=0x7ffc0000 [ 447.910422][T23761] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 447.913679][ T29] audit: type=1326 audit(1740908391.892:17078): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23884 comm="syz.0.6496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat=0 ip=0x7f7c7fe2d169 code=0x7ffc0000 [ 447.919118][T23761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 447.921532][T23761] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 447.942700][ T29] audit: type=1326 audit(1740908391.892:17079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23884 comm="syz.0.6496" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7c7fe2d169 code=0x7ffc0000 [ 448.143515][T23785] veth0_vlan: entered promiscuous mode [ 448.159420][T23761] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 448.169957][T23761] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 448.180415][T23761] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 448.196698][T23785] veth1_vlan: entered promiscuous mode [ 448.205855][T23761] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 448.214696][T23761] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 448.223454][T23761] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 448.232229][T23761] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 448.311512][T23785] veth0_macvtap: entered promiscuous mode [ 448.428790][T23785] veth1_macvtap: entered promiscuous mode [ 448.480352][T23785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 448.490880][T23785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 448.500874][T23785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 448.511319][T23785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 448.526987][T23785] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 448.539861][T23785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 448.550351][T23785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 448.560271][T23785] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 448.570794][T23785] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 448.584002][T23921] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6469'. [ 448.593421][T23785] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 448.635779][T23785] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 448.644754][T23785] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 448.653631][T23785] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 448.662410][T23785] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 448.733166][T23927] wg2: entered promiscuous mode [ 448.738128][T23927] wg2: entered allmulticast mode [ 448.923889][T23932] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6506'. [ 449.097455][ T3372] usb 14-1: device descriptor read/8, error -110 [ 449.208469][ T3372] usb 14-1: new SuperSpeed USB device number 2 using vhci_hcd [ 449.227740][ T3372] usb 14-1: enqueue for inactive port 0 [ 449.233406][ T3372] usb 14-1: enqueue for inactive port 0 [ 449.239381][ T3372] usb 14-1: enqueue for inactive port 0 [ 449.511840][T23959] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 449.520562][T23959] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 449.798098][T23961] netlink: 'syz.0.6516': attribute type 13 has an invalid length. [ 449.811266][T23961] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 450.041748][T23970] loop3: detected capacity change from 0 to 512 [ 450.369833][T23972] wg2: left promiscuous mode [ 450.374490][T23972] wg2: left allmulticast mode [ 450.384454][T23973] wg2: entered promiscuous mode [ 450.389405][T23973] wg2: entered allmulticast mode [ 450.395782][T23970] EXT4-fs error (device loop3): ext4_validate_block_bitmap:432: comm syz.3.6517: bg 0: block 5: invalid block bitmap [ 450.409548][T23970] EXT4-fs error (device loop3) in ext4_mb_clear_bb:6550: Corrupt filesystem [ 450.418675][T23970] EXT4-fs error (device loop3): ext4_free_branches:1023: inode #11: comm syz.3.6517: invalid indirect mapped block 3 (level 2) [ 450.433170][T23970] EXT4-fs (loop3): 1 orphan inode deleted [ 450.439073][T23970] EXT4-fs (loop3): 1 truncate cleaned up [ 450.445156][T23970] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 450.589172][ T3372] usb usb14-port1: attempt power cycle [ 450.731785][T23761] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 450.753957][T23995] netlink: 'syz.0.6529': attribute type 13 has an invalid length. [ 450.771954][T23995] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 450.849974][T24003] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 450.858644][T24003] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 451.029792][T24004] chnl_net:caif_netlink_parms(): no params data found [ 451.066598][T24004] bridge0: port 1(bridge_slave_0) entered blocking state [ 451.073820][T24004] bridge0: port 1(bridge_slave_0) entered disabled state [ 451.081014][T24004] bridge_slave_0: entered allmulticast mode [ 451.088421][T24004] bridge_slave_0: entered promiscuous mode [ 451.095763][T24004] bridge0: port 2(bridge_slave_1) entered blocking state [ 451.103068][T24004] bridge0: port 2(bridge_slave_1) entered disabled state [ 451.110543][T24004] bridge_slave_1: entered allmulticast mode [ 451.117188][T24004] bridge_slave_1: entered promiscuous mode [ 451.139296][T24004] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 451.150185][T24004] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 451.161388][T24026] wg2: left promiscuous mode [ 451.166004][T24026] wg2: left allmulticast mode [ 451.182051][T24026] wg2: entered promiscuous mode [ 451.187020][T24026] wg2: entered allmulticast mode [ 451.200134][T24004] team0: Port device team_slave_0 added [ 451.212557][T24004] team0: Port device team_slave_1 added [ 451.247054][T24030] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24030 comm=syz.0.6537 [ 451.263925][T24030] block device autoloading is deprecated and will be removed. [ 451.273284][T24030] netlink: 197 bytes leftover after parsing attributes in process `syz.0.6537'. [ 451.341184][T15174] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 451.350911][T15174] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 451.361397][T15174] bond0 (unregistering): Released all slaves [ 451.385957][T24004] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 451.393089][T24004] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 451.419217][T24004] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 451.437660][T24004] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 451.444679][T24004] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 451.470731][T24004] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 451.544373][T24043] loop0: detected capacity change from 0 to 512 [ 451.641409][T15174] tipc: Disabling bearer [ 451.646657][T15174] tipc: Left network mode [ 451.675448][T24004] hsr_slave_0: entered promiscuous mode [ 451.690916][T24004] hsr_slave_1: entered promiscuous mode [ 451.711082][T24004] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 451.720034][T24004] Cannot create hsr debugfs directory [ 451.868622][T24043] EXT4-fs error (device loop0): ext4_validate_block_bitmap:432: comm syz.0.6539: bg 0: block 5: invalid block bitmap [ 451.882826][T24043] EXT4-fs error (device loop0) in ext4_mb_clear_bb:6550: Corrupt filesystem [ 451.892062][T24043] EXT4-fs error (device loop0): ext4_free_branches:1023: inode #11: comm syz.0.6539: invalid indirect mapped block 3 (level 2) [ 451.905911][T24043] EXT4-fs (loop0): 1 orphan inode deleted [ 451.911736][T24043] EXT4-fs (loop0): 1 truncate cleaned up [ 451.917750][T24043] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 451.941174][T24054] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6542'. [ 451.980637][T24054] bond2: entered promiscuous mode [ 451.985721][T24054] bond2: entered allmulticast mode [ 451.991407][T24054] 8021q: adding VLAN 0 to HW filter on device bond2 [ 452.002238][T24054] bond2 (unregistering): Released all slaves [ 452.057038][T15174] team0 (unregistering): Port device team_slave_1 removed [ 452.069250][T15174] team0 (unregistering): Port device team_slave_0 removed [ 452.212662][T17174] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 452.222280][T24065] wg2: entered promiscuous mode [ 452.227218][T24065] wg2: entered allmulticast mode [ 452.287680][T24071] wireguard5: entered promiscuous mode [ 452.289877][T24074] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 452.293189][T24071] wireguard5: entered allmulticast mode [ 452.321889][T24074] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 452.345324][T24032] chnl_net:caif_netlink_parms(): no params data found [ 452.370052][T24079] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6550'. [ 452.401301][T24004] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 452.433090][T24004] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 452.446890][T24004] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 452.455367][T24032] bridge0: port 1(bridge_slave_0) entered blocking state [ 452.462754][T24032] bridge0: port 1(bridge_slave_0) entered disabled state [ 452.471463][T24032] bridge_slave_0: entered allmulticast mode [ 452.478292][T24032] bridge_slave_0: entered promiscuous mode [ 452.485560][T24004] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 452.495667][T24032] bridge0: port 2(bridge_slave_1) entered blocking state [ 452.502772][T24032] bridge0: port 2(bridge_slave_1) entered disabled state [ 452.512498][T24032] bridge_slave_1: entered allmulticast mode [ 452.519157][T24032] bridge_slave_1: entered promiscuous mode [ 452.556572][T24094] loop0: detected capacity change from 0 to 1024 [ 452.582228][T24032] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 452.602162][T24004] 8021q: adding VLAN 0 to HW filter on device bond0 [ 452.610947][T24094] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 452.625024][ T29] kauditd_printk_skb: 108 callbacks suppressed [ 452.625043][ T29] audit: type=1326 audit(1740908396.882:17188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24091 comm="syz.0.6552" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f7c7fe2bad0 code=0x7ffc0000 [ 452.659350][T24032] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 452.699828][ T29] audit: type=1326 audit(1740908396.882:17189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24091 comm="syz.0.6552" exe="/root/syz-executor" sig=0 arch=c000003e syscall=80 compat=0 ip=0x7f7c7fe2beb7 code=0x7ffc0000 [ 452.723504][ T29] audit: type=1326 audit(1740908396.882:17190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24091 comm="syz.0.6552" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f7c7fe2bad0 code=0x7ffc0000 [ 452.747228][ T29] audit: type=1326 audit(1740908396.882:17191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24091 comm="syz.0.6552" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7c7fe2d169 code=0x7ffc0000 [ 452.770976][ T29] audit: type=1326 audit(1740908396.882:17192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24091 comm="syz.0.6552" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7c7fe2d169 code=0x7ffc0000 [ 452.794812][ T29] audit: type=1326 audit(1740908396.882:17193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24091 comm="syz.0.6552" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f7c7fe2d169 code=0x7ffc0000 [ 452.799923][ T3372] usb usb14-port1: unable to enumerate USB device [ 452.818260][ T29] audit: type=1326 audit(1740908396.882:17194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24091 comm="syz.0.6552" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7c7fe2d169 code=0x7ffc0000 [ 452.848264][ T29] audit: type=1326 audit(1740908396.882:17195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24091 comm="syz.0.6552" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7c7fe2d169 code=0x7ffc0000 [ 452.871956][ T29] audit: type=1326 audit(1740908396.882:17196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24091 comm="syz.0.6552" exe="/root/syz-executor" sig=0 arch=c000003e syscall=2 compat=0 ip=0x7f7c7fe2d169 code=0x7ffc0000 [ 452.895479][ T29] audit: type=1326 audit(1740908396.912:17197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24091 comm="syz.0.6552" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7c7fe2d169 code=0x7ffc0000 [ 452.932244][T24032] team0: Port device team_slave_0 added [ 452.943778][T24004] 8021q: adding VLAN 0 to HW filter on device team0 [ 452.965802][T24032] team0: Port device team_slave_1 added [ 452.988491][T15159] bridge0: port 1(bridge_slave_0) entered blocking state [ 452.995838][T15159] bridge0: port 1(bridge_slave_0) entered forwarding state [ 453.011894][T24032] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 453.019220][T24032] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 453.045458][T24032] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 453.059045][T24032] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 453.066074][T24032] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 453.092051][T24032] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 453.106396][T15159] bridge0: port 2(bridge_slave_1) entered blocking state [ 453.113500][T15159] bridge0: port 2(bridge_slave_1) entered forwarding state [ 453.125658][T15174] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 453.172111][T24032] hsr_slave_0: entered promiscuous mode [ 453.178958][T24032] hsr_slave_1: entered promiscuous mode [ 453.181198][T24108] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24108 comm=syz.3.6557 [ 453.188418][T24032] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 453.204987][T24032] Cannot create hsr debugfs directory [ 453.209283][T24108] block device autoloading is deprecated and will be removed. [ 453.226479][T24004] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 453.237014][T24004] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 453.251427][T24108] netlink: 197 bytes leftover after parsing attributes in process `syz.3.6557'. [ 453.280330][T17174] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 453.333419][T15174] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 453.345571][T24113] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24113 comm=syz.3.6559 [ 453.383493][T24113] netlink: 197 bytes leftover after parsing attributes in process `syz.3.6559'. [ 453.408808][T15174] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 453.439163][T24118] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6560'. [ 453.467142][T24004] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 453.505506][T15174] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 453.622187][T24144] loop3: detected capacity change from 0 to 512 [ 453.632369][T15174] bridge_slave_1: left allmulticast mode [ 453.638146][T15174] bridge_slave_1: left promiscuous mode [ 453.643882][T15174] bridge0: port 2(bridge_slave_1) entered disabled state [ 453.657770][T15174] bridge_slave_0: left allmulticast mode [ 453.663578][T15174] bridge_slave_0: left promiscuous mode [ 453.669380][T15174] bridge0: port 1(bridge_slave_0) entered disabled state [ 453.691092][T24144] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 453.723422][T24144] ext4 filesystem being mounted at /15/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 453.762955][T24144] EXT4-fs (loop3): shut down requested (0) [ 453.811273][T15174] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 453.822374][T15174] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 453.832001][T15174] bond0 (unregistering): Released all slaves [ 453.867280][T24004] veth0_vlan: entered promiscuous mode [ 453.889645][T24004] veth1_vlan: entered promiscuous mode [ 453.914644][T24004] veth0_macvtap: entered promiscuous mode [ 453.945578][T24144] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop3 ino=12 [ 453.949856][T24004] veth1_macvtap: entered promiscuous mode [ 453.969190][T24144] SELinux: inode_doinit_use_xattr: getxattr returned 5 for dev=loop3 ino=12 [ 453.988611][T24004] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 453.999222][T24004] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 454.009155][T24004] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 454.019736][T24004] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 454.029605][T24004] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 454.040161][T24004] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 454.059776][T24004] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 454.067282][T24032] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 454.077293][T23761] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 454.078923][T24032] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 454.101549][T15174] hsr_slave_0: left promiscuous mode [ 454.107200][T15174] hsr_slave_1: left promiscuous mode [ 454.113171][T15174] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 454.120645][T15174] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 454.138021][T15174] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 454.145490][T15174] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 454.160082][T15174] veth1_macvtap: left promiscuous mode [ 454.167417][T15174] veth0_macvtap: left promiscuous mode [ 454.177420][T15174] veth1_vlan: left promiscuous mode [ 454.187449][T15174] veth0_vlan: left promiscuous mode [ 454.286906][T15174] team0 (unregistering): Port device team_slave_1 removed [ 454.298774][T15174] team0 (unregistering): Port device team_slave_0 removed [ 454.336043][T24004] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 454.346650][T24004] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 454.356539][T24004] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 454.366996][T24004] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 454.381645][T24004] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 454.388992][T24032] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 454.402153][T24158] wireguard0: entered promiscuous mode [ 454.407796][T24158] wireguard0: entered allmulticast mode [ 454.441524][T24032] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 454.457447][T24004] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 454.466184][T24004] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 454.474959][T24004] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 454.483725][T24004] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 454.606141][T24165] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24165 comm=syz.0.6569 [ 454.649097][T24165] netlink: 197 bytes leftover after parsing attributes in process `syz.0.6569'. [ 454.690551][T24032] 8021q: adding VLAN 0 to HW filter on device bond0 [ 454.770603][T24032] 8021q: adding VLAN 0 to HW filter on device team0 [ 454.780695][T15166] bridge0: port 1(bridge_slave_0) entered blocking state [ 454.787836][T15166] bridge0: port 1(bridge_slave_0) entered forwarding state [ 454.805566][T24178] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6570'. [ 454.816075][T24178] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 454.823737][T24178] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 454.838360][T24178] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 454.845865][T24178] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 454.893134][T15166] bridge0: port 2(bridge_slave_1) entered blocking state [ 454.900295][T15166] bridge0: port 2(bridge_slave_1) entered forwarding state [ 454.920899][T24032] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 454.991088][T24032] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 455.165612][T24032] veth0_vlan: entered promiscuous mode [ 455.175156][T24032] veth1_vlan: entered promiscuous mode [ 455.192897][T24032] veth0_macvtap: entered promiscuous mode [ 455.202755][T24032] veth1_macvtap: entered promiscuous mode [ 455.213876][T24032] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 455.224437][T24032] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 455.234538][T24032] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 455.245014][T24032] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 455.258482][T24032] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 455.270841][T24032] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 455.281369][T24032] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 455.291259][T24032] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 455.301797][T24032] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 455.314312][T24032] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 455.324285][T24032] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 455.333171][T24032] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 455.341925][T24032] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 455.350701][T24032] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 455.461257][T24216] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24216 comm=syz.7.6580 [ 455.480056][T24216] block device autoloading is deprecated and will be removed. [ 455.504973][T24216] netlink: 197 bytes leftover after parsing attributes in process `syz.7.6580'. [ 455.643532][T24032] ================================================================== [ 455.651656][T24032] BUG: KCSAN: data-race in __dentry_kill / lookup_fast [ 455.658542][T24032] [ 455.660885][T24032] read-write to 0xffff888105202300 of 4 bytes by task 24004 on cpu 0: [ 455.669055][T24032] __dentry_kill+0x22e/0x4c0 [ 455.673684][T24032] dput+0x5c/0xd0 [ 455.677349][T24032] __fput+0x428/0x640 [ 455.681351][T24032] __fput_sync+0x96/0xc0 [ 455.685715][T24032] __x64_sys_close+0x55/0xe0 [ 455.690320][T24032] x64_sys_call+0x266c/0x2dc0 [ 455.695027][T24032] do_syscall_64+0xc9/0x1c0 [ 455.699616][T24032] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 455.705545][T24032] [ 455.707881][T24032] read to 0xffff888105202300 of 4 bytes by task 24032 on cpu 1: [ 455.715531][T24032] lookup_fast+0xe9/0x320 [ 455.719887][T24032] path_openat+0x41e/0x1fc0 [ 455.724411][T24032] do_filp_open+0x107/0x230 [ 455.728934][T24032] do_sys_openat2+0xab/0x120 [ 455.733541][T24032] __x64_sys_openat+0xf3/0x120 [ 455.738350][T24032] x64_sys_call+0x2b30/0x2dc0 [ 455.743048][T24032] do_syscall_64+0xc9/0x1c0 [ 455.747572][T24032] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 455.753477][T24032] [ 455.755798][T24032] value changed: 0x00400008 -> 0x00008008 [ 455.761513][T24032] [ 455.763834][T24032] Reported by Kernel Concurrency Sanitizer on: [ 455.769986][T24032] CPU: 1 UID: 0 PID: 24032 Comm: syz-executor Not tainted 6.14.0-rc4-syzkaller-00278-gece144f151ac #0 [ 455.781102][T24032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 455.791189][T24032] ================================================================== [ 457.274749][T24004] ================================================================== [ 457.282886][T24004] BUG: KCSAN: data-race in dentry_unlink_inode / step_into [ 457.290131][T24004] [ 457.292469][T24004] write to 0xffff88810532ec30 of 8 bytes by task 17044 on cpu 1: [ 457.300225][T24004] dentry_unlink_inode+0x65/0x260 [ 457.305277][T24004] __dentry_kill+0x18b/0x4c0 [ 457.309889][T24004] dput+0x5c/0xd0 [ 457.313556][T24004] __fput+0x428/0x640 [ 457.317553][T24004] __fput_sync+0x96/0xc0 [ 457.321820][T24004] __x64_sys_close+0x55/0xe0 [ 457.326426][T24004] x64_sys_call+0x266c/0x2dc0 [ 457.331129][T24004] do_syscall_64+0xc9/0x1c0 [ 457.335668][T24004] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 457.341592][T24004] [ 457.343930][T24004] read to 0xffff88810532ec30 of 8 bytes by task 24004 on cpu 0: [ 457.351574][T24004] step_into+0x11d/0x820 [ 457.355854][T24004] path_openat+0x13e5/0x1fc0 [ 457.360465][T24004] do_filp_open+0x107/0x230 [ 457.364986][T24004] do_sys_openat2+0xab/0x120 [ 457.369608][T24004] __x64_sys_openat+0xf3/0x120 [ 457.374389][T24004] x64_sys_call+0x2b30/0x2dc0 [ 457.379091][T24004] do_syscall_64+0xc9/0x1c0 [ 457.383620][T24004] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 457.389547][T24004] [ 457.391884][T24004] value changed: 0xffff8881256c9a78 -> 0x0000000000000000 [ 457.399009][T24004] [ 457.401347][T24004] Reported by Kernel Concurrency Sanitizer on: [ 457.407512][T24004] CPU: 0 UID: 0 PID: 24004 Comm: syz-executor Not tainted 6.14.0-rc4-syzkaller-00278-gece144f151ac #0 [ 457.418473][T24004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 457.428555][T24004] ================================================================== [ 457.518603][T24004] ================================================================== [ 457.526857][T24004] BUG: KCSAN: data-race in __dentry_kill / step_into [ 457.533592][T24004] [ 457.535931][T24004] read-write to 0xffff8881255d6840 of 4 bytes by task 24032 on cpu 1: [ 457.544097][T24004] __dentry_kill+0x22e/0x4c0 [ 457.548715][T24004] dput+0x5c/0xd0 [ 457.552373][T24004] __fput+0x428/0x640 [ 457.556374][T24004] __fput_sync+0x96/0xc0 [ 457.560636][T24004] __x64_sys_close+0x55/0xe0 [ 457.565251][T24004] x64_sys_call+0x266c/0x2dc0 [ 457.569955][T24004] do_syscall_64+0xc9/0x1c0 [ 457.574487][T24004] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 457.580406][T24004] [ 457.582743][T24004] read to 0xffff8881255d6840 of 4 bytes by task 24004 on cpu 0: [ 457.590378][T24004] step_into+0xe3/0x820 [ 457.594566][T24004] path_openat+0x13e5/0x1fc0 [ 457.599182][T24004] do_filp_open+0x107/0x230 [ 457.603710][T24004] do_sys_openat2+0xab/0x120 [ 457.608316][T24004] __x64_sys_openat+0xf3/0x120 [ 457.613095][T24004] x64_sys_call+0x2b30/0x2dc0 [ 457.617803][T24004] do_syscall_64+0xc9/0x1c0 [ 457.622345][T24004] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 457.628265][T24004] [ 457.630601][T24004] value changed: 0x00400008 -> 0x00008008 [ 457.636324][T24004] [ 457.638657][T24004] Reported by Kernel Concurrency Sanitizer on: [ 457.644819][T24004] CPU: 0 UID: 0 PID: 24004 Comm: syz-executor Not tainted 6.14.0-rc4-syzkaller-00278-gece144f151ac #0 [ 457.655886][T24004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 457.665972][T24004] ================================================================== [ 459.099089][T24004] ================================================================== [ 459.107222][T24004] BUG: KCSAN: data-race in __dentry_kill / lookup_fast [ 459.114113][T24004] [ 459.116448][T24004] read-write to 0xffff8881052023c0 of 4 bytes by task 17044 on cpu 1: [ 459.124610][T24004] __dentry_kill+0x22e/0x4c0 [ 459.129236][T24004] dput+0x5c/0xd0 [ 459.132935][T24004] __fput+0x428/0x640 [ 459.136931][T24004] __fput_sync+0x96/0xc0 [ 459.141206][T24004] __x64_sys_close+0x55/0xe0 [ 459.145818][T24004] x64_sys_call+0x266c/0x2dc0 [ 459.150523][T24004] do_syscall_64+0xc9/0x1c0 [ 459.155056][T24004] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 459.160980][T24004] [ 459.163312][T24004] read to 0xffff8881052023c0 of 4 bytes by task 24004 on cpu 0: [ 459.170945][T24004] lookup_fast+0xe9/0x320 [ 459.175281][T24004] path_openat+0x41e/0x1fc0 [ 459.179814][T24004] do_filp_open+0x107/0x230 [ 459.184336][T24004] do_sys_openat2+0xab/0x120 [ 459.188935][T24004] __x64_sys_openat+0xf3/0x120 [ 459.193716][T24004] x64_sys_call+0x2b30/0x2dc0 [ 459.198416][T24004] do_syscall_64+0xc9/0x1c0 [ 459.202963][T24004] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 459.208884][T24004] [ 459.211223][T24004] value changed: 0x00400008 -> 0x00008008 [ 459.216960][T24004] [ 459.219292][T24004] Reported by Kernel Concurrency Sanitizer on: [ 459.225456][T24004] CPU: 0 UID: 0 PID: 24004 Comm: syz-executor Not tainted 6.14.0-rc4-syzkaller-00278-gece144f151ac #0 [ 459.236409][T24004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 459.246487][T24004] ================================================================== [ 460.445988][T24004] ================================================================== [ 460.454125][T24004] BUG: KCSAN: data-race in __dentry_kill / fast_dput [ 460.460855][T24004] [ 460.463189][T24004] write to 0xffff888105236f10 of 8 bytes by task 17044 on cpu 1: [ 460.470925][T24004] __dentry_kill+0x13e/0x4c0 [ 460.475556][T24004] dput+0x5c/0xd0 [ 460.479221][T24004] __fput+0x428/0x640 [ 460.483220][T24004] __fput_sync+0x96/0xc0 [ 460.487472][T24004] __x64_sys_close+0x55/0xe0 [ 460.492075][T24004] x64_sys_call+0x266c/0x2dc0 [ 460.496771][T24004] do_syscall_64+0xc9/0x1c0 [ 460.501310][T24004] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 460.507224][T24004] [ 460.509563][T24004] read to 0xffff888105236f10 of 8 bytes by task 24004 on cpu 0: [ 460.517212][T24004] fast_dput+0x65/0x2c0 [ 460.521405][T24004] dput+0x24/0xd0 [ 460.525063][T24004] __fput+0x428/0x640 [ 460.529064][T24004] __fput_sync+0x96/0xc0 [ 460.533316][T24004] __x64_sys_close+0x55/0xe0 [ 460.537919][T24004] x64_sys_call+0x266c/0x2dc0 [ 460.542616][T24004] do_syscall_64+0xc9/0x1c0 [ 460.547150][T24004] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 460.553069][T24004] [ 460.555397][T24004] value changed: 0xffff88823744ca90 -> 0x0000000000000000 [ 460.562522][T24004] [ 460.564854][T24004] Reported by Kernel Concurrency Sanitizer on: [ 460.571007][T24004] CPU: 0 UID: 0 PID: 24004 Comm: syz-executor Not tainted 6.14.0-rc4-syzkaller-00278-gece144f151ac #0 [ 460.581959][T24004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 460.592036][T24004] ================================================================== [ 463.162063][T17044] ================================================================== [ 463.170195][T17044] BUG: KCSAN: data-race in __dentry_kill / step_into [ 463.176929][T17044] [ 463.179263][T17044] read-write to 0xffff8881053f09c0 of 4 bytes by task 24032 on cpu 0: [ 463.187421][T17044] __dentry_kill+0x22e/0x4c0 [ 463.192047][T17044] dput+0x5c/0xd0 [ 463.195723][T17044] do_unlinkat+0x258/0x4d0 [ 463.200185][T17044] __x64_sys_unlink+0x2e/0x40 [ 463.204896][T17044] x64_sys_call+0x2329/0x2dc0 [ 463.209595][T17044] do_syscall_64+0xc9/0x1c0 [ 463.214135][T17044] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 463.220050][T17044] [ 463.222381][T17044] read to 0xffff8881053f09c0 of 4 bytes by task 17044 on cpu 1: [ 463.230019][T17044] step_into+0xe3/0x820 [ 463.234215][T17044] path_openat+0x13e5/0x1fc0 [ 463.238831][T17044] do_filp_open+0x107/0x230 [ 463.243343][T17044] do_sys_openat2+0xab/0x120 [ 463.247946][T17044] __x64_sys_openat+0xf3/0x120 [ 463.252721][T17044] x64_sys_call+0x2b30/0x2dc0 [ 463.257429][T17044] do_syscall_64+0xc9/0x1c0 [ 463.261975][T17044] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 463.267896][T17044] [ 463.270231][T17044] value changed: 0x00400008 -> 0x00008008 [ 463.275964][T17044] [ 463.278290][T17044] Reported by Kernel Concurrency Sanitizer on: [ 463.284448][T17044] CPU: 1 UID: 0 PID: 17044 Comm: syz-executor Not tainted 6.14.0-rc4-syzkaller-00278-gece144f151ac #0 [ 463.295408][T17044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 463.305568][T17044] ================================================================== [ 463.565221][T17044] ================================================================== [ 463.573372][T17044] BUG: KCSAN: data-race in __dentry_kill / fast_dput [ 463.580108][T17044] [ 463.582448][T17044] write to 0xffff8881051f9490 of 8 bytes by task 24032 on cpu 0: [ 463.590170][T17044] __dentry_kill+0x13e/0x4c0 [ 463.594795][T17044] dput+0x5c/0xd0 [ 463.598471][T17044] do_unlinkat+0x258/0x4d0 [ 463.602917][T17044] __x64_sys_unlink+0x2e/0x40 [ 463.607627][T17044] x64_sys_call+0x2329/0x2dc0 [ 463.612343][T17044] do_syscall_64+0xc9/0x1c0 [ 463.616875][T17044] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 463.622805][T17044] [ 463.625140][T17044] read to 0xffff8881051f9490 of 8 bytes by task 17044 on cpu 1: [ 463.632778][T17044] fast_dput+0x65/0x2c0 [ 463.636970][T17044] dput+0x24/0xd0 [ 463.640632][T17044] __fput+0x428/0x640 [ 463.644630][T17044] __fput_sync+0x96/0xc0 [ 463.648891][T17044] __x64_sys_close+0x55/0xe0 [ 463.653506][T17044] x64_sys_call+0x266c/0x2dc0 [ 463.658215][T17044] do_syscall_64+0xc9/0x1c0 [ 463.662760][T17044] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 463.668684][T17044] [ 463.671010][T17044] value changed: 0xffff88823744ca90 -> 0x0000000000000000 [ 463.678130][T17044] [ 463.680469][T17044] Reported by Kernel Concurrency Sanitizer on: [ 463.686712][T17044] CPU: 1 UID: 0 PID: 17044 Comm: syz-executor Not tainted 6.14.0-rc4-syzkaller-00278-gece144f151ac #0 [ 463.697666][T17044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 463.707737][T17044] ================================================================== [ 464.732856][T24032] ================================================================== [ 464.740989][T24032] BUG: KCSAN: data-race in dentry_unlink_inode / step_into [ 464.748241][T24032] [ 464.750577][T24032] write to 0xffff8881051241b0 of 8 bytes by task 24004 on cpu 1: [ 464.758398][T24032] dentry_unlink_inode+0x65/0x260 [ 464.763452][T24032] __dentry_kill+0x18b/0x4c0 [ 464.768072][T24032] dput+0x5c/0xd0 [ 464.771762][T24032] __fput+0x428/0x640 [ 464.775775][T24032] __fput_sync+0x96/0xc0 [ 464.780033][T24032] __x64_sys_close+0x55/0xe0 [ 464.784651][T24032] x64_sys_call+0x266c/0x2dc0 [ 464.789353][T24032] do_syscall_64+0xc9/0x1c0 [ 464.793889][T24032] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 464.799815][T24032] [ 464.802151][T24032] read to 0xffff8881051241b0 of 8 bytes by task 24032 on cpu 0: [ 464.809798][T24032] step_into+0x11d/0x820 [ 464.814071][T24032] path_openat+0x13e5/0x1fc0 [ 464.818690][T24032] do_filp_open+0x107/0x230 [ 464.823221][T24032] do_sys_openat2+0xab/0x120 [ 464.827834][T24032] __x64_sys_openat+0xf3/0x120 [ 464.832609][T24032] x64_sys_call+0x2b30/0x2dc0 [ 464.837307][T24032] do_syscall_64+0xc9/0x1c0 [ 464.841841][T24032] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 464.847760][T24032] [ 464.850099][T24032] value changed: 0xffff888100731340 -> 0x0000000000000000 [ 464.857217][T24032] [ 464.859546][T24032] Reported by Kernel Concurrency Sanitizer on: [ 464.865703][T24032] CPU: 0 UID: 0 PID: 24032 Comm: syz-executor Not tainted 6.14.0-rc4-syzkaller-00278-gece144f151ac #0 [ 464.876657][T24032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 464.886729][T24032] ==================================================================