last executing test programs: 8m35.657344613s ago: executing program 32 (id=48): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000005"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(r2, 0xfffffffffffffedb, &(0x7f00000002c0)=0x2) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r3, &(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8822d55593a2179}, 0xc) r4 = socket$inet6(0xa, 0x3, 0x87) setsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000280)={{{@in=@broadcast, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x4, 0x0, 0x80000000, 0x6, 0x9, 0x0, 0x40000000000000}, {0x0, 0x6, 0x53e5, 0x20}, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1}, {{@in=@empty, 0x0, 0x32}, 0x2, @in6=@private1={0xfc, 0x1, '\x00', 0xfd}, 0x1502, 0x4, 0x0, 0x0, 0x4, 0xfffffffd, 0x1}}, 0xe8) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x4a, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='attr/fscreate\x00') rt_sigprocmask(0x0, &(0x7f0000000100)={[0xfffffffffffe]}, 0x0, 0x8) r6 = gettid() timer_create(0x3, &(0x7f0000000180)={0x0, 0x17, 0x4, @tid=r6}, &(0x7f0000000080)) timer_settime(0x0, 0x236bd4336e4642df, &(0x7f0000000300)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) rt_sigtimedwait(&(0x7f0000000240)={[0xffffffffffffffff]}, 0x0, 0x0, 0x8) writev(r5, &(0x7f00000000c0)=[{&(0x7f0000000040)="dc", 0x1}], 0x8) 8m32.721497824s ago: executing program 2 (id=75): syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000005"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='9p_protocol_dump\x00', r2}, 0x10) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000a40)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@version_u}]}}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='mm_compaction_begin\x00', r1, 0x0, 0x8}, 0x18) r5 = socket$kcm(0x10, 0x100000000002, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340), 0xfffffffffffffe19, 0x0, 0xffffffffffffffff, 0x54, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x42) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8, 0x0, 0x100}, 0x18) lsm_get_self_attr(0x69, 0x0, &(0x7f00000004c0), 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x32, &(0x7f0000000040)=r6, 0x4) sendmsg$kcm(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000200)="39000000140081ae00002c000500015601618575e285af0180000000171300883795c04a31ba377a1b2cc32b38d3740000ffffffffffffffff", 0x39}], 0x1, 0x0, 0x0, 0xc00e}, 0x0) 8m32.060211418s ago: executing program 2 (id=80): ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'erspan0\x00', &(0x7f0000000140)={'gretap0\x00', 0x0, 0x80, 0x1, 0x8001, 0x10001, {{0x8, 0x4, 0x2, 0x5, 0x20, 0x68, 0x0, 0x7f, 0x29, 0x0, @remote, @private=0xa010101, {[@rr={0x7, 0xb, 0xf, [@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}]}}}}}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000240), 0x4) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES8, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r0}, 0x10) gettid() timer_create(0x0, 0x0, &(0x7f0000bbdffc)) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x800000000003}, 0x1132c, 0xffffffff, 0x3, 0x5, 0x4, 0x1088f109, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x130) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065fffff53000000800395032303030"], 0x15) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000300)=ANY=[], 0x15) r3 = dup(r2) write$P9_RLERRORu(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) stat(&(0x7f0000000240)='./file0\x00', 0x0) 8m32.027473059s ago: executing program 33 (id=80): ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'erspan0\x00', &(0x7f0000000140)={'gretap0\x00', 0x0, 0x80, 0x1, 0x8001, 0x10001, {{0x8, 0x4, 0x2, 0x5, 0x20, 0x68, 0x0, 0x7f, 0x29, 0x0, @remote, @private=0xa010101, {[@rr={0x7, 0xb, 0xf, [@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}]}}}}}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000240), 0x4) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES8, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r0}, 0x10) gettid() timer_create(0x0, 0x0, &(0x7f0000bbdffc)) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x800000000003}, 0x1132c, 0xffffffff, 0x3, 0x5, 0x4, 0x1088f109, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x130) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065fffff53000000800395032303030"], 0x15) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000300)=ANY=[], 0x15) r3 = dup(r2) write$P9_RLERRORu(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) stat(&(0x7f0000000240)='./file0\x00', 0x0) 8m31.268146264s ago: executing program 34 (id=92): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x800000000003}, 0x1320, 0xffffffff, 0x3, 0x5, 0x1, 0x1088f109, 0x6, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a000020095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000200)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='\n\x00\x00\x00'], 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.numa_stat\x00', 0x275a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0x8004587d, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0, 0x6}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000002c0)={'team0\x00', 0x0}) bind$xdp(r3, &(0x7f0000000300)={0x2c, 0x2, r4, 0x1c}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001480)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@private=0xa010100, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x67}, {@in6=@empty, 0x4d0, 0x32}, @in=@dev, {0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1ff}, {0x0, 0x200000000, 0x0, 0x100000}, {}, 0x70bd26, 0x3505, 0x2, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}, 0x1, 0x0, 0x0, 0x8800}, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000240), 0xffffffffffffffff) r6 = io_uring_setup(0x7d98, &(0x7f00000003c0)={0x0, 0xdf07, 0x2, 0x2}) r7 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r7, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r7, 0x8957) r8 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r8, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) close_range(r6, 0xffffffffffffffff, 0x0) 8m29.719300265s ago: executing program 35 (id=109): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000020000000c00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000003"], 0x50) keyctl$setperm(0x5, 0x0, 0x40212) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x61, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='vm_unmapped_area\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYRES32=r0], 0x48) r5 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setlease(r5, 0x400, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000100000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r6}, 0x10) r7 = inotify_init() creat(&(0x7f0000000100)='./file0\x00', 0xd931d3864d39dcca) inotify_add_watch(r7, &(0x7f0000000240)='./file0\x00', 0x8c7) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={r5, 0x20, &(0x7f0000000180)={&(0x7f00000000c0)=""/192, 0xc0, 0x0, &(0x7f0000000340)=""/19, 0x13}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000100)=@framed={{0x18, 0x2}, [@map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2000}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x1, 0x1c, &(0x7f0000000d80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x5}, [@btf_id={0x18, 0x4, 0x3, 0x0, 0x2}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @exit, @generic={0x4, 0x5, 0x0, 0x100, 0x1}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x401}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}, @map_val={0x18, 0x0, 0x2, 0x0, r2}]}, &(0x7f00000004c0)='syzkaller\x00', 0x800, 0x56, &(0x7f0000000e80)=""/86, 0x41000, 0x20, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r8, r1, 0x2, &(0x7f0000000500)=[0xffffffffffffffff, r2, r2], &(0x7f0000000580)=[{0x0, 0x2, 0xc, 0xb}, {0x4, 0x1, 0x0, 0x8}], 0x10, 0x480000, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xd, &(0x7f00000005c0)=ANY=[@ANYBLOB="64c77458b4da46bb31ac0063719228c9e20f5d586e4f502727e24b99671f2f3138999763b2e0e64d8995ff8d1eaff9", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b70400000000000085000000"], &(0x7f0000000540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r9, 0x0, 0x80000000000000}, 0x18) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a010100000000000000000a0000000900010073797a300000000048000000030a010200000000000000000a0000000900010073797a30000000000900030073797a3100000000080007006e617400140004800800014000000000080002"], 0xa4}}, 0x0) 7m58.133089709s ago: executing program 36 (id=536): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a000020095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000200)='kmem_cache_free\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f"], 0x50) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.numa_stat\x00', 0x275a, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_genetlink_get_family_id$tipc(&(0x7f0000000240), 0xffffffffffffffff) r1 = io_uring_setup(0x7d98, &(0x7f00000003c0)={0x0, 0xdf07, 0x2, 0x2}) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r2, 0x8957) r3 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r3, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) r4 = accept4(r2, 0x0, 0x0, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r4, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x3c, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRET={0x8, 0x4, [0x3]}, @SEG6_ATTR_DST={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_SECRET={0x4}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20040100}, 0x24000000) close_range(r1, 0xffffffffffffffff, 0x0) 7m56.6291538s ago: executing program 37 (id=553): socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioperm(0x5, 0x8004, 0x6) setrlimit(0x7, &(0x7f0000000400)) bpf$MAP_CREATE(0x0, 0x0, 0x48) unshare(0x2040400) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000c00)=ANY=[@ANYBLOB="240000000408010800800000000000000f0000010600024000f5f2ff0400030088000000105201226282bf046576aed9cd75dac661951b6afca0f8269ae938aa60c2273b456ea8b2300184e2a9063401640180b4bcc108dd1f9bb7100c0b78066b07e7d1f7f77710ceeadd558d7fa807aa8e2c79b43ffffbde22ebb79f393a2f4f7315b6171d14d391dcd0c4e42caf04006695d2f1375872faba029e172d4b3ce7f647f349b7c137b09b10b4c73b667886f2a047951f7bc71e05f361fe618d7c20502302c0e1eb26e9a71e04e481384ef58d38d32215df73dbeb30b5fb2d902b1df26e7ff7afdcb71b9e5d07f032b4e6"], 0x24}, 0x1, 0x0, 0x0, 0x4004000}, 0x4040800) unshare(0x24040000) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000440)='kmem_cache_free\x00', r2}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffd}]}) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) setgid(0xffffffffffffffff) openat$tun(0xffffffffffffff9c, 0x0, 0x40241, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000200000005"], 0x48) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f0000008500000005"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2010008, &(0x7f0000000080), 0xff, 0x52d, &(0x7f0000000640)="$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") bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) copy_file_range(0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, 0x0) 7m49.699707249s ago: executing program 3 (id=615): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000140)='./file2\x00', 0x404, &(0x7f0000000000), 0x1, 0x42f, &(0x7f0000000940)="$eJzs289rHFUcAPDvzCat/WViqT+aVo1WMfgjadJae/CiKHhQEPRQjzFJS+y2kSaCLUGjSD1Kwbt4FPwLPOlF1JPgVe9SKJJLq6eV2Z1Jdje7aZJustX9fGCS92be8t53Z97ue/N2AuhZw9mfJGJ/RPweEQO1bGOB4dq/W8uLU38vL04lUam89VdSLXdzeXGqKFq8bl+R6YtIP0viSIt65y9fOT9ZLs9cyvNjCxfeH5u/fOW52QuT52bOzVycOH365InxF05NPN+ROLO4bg59NHf08GvvXHtj6sy1d3/+Ninib4qjQ4bXO/hkpdLh6rrrQF066etiQ9iUUq2bRn+1/w9EKVZP3kC8+mlXGwdsq0qlUnmg/eGlCvA/lkS3WwB0R/FFn81/i22Hhh53hRsv1SZAWdy38q12pC/SvEx/0/y2k4Yj4szSP19lW2zPfQgAgAbfZ+OfZ1uN/9Kovy90b76GMhgR90XEwYg4FRGHIuL+iGrZByPioU3W37xIsnb8k17fUmAblI3/XszXthrHf8XoLwZLee5ANf7+5OxseeZ4/p6MRP/uLD++Th0/vPLbF+2O1Y//si2rvxgL5u243re78TXTkwuTdxJzvRufRAz1tYo/WVkJSCLicEQMbbGO2ae/Odru2O3jX0cH1pkqX0c8VTv/S9EUfyFZf31y7J4ozxwfK66KtX759eqb7eq/o/g7IDv/e1te/yvxDyb167Xzm6/j6h+ft53TbPX635W83bDvw8mFhUvjEbuS12uNrt8/0VRuYrV8Fv/Isdb9/2CsvhNHIiK7iB+OiEci4tG87Y9FxOMRcWyd+H96+Yn3th7/9srin97U+V9N7IrmPa0TpfM/ftdQ6eBm4s/O/8lqaiTfs5HPv420a2tXMwAAAPz3pBGxP5J0dCWdpqOjtd/wH4q9aXlufuGZs3MfXJyuPSMwGP1pcadroO5+6Hg+rS/yE035E/l94y9Le6r50am58nS3g4cet69N/8/8Wep264Bt53kt6F36P/Qu/R96l/4PvatF/9/TjXYAO6/V9//HXWgHsPOa+r9lP+gh5v/Qu/R/6F36P/Sk+T1x+4fkJSTWJCK9K5ohsU2Jbn8yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdMa/AQAA//9QOObV") r0 = socket$kcm(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r4, 0x1, 0x70bd26, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r2}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040010}, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000640)=0x1800, 0x4) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @dev, 0x5}, 0x80, 0x0}, 0x24004059) close(r0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f00000004c0), 0x208e24b) 7m45.720412067s ago: executing program 38 (id=665): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000a80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) syz_emit_ethernet(0x4a, &(0x7f0000000680)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "00ed6a", 0x14, 0x2c, 0x0, @remote, @local, {[], {{0x2c00, 0x3, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 7m45.078611752s ago: executing program 3 (id=675): sendmsg$DEVLINK_CMD_RATE_NEW(0xffffffffffffffff, 0x0, 0x8000) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_io_uring_submit(0x0, 0x0, 0x0) add_key$user(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) r1 = syz_io_uring_setup(0x1114, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x21e}, &(0x7f00000001c0)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_WRITEV={0x2, 0x9, 0x2000, @fd_index=0x7, 0xd, 0x0, 0x0, 0x10, 0x1, {0x2}}) io_uring_enter(r1, 0x47fa, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000001380), r0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r4, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4040898}, 0x200040b4) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xd, &(0x7f0000000280)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r7 = mq_open(0x0, 0x42, 0x0, 0x0) mq_timedsend(r7, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r7, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000180)='rpcgss_import_ctx\x00', r5, 0x0, 0x4}, 0x18) mq_unlink(&(0x7f0000000000)='eth0\x00') close(r7) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800fb240c1000000001b518110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r6}, &(0x7f0000000000), &(0x7f00000005c0)=r8}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) socket$rds(0x15, 0x5, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r0, 0x0, 0x0) 7m44.765140184s ago: executing program 3 (id=679): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa1", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x0, 0x0) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) close_range(r2, 0xffffffffffffffff, 0x0) 7m44.758468854s ago: executing program 3 (id=680): syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000000)='./bus\x00', 0x280008a, &(0x7f0000000240)=ANY=[@ANYBLOB='shortname=lower,shortname=win95,rodir,iocharset=default,uni_xlate=0,nonumtail=1,utf8=0,flush,rodir,shortname=win95,shortname=winnt,shortname=win95,showexec,uni_xlate=0,utf8=0,utf8=0,uni_xlate=0,shortname=mixed,\x00'], 0x97, 0x2ad, &(0x7f00000007c0)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.stat\x00', 0x275a, 0x0) utimensat(r1, 0x0, 0x0, 0x0) mknodat(r1, &(0x7f0000000040)='./bus\x00', 0x8000, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000000), 0xfffffd26) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x401c5820, &(0x7f00000001c0)=0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x105042, 0x189) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) write$binfmt_format(r4, &(0x7f0000000000)='1\x00', 0x2400) 7m44.679852415s ago: executing program 3 (id=681): syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000000)='./bus\x00', 0x280008a, &(0x7f0000000240)=ANY=[@ANYBLOB='shortname=lower,shortname=win95,rodir,iocharset=default,uni_xlate=0,nonumtail=1,utf8=0,flush,rodir,shortname=win95,shortname=winnt,shortname=win95,showexec,uni_xlate=0,utf8=0,utf8=0,uni_xlate=0,shortname=mixed,\x00'], 0x97, 0x2ad, &(0x7f00000007c0)="$eJzs3b9rO2UYAPDn0jQJOiSCkwge6OD05dvv6pIiLRQzKRnUQYttQZogtFDwB8ZOri6Ori6C4OY/4eJ/ILgKbhYsnNzlrklqGpPatP74fJa+fe953nve69uWDvf03eeHxwdpHJ1/8lO0WknUutGNiyQ6UYvKZzGj+0UAAP9mF1kWv2Zjq+QlEdFaX1kAwBqt/Pv/u7WXBACs2RtvvvXadq+383qatmJ3+PlZP//LPv84vr59FO/HIA7jcbTjMiK7Mh7vZlk2qqe5Trw0HJ3188zhOz+U62//ElHkb0U7OsXUbP5eb2crHZvKH+V1PFXev5vnP4l2PDvn/nu9nSdz8qPfiJdfnKr/UbTjx/figxjEQVHEOD9qEZ9upemr2Ze/ffx2Xl6en4zO+s0ibiLbuOcvDQAAAAAAAAAAAAAAAAAAAAAA/2GPyt45zSj69+RTZf+djcv8k81IK53Z/jzj/KRa6Fp/oFEWX1X9eR6naZqVgZP8ejxXj/rD7BoAAAAAAAAAAAAAAAAAAAD+WU4//Oh4fzA4PLmTQdUNoHqt/7brdKdmXojFwc3JvWrlcMHKsVHFJBELy8g3sXTNv5dtD2736J65qeZvvl16na//eu/lYHOJmL85qE7X8X4y/xk2o5ppVYfk++mYRix5r8ZNl7KVjl9j7qX2yntvPF0MRgtiIllU2Cs/j59cOZNc30WjeKpz0zfLwVT6bExr+fOcf6f8SXLVrSO52x9CAAAAAAAAAAAAAAAAAABAYfLS75yL5wtTa1lzbWUBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwL2a/P//FQajMnmJ4EacnD7wFgEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPgf+CMAAP//SfdjDw==") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.stat\x00', 0x275a, 0x0) utimensat(r1, 0x0, 0x0, 0x0) mknodat(r1, &(0x7f0000000040)='./bus\x00', 0x8000, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000000), 0xfffffd26) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x401c5820, &(0x7f00000001c0)=0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x105042, 0x189) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xb, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) write$binfmt_format(r4, &(0x7f0000000000)='1\x00', 0x2400) 7m42.709138909s ago: executing program 2 (id=666): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000009f020000000000000c8d33ad0e4aa0b6b4d747524db5f46b6dd5ff9e51a80a6b17d7f024fcbf1547edc1196055b5261755ee53835c1878607b674a788abd24a5cce53d9f3964508f674a4c04cbf9955902b82d61d55a6027182fa4e87a3c906d2131ff28089c1d3b5cacd93748fe0442e785", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xf, &(0x7f00000004c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='sys_enter\x00', r1}, 0x10) (async) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000001300000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) syz_open_dev$usbfs(&(0x7f0000000100), 0x205, 0x8401) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendmsg$AUDIT_GET(r5, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x3e8, 0x100, 0x70bd27, 0x25dfdbfd, "", ["", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4000}, 0x40840) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB="5c0000002000010000000000000000000220000000000000000000000500150002000000080009000000000008000b0005000000080017004e214e22080001"], 0x5c}}, 0x0) (async) r6 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000380)={'vcan0\x00', 0x0}) bind$can_raw(r5, &(0x7f0000000400)={0x1d, r7}, 0x10) (async) quotactl$Q_SYNC(0x76b60cc63e79929c, 0x0, 0x0, 0x0) (async) sendmsg$nl_route(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000300)=ANY=[@ANYBLOB='\\\x00\x00\x00!'], 0x5c}}, 0x0) (async) preadv(r5, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) 7m42.644911079s ago: executing program 2 (id=702): syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000000)='./bus\x00', 0x280008a, &(0x7f0000000240)=ANY=[@ANYBLOB='shortname=lower,shortname=win95,rodir,iocharset=default,uni_xlate=0,nonumtail=1,utf8=0,flush,rodir,shortname=win95,shortname=winnt,shortname=win95,showexec,uni_xlate=0,utf8=0,utf8=0,uni_xlate=0,shortname=mixed,\x00'], 0x97, 0x2ad, &(0x7f00000007c0)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.stat\x00', 0x275a, 0x0) utimensat(r1, 0x0, 0x0, 0x0) mknodat(r1, &(0x7f0000000040)='./bus\x00', 0x8000, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000000), 0xfffffd26) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x401c5820, &(0x7f00000001c0)=0x8) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r4) write$binfmt_format(0xffffffffffffffff, &(0x7f0000000000)='1\x00', 0x2400) 7m42.589601539s ago: executing program 2 (id=704): syz_emit_ethernet(0x7a, 0x0, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000300), 0xffffffffffffffff) process_madvise(0xffffffffffffffff, 0x0, 0x0, 0x15, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000400000000dfffff1918120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00'}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000180)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x408e, &(0x7f0000000780)={[{@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2e}}, {@resuid}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x80}}, {@stripe={'stripe', 0x3d, 0x4000}}, {@dax_never}, {@max_batch_time={'max_batch_time', 0x3d, 0x4}}], [{@fowner_lt}, {@uid_gt={'uid>', 0xee01}}, {@measure}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@uid_gt}, {@smackfshat={'smackfshat', 0x3d, 'ext4\x00'}}]}, 0x3, 0x43a, &(0x7f0000000340)="$eJzs28tvG0UYAPBv13FKXySU8ugDCBRExCNp0gI9cAGBxAEkJDiUY0jSqtRtUBMkWlUQECpHVIk74ojEX8AJLgg4IXGFO6pUoVxaOBmtvZs4jp0mwY5L/ftJm8zsjjPzeXbs2Z1sAH1rJPuRROyJiN8jYqieXV1gpP7r5tLl6b+XLk8nUa2+9VdSK3dj6fJ0UbR43e48M5pGpJ8lcahFvfMXL52dqlRmL+T58YVz74/PX7z07JlzU6dnT8+enzxx4vixiReen3yuI3Fmbbpx8KO5wwdee+fqG9Mnr77787dJEX9THB0yst7BJ6rVDlfXW3sb0slADxvCppQiIuuucm38D0UpVjpvKF79tKeNA7qqWq1Wd7c/vFgF7mBJbLTk2fzzArgzFF/02fVvsW3T1OO2cP2l+gVQFvfNfKsfGYg0L1Nuur7tpJGIOLn4z1fZFt25DwEAsMr32fznmVbzvzTubyh3d742NBwR90TEvoi4NyL2R8R9EbWyD0TEg5usv3mRZO38J722pcA2KJv/vZivba2e/xWzvxgu5bm9tfjLyakzldmj+XsyGuUdWX5inTp+eOW3L9oda5z/ZVtWfzEXzNtxbWDH6tfMTC1M/ZeYG13/JOLgQKv4k+WVgCQiDkTEwS3Wceapbw63O9Yu/vJG/nAH1pmqX0c8We//xWiKv5Csvz45fldUZo+OF2fFWr/8euXNdvXfuv+7K+v/XS3P/+X4h5PG9dr5zddx5Y/P217TbPX8H0zerqUH830fTi0sXJiIGExerze6cf/kymuLfFE+i3/0SOvxvy9W3olDEZGdxA9FxMMR8Uje9kcj4rGIOLJO/D+9/Ph7W4+/u7L4ZzbV/yuJwWje0zpROvvjd6sqHd5M/Fn/H6+lRvM9G/n820i7tnY2AwAAwP9PGhF7IknHltNpOjZW/3/5/bErrczNLzx9au6D8zP1ZwSGo5wWd7qGGu6HTuSX9UV+sil/LL9v/GVpZy0/Nj1Xmel18NDndrcZ/5k/S71uHdB1nteC/mX8Q/8y/qF/Gf/Qv1qM/529aAew/Vp9/3/cg3YA269p/Fv2gz7i+h/6l/EP/cv4h740vzNu/ZC8hMSaRKS3RTMkupTo9ScTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAZ/wbAAD//9E940M=") ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0xc020662a, &(0x7f00000002c0)={0x0, 0x6930, 0x5, 0x1}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000000000f6000000006debff00850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r2}, 0x10) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0xfc114d1786e3f5c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) r4 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) r5 = fsmount(r4, 0x0, 0x0) fchdir(r5) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200003, 0x0, 0x0, 0x3}) fchmod(0xffffffffffffffff, 0x20049549e2a2d659) 7m41.355958249s ago: executing program 9 (id=711): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00"/11], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r3 = fcntl$dupfd(r2, 0x0, r2) read$usbfs(r3, 0x0, 0x23) write$tun(r3, &(0x7f0000000400)=ANY=[], 0xa2) 7m41.244957379s ago: executing program 9 (id=712): socket$pppoe(0x18, 0x1, 0x0) (async) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f00000000c0)='./mnt\x00', 0x2000c16, &(0x7f0000000040)={[{@nobh}, {@usrjquota}]}, 0xff, 0x250, &(0x7f0000000600)="$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") (async) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x130) (async) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x51) (async) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70200001400001cb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='kfree\x00', r3, 0x0, 0x8}, 0x18) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) (async) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = dup2(r4, r5) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={0x34, 0x0, 0x8, 0x801, 0x0, 0x0, {0x1, 0x0, 0x5}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_DATA={0x4, 0x4, 0x0, 0x1, @icmpv6}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x15}]}, 0x34}, 0x1, 0x0, 0x0, 0x4078}, 0x4000180) (async) write$9p(r0, &(0x7f0000001400)="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", 0x200) (async) sendfile(r0, r1, 0x0, 0xe065) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) r8 = socket(0x400000000010, 0x3, 0x0) (async) r9 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) linkat(0xffffffffffffffff, 0x0, r7, 0x0, 0x1000) (async) sendmsg$nl_route_sched(r8, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x5c, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r10, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x0, 0x6, 0x4, 0xfffffffb, 0x2, 0xae1, 0x7}}, {0x4}}]}]}, 0x5c}}, 0x0) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x65) (async) r11 = socket(0xb, 0x4, 0x4) (async) r12 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r11, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x24, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r13, {0x0, 0xfff1}, {0xffff, 0xffff}}}, 0x24}}, 0x20000000) 7m41.244386509s ago: executing program 9 (id=713): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@bloom_filter={0x1e, 0x8, 0x8, 0x3, 0x400, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x4, 0xd, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x1, 0x3, 0x1, 0x800, r0, 0xff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x3, 0x7, @void, @value, @void, @value}, 0x50) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r1) sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000001}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r2, 0x4, 0x70bd26, 0x25dfdbff, {{}, {}, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", ""]}, 0x28}}, 0x84000) r3 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$EXT4_IOC_GETSTATE(r1, 0x40046629, &(0x7f0000000200)) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f00000001c0)={'bond_slave_0\x00'}) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000700)={0x14, 0x15, 0x1, 0x70bd29, 0x0, {0x2}}, 0x14}}, 0x0) 7m41.205675399s ago: executing program 9 (id=714): syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000000)='./bus\x00', 0x280008a, &(0x7f0000000240)=ANY=[@ANYBLOB='shortname=lower,shortname=win95,rodir,iocharset=default,uni_xlate=0,nonumtail=1,utf8=0,flush,rodir,shortname=win95,shortname=winnt,shortname=win95,showexec,uni_xlate=0,utf8=0,utf8=0,uni_xlate=0,shortname=mixed,\x00'], 0x97, 0x2ad, &(0x7f00000007c0)="$eJzs3b9rO2UYAPDn0jQJOiSCkwge6OD05dvv6pIiLRQzKRnUQYttQZogtFDwB8ZOri6Ori6C4OY/4eJ/ILgKbhYsnNzlrklqGpPatP74fJa+fe953nve69uWDvf03eeHxwdpHJ1/8lO0WknUutGNiyQ6UYvKZzGj+0UAAP9mF1kWv2Zjq+QlEdFaX1kAwBqt/Pv/u7WXBACs2RtvvvXadq+383qatmJ3+PlZP//LPv84vr59FO/HIA7jcbTjMiK7Mh7vZlk2qqe5Trw0HJ3188zhOz+U62//ElHkb0U7OsXUbP5eb2crHZvKH+V1PFXev5vnP4l2PDvn/nu9nSdz8qPfiJdfnKr/UbTjx/figxjEQVHEOD9qEZ9upemr2Ze/ffx2Xl6en4zO+s0ibiLbuOcvDQAAAAAAAAAAAAAAAAAAAAAA/2GPyt45zSj69+RTZf+djcv8k81IK53Z/jzj/KRa6Fp/oFEWX1X9eR6naZqVgZP8ejxXj/rD7BoAAAAAAAAAAAAAAAAAAAD+WU4//Oh4fzA4PLmTQdUNoHqt/7brdKdmXojFwc3JvWrlcMHKsVHFJBELy8g3sXTNv5dtD2736J65qeZvvl16na//eu/lYHOJmL85qE7X8X4y/xk2o5ppVYfk++mYRix5r8ZNl7KVjl9j7qX2yntvPF0MRgtiIllU2Cs/j59cOZNc30WjeKpz0zfLwVT6bExr+fOcf6f8SXLVrSO52x9CAAAAAAAAAAAAAAAAAABAYfLS75yL5wtTa1lzbWUBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwL2a/P//FQajMnmJ4EacnD7wFgEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPgf+CMAAP//SfdjDw==") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.stat\x00', 0x275a, 0x0) utimensat(r1, 0x0, 0x0, 0x0) mknodat(r1, &(0x7f0000000040)='./bus\x00', 0x8000, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000000), 0xfffffd26) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x401c5820, &(0x7f00000001c0)=0x8) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r4) write$binfmt_format(0xffffffffffffffff, &(0x7f0000000000)='1\x00', 0x2400) 7m41.171780239s ago: executing program 9 (id=715): r0 = creat(&(0x7f0000000000)='./file0\x00', 0xd4) r1 = openat(0xffffffffffffff9c, &(0x7f0000004280)='.\x00', 0x43000, 0x0) getdents64(r1, &(0x7f0000000500)=""/45, 0x2d) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[], 0x69) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f00000002c0)=""/196) socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000000c0)='ext4_es_insert_delayed_block\x00', r2, 0x0, 0xffffffffffffffff}, 0x18) mq_open(&(0x7f0000000480)='\\],\x00', 0x2, 0x22, &(0x7f00000004c0)={0x7fff, 0xb, 0xffff, 0x18f}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) lsm_list_modules(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socket(0x400000000010, 0x3, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x8000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000880)='+}[@\x00') setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000001c0)={0x0, @in={{0x2, 0x0, @multicast2}}, 0x5, 0x0, 0x0, 0x0, 0x80}, 0x9c) r6 = syz_io_uring_setup(0x466c, &(0x7f0000000380)={0x0, 0x0, 0x10100}, &(0x7f0000001340)=0x0, &(0x7f0000000140)=0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r9, &(0x7f00000001c0)=ANY=[@ANYBLOB='3'], 0x118) syz_io_uring_submit(r7, r8, &(0x7f0000000000)=@IORING_OP_RENAMEAT={0x23, 0x30, 0x0, r9, 0x0, 0x0, r9}) io_uring_enter(r6, 0x2d3e, 0x0, 0x0, 0x0, 0xfffffffffffffd74) 7m40.729182563s ago: executing program 2 (id=718): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x0, &(0x7f0000000280)={[{@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x7b}}, {@nolazytime}, {@noload}, {@dioread_lock}, {@quota}]}, 0x6, 0x578, &(0x7f0000000440)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000050000000100000007"], 0x50) r1 = socket$kcm(0xf, 0x3, 0x2) sendmsg$inet(r1, &(0x7f0000003780)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="0212000902000000e4a17c45c85686605e", 0x11}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f00000000c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10) symlink(0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143041, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105042, 0x1db) writev(r4, &(0x7f0000000140)=[{&(0x7f0000001200)="10", 0x60000}], 0x1) r5 = openat$cgroup_ro(r3, &(0x7f0000000040)='cgroup.stat\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380)=0x3c, 0xfcb5) 7m40.728927933s ago: executing program 39 (id=718): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x0, &(0x7f0000000280)={[{@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x7b}}, {@nolazytime}, {@noload}, {@dioread_lock}, {@quota}]}, 0x6, 0x578, &(0x7f0000000440)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000050000000100000007"], 0x50) r1 = socket$kcm(0xf, 0x3, 0x2) sendmsg$inet(r1, &(0x7f0000003780)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="0212000902000000e4a17c45c85686605e", 0x11}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1c, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f00000000c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10) symlink(0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143041, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105042, 0x1db) writev(r4, &(0x7f0000000140)=[{&(0x7f0000001200)="10", 0x60000}], 0x1) r5 = openat$cgroup_ro(r3, &(0x7f0000000040)='cgroup.stat\x00', 0x275a, 0x0) write$cgroup_int(r5, &(0x7f0000000380)=0x3c, 0xfcb5) 7m40.369150755s ago: executing program 3 (id=725): syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000000)='./bus\x00', 0x280008a, &(0x7f0000000240)=ANY=[@ANYBLOB='shortname=lower,shortname=win95,rodir,iocharset=default,uni_xlate=0,nonumtail=1,utf8=0,flush,rodir,shortname=win95,shortname=winnt,shortname=win95,showexec,uni_xlate=0,utf8=0,utf8=0,uni_xlate=0,shortname=mixed,\x00'], 0x97, 0x2ad, &(0x7f00000007c0)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.stat\x00', 0x275a, 0x0) utimensat(r1, 0x0, 0x0, 0x0) mknodat(r1, &(0x7f0000000040)='./bus\x00', 0x8000, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000000), 0xfffffd26) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x105042, 0x189) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) write$binfmt_format(r4, &(0x7f0000000000)='1\x00', 0x2400) 7m40.359514055s ago: executing program 40 (id=725): syz_mount_image$vfat(&(0x7f0000000180), &(0x7f0000000000)='./bus\x00', 0x280008a, &(0x7f0000000240)=ANY=[@ANYBLOB='shortname=lower,shortname=win95,rodir,iocharset=default,uni_xlate=0,nonumtail=1,utf8=0,flush,rodir,shortname=win95,shortname=winnt,shortname=win95,showexec,uni_xlate=0,utf8=0,utf8=0,uni_xlate=0,shortname=mixed,\x00'], 0x97, 0x2ad, &(0x7f00000007c0)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.stat\x00', 0x275a, 0x0) utimensat(r1, 0x0, 0x0, 0x0) mknodat(r1, &(0x7f0000000040)='./bus\x00', 0x8000, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000000), 0xfffffd26) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x105042, 0x189) r5 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r5) write$binfmt_format(r4, &(0x7f0000000000)='1\x00', 0x2400) 7m35.989873616s ago: executing program 9 (id=762): eventfd(0x200d) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f00000009c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, @loopback, @private1={0xfc, 0x1, '\x00', 0x1}}}) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000700)={0x2, 0x3, 0x0, 0x3, 0x10, 0x0, 0x0, 0x0, [@sadb_key={0x2, 0x9, 0x8, 0x0, '\n'}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x6, 0xc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback}}]}, 0x80}, 0x1, 0x7}, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000000), 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000145a0112774f1b09b00"/36], 0x48) io_uring_setup(0x497c, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_type(r4, &(0x7f0000000280), 0x9) r5 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000c40), 0x12) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000200)=0x1, 0x12) 7m35.989335606s ago: executing program 41 (id=762): eventfd(0x200d) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000000)={'ip6gre0\x00', &(0x7f00000009c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, @loopback, @private1={0xfc, 0x1, '\x00', 0x1}}}) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000700)={0x2, 0x3, 0x0, 0x3, 0x10, 0x0, 0x0, 0x0, [@sadb_key={0x2, 0x9, 0x8, 0x0, '\n'}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x6, 0xc}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback}}]}, 0x80}, 0x1, 0x7}, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000000), 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000145a0112774f1b09b00"/36], 0x48) io_uring_setup(0x497c, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_type(r4, &(0x7f0000000280), 0x9) r5 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000c40), 0x12) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r7 = openat$cgroup_ro(r6, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r7, &(0x7f0000000200)=0x1, 0x12) 6m13.600267743s ago: executing program 0 (id=2286): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r2) sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)={0x28, r3, 0x301, 0x0, 0x25dfdbff, {{}, {@void, @val={0xfffffffffffffd7d}, @val={0xc, 0x99, {0x2, 0x3}}}}}, 0x28}}, 0x40) 6m13.564629953s ago: executing program 0 (id=2289): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x33f555fdfdd407b9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r3 = dup(r2) ioctl$PTP_EXTTS_REQUEST2(r3, 0x43403d05, 0x0) r4 = open(&(0x7f00000001c0)='./file0\x00', 0x80ff, 0x84) fcntl$setlease(r4, 0x400, 0x0) r5 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setlease(r5, 0x400, 0x0) fcntl$setlease(r5, 0x400, 0x2) r6 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r6, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41}}, 0x10) listen(r6, 0x0) accept4$vsock_stream(r6, 0x0, 0x0, 0x80000) r7 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r7, &(0x7f0000000240)={&(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x41}}}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000040)="e0", 0x1}], 0x1, 0x0, 0x0, 0x801}, 0x4000045) 6m13.451489383s ago: executing program 0 (id=2294): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='sys_enter\x00', r1, 0x0, 0x8}, 0x18) fallocate(0xffffffffffffffff, 0x20, 0x4000, 0x8000) r2 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="e0000001ac1414aa"], 0x18) 6m13.373915404s ago: executing program 0 (id=2296): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', 0x8000, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x1, 0x1221, &(0x7f0000002300)="$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") r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000001300)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x46, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sys_enter\x00', r3}, 0x10) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={r3, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, &(0x7f0000000240)=[0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0], 0x0, 0xe, &(0x7f00000002c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000300), &(0x7f00000003c0), 0x8, 0x99, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000de0000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) syz_emit_ethernet(0x3a, &(0x7f00000004c0)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x3, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x4, 0x0, @empty, @multicast1}, {0x0, 0x0, 0x18, 0x0, @wg=@data}}}}}, 0x0) r5 = syz_io_uring_setup(0x52c3, &(0x7f0000000080)={0x0, 0x0, 0x40}, &(0x7f0000000000), &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x15, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000010000000000000000000000711214000000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sk_reuseport=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) io_uring_register$IORING_REGISTER_RESTRICTIONS(r5, 0xb, &(0x7f0000000180), 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x103000, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)=@generic={&(0x7f00000003c0)='./file0\x00', 0x0, 0x8}, 0x18) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000900)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x8, [@var={0xb, 0x0, 0x0, 0xe, 0x2}, @volatile={0x8, 0x0, 0x0, 0x9, 0x5}, @enum64={0xb, 0xa, 0x0, 0x13, 0x0, 0x6, [{0x8, 0x7, 0x10}, {0x1, 0x1, 0x8}, {0xf, 0x0, 0x9}, {0x2, 0x9415, 0x40004}, {0xfffffffd, 0xfff, 0x81b}, {0xf, 0x5, 0x9}, {0xc, 0x7, 0x4}, {0xe, 0x0, 0x6}, {0xe, 0x0, 0x6}, {0x1, 0x7, 0x1000}]}, @fwd={0x7}, @ptr={0x6}]}, {0x0, [0x5f, 0x5f, 0x5f, 0x2e, 0x0, 0x5f]}}, &(0x7f00000007c0)=""/136, 0xd8, 0x88, 0x0, 0x40, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, r7, 0x2, '\x00', 0x0, r8, 0x3, 0x2, 0x4, 0x0, @void, @value, @void, @value}, 0x50) prctl$PR_SET_NAME(0xf, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000000b00)={[{@delalloc}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@discard}, {@errors_remount}, {@usrquota}, {@data_err_ignore}, {@grpquota}, {@nobh}, {@journal_dev={'journal_dev', 0x3d, 0x1}}, {@bh}, {@dioread_nolock}]}, 0x1, 0x55a, &(0x7f0000000bc0)="$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") creat(&(0x7f0000000340)='./bus\x00', 0x1c) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) open(&(0x7f0000000500)='./bus\x00', 0x0, 0x42) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)={0x0, 0x0, 0x10000, 0x0, 0x0, 0xfffffffd}) 6m13.257737175s ago: executing program 0 (id=2301): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), r2) sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)={0x28, r3, 0x301, 0x0, 0x25dfdbff, {{}, {@void, @val={0xfffffffffffffd7d}, @val={0xc, 0x99, {0x2, 0x3}}}}}, 0x28}}, 0x40) 6m12.948843127s ago: executing program 0 (id=2309): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}], 0x1, 0x6, 0x0) (async) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'vcan0\x00', &(0x7f0000000440)=@ethtool_per_queue_op={0x4b, 0xe, [0x800, 0x80000000, 0xfffffffb, 0xffff, 0x4017c640, 0x7, 0x200, 0x3, 0x40, 0x1, 0xc36, 0x4, 0x6, 0xc680, 0x6, 0x5, 0x3ff, 0x2, 0xa8, 0x1, 0x9, 0x5, 0xffff, 0x39, 0x5, 0x10000, 0xffffffff, 0x7fffffff, 0x4148, 0x2ba, 0x2, 0x35, 0x4, 0x6, 0x401, 0x8, 0x0, 0x2, 0x3, 0x8001, 0x5, 0x1, 0x4, 0x2, 0x1, 0x7, 0xfffffff7, 0x7, 0x7, 0x163, 0x4, 0x5, 0x5, 0x0, 0x2, 0x9a3a, 0x9, 0x6, 0x80000001, 0x9, 0x8, 0xedf6, 0x2d, 0x7, 0x1, 0x80000001, 0x400, 0xb, 0x800, 0x0, 0x716, 0x0, 0x1000, 0x3, 0x1, 0x77480fe0, 0x5, 0x36, 0x474, 0x9, 0x7fff, 0x3, 0x2, 0x3c52, 0xba0, 0xb9d, 0x2, 0x2, 0xa8, 0x1, 0xffffffff, 0x5, 0x8, 0xffffffff, 0x3, 0xffffffff, 0x1, 0x7, 0x5, 0x0, 0x3, 0xd30, 0x1, 0xf9, 0x26, 0x1, 0x5, 0x0, 0x9f, 0x1000, 0x2, 0xd1e, 0x52, 0x1, 0x6, 0x5, 0xb7e3, 0xffff0001, 0x1, 0x3, 0x78fc0943, 0x4, 0x9, 0x8, 0x7, 0x9, 0x10, 0x8]}}) r2 = accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) getsockname$packet(r2, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) (async) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x62181) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue0\x00'}) (async) write$sndseq(r3, &(0x7f0000000440)=[{0x84, 0x77, 0x0, 0x0, @tick, {0xfd}, {0x7}, @raw32={[0x2, 0x0, 0x8000000]}}, {0x0, 0x0, 0x5, 0x83, @tick, {0xfd}, {}, @note={0x81}}, {0x6, 0x3, 0x9, 0x3, @tick=0x1, {0x10, 0x5}, {0xc, 0x2}, @control={0x3, 0x7, 0x7fff}}], 0x54) (async, rerun: 32) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) (rerun: 32) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000680)={&(0x7f0000000400)={0x1c, r4, 0x300, 0x70bd29, 0x8, {}, [@ETHTOOL_A_COALESCE_TX_USECS_IRQ={0x8, 0x8, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x5, 0x7f, 0x6, 0x8, 0x400, 0x0, 0xa20e, 0x6}, 0x0, &(0x7f0000000300)={0x8, 0x6, 0x0, 0x8000000000000001, 0x7fa1, 0x3, 0x7, 0xce}, 0x0, 0x0) (async) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000018c0), 0xa8c01) write$sndseq(r5, &(0x7f0000000080)=[{0x1e, 0x0, 0x8, 0xfd, @tick=0x8, {}, {}, @result}], 0x1c) r6 = socket$unix(0x1, 0x1, 0x0) bind$unix(r6, &(0x7f0000000280)=@abs={0x1, 0x0, 0x4e21}, 0x6e) bind$unix(r6, &(0x7f0000001200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) (async) syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000980)='./file1\x00', 0x280809a, &(0x7f0000000380)=ANY=[], 0xd, 0x2b2, &(0x7f00000006c0)="$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") (async) r7 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x130) (async) r8 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x51) write$9p(r7, &(0x7f0000001400)="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", 0x200) (async) sendfile(r7, r8, 0x0, 0xe065) 6m12.948203477s ago: executing program 42 (id=2309): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}], 0x1, 0x6, 0x0) (async) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'vcan0\x00', &(0x7f0000000440)=@ethtool_per_queue_op={0x4b, 0xe, [0x800, 0x80000000, 0xfffffffb, 0xffff, 0x4017c640, 0x7, 0x200, 0x3, 0x40, 0x1, 0xc36, 0x4, 0x6, 0xc680, 0x6, 0x5, 0x3ff, 0x2, 0xa8, 0x1, 0x9, 0x5, 0xffff, 0x39, 0x5, 0x10000, 0xffffffff, 0x7fffffff, 0x4148, 0x2ba, 0x2, 0x35, 0x4, 0x6, 0x401, 0x8, 0x0, 0x2, 0x3, 0x8001, 0x5, 0x1, 0x4, 0x2, 0x1, 0x7, 0xfffffff7, 0x7, 0x7, 0x163, 0x4, 0x5, 0x5, 0x0, 0x2, 0x9a3a, 0x9, 0x6, 0x80000001, 0x9, 0x8, 0xedf6, 0x2d, 0x7, 0x1, 0x80000001, 0x400, 0xb, 0x800, 0x0, 0x716, 0x0, 0x1000, 0x3, 0x1, 0x77480fe0, 0x5, 0x36, 0x474, 0x9, 0x7fff, 0x3, 0x2, 0x3c52, 0xba0, 0xb9d, 0x2, 0x2, 0xa8, 0x1, 0xffffffff, 0x5, 0x8, 0xffffffff, 0x3, 0xffffffff, 0x1, 0x7, 0x5, 0x0, 0x3, 0xd30, 0x1, 0xf9, 0x26, 0x1, 0x5, 0x0, 0x9f, 0x1000, 0x2, 0xd1e, 0x52, 0x1, 0x6, 0x5, 0xb7e3, 0xffff0001, 0x1, 0x3, 0x78fc0943, 0x4, 0x9, 0x8, 0x7, 0x9, 0x10, 0x8]}}) r2 = accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) getsockname$packet(r2, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) (async) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x62181) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue0\x00'}) (async) write$sndseq(r3, &(0x7f0000000440)=[{0x84, 0x77, 0x0, 0x0, @tick, {0xfd}, {0x7}, @raw32={[0x2, 0x0, 0x8000000]}}, {0x0, 0x0, 0x5, 0x83, @tick, {0xfd}, {}, @note={0x81}}, {0x6, 0x3, 0x9, 0x3, @tick=0x1, {0x10, 0x5}, {0xc, 0x2}, @control={0x3, 0x7, 0x7fff}}], 0x54) (async, rerun: 32) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) (rerun: 32) sendmsg$ETHTOOL_MSG_COALESCE_SET(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000680)={&(0x7f0000000400)={0x1c, r4, 0x300, 0x70bd29, 0x8, {}, [@ETHTOOL_A_COALESCE_TX_USECS_IRQ={0x8, 0x8, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x5, 0x7f, 0x6, 0x8, 0x400, 0x0, 0xa20e, 0x6}, 0x0, &(0x7f0000000300)={0x8, 0x6, 0x0, 0x8000000000000001, 0x7fa1, 0x3, 0x7, 0xce}, 0x0, 0x0) (async) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000018c0), 0xa8c01) write$sndseq(r5, &(0x7f0000000080)=[{0x1e, 0x0, 0x8, 0xfd, @tick=0x8, {}, {}, @result}], 0x1c) r6 = socket$unix(0x1, 0x1, 0x0) bind$unix(r6, &(0x7f0000000280)=@abs={0x1, 0x0, 0x4e21}, 0x6e) bind$unix(r6, &(0x7f0000001200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) (async) syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000980)='./file1\x00', 0x280809a, &(0x7f0000000380)=ANY=[], 0xd, 0x2b2, &(0x7f00000006c0)="$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") (async) r7 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x130) (async) r8 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x51) write$9p(r7, &(0x7f0000001400)="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", 0x200) (async) sendfile(r7, r8, 0x0, 0xe065) 4m5.38017318s ago: executing program 8 (id=4820): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x8000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r2, 0x0, 0x178}, 0x18) ioctl$TIOCGPGRP(r0, 0x5437, 0x0) 4m5.33719853s ago: executing program 8 (id=4823): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/notes', 0x0, 0x0) read(r2, 0x0, 0xeffd) 4m5.28623514s ago: executing program 8 (id=4824): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10060, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000280), &(0x7f00000002c0)=r1}, 0x20) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=r2, @ANYBLOB="ffffeeff0000000000e50800000000000000000046b608ff2523ab0281107d7f3beffbea1905", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000008100"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x400, &(0x7f0000000000)={[{@grpjquota}, {@stripe={'stripe', 0x3d, 0x2}}]}, 0x1, 0x4a6, &(0x7f0000000a40)="$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") r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="4c00000002060108000034e40000000000000000050001000600000005000400000000000900020073797a3100000080050005000200000011000300686173683a69702c706f7274"], 0x4c}}, 0x2) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="50000000090601020000000000000000020000840900020073797a31000000000500010007000000280007800c00018008000140fffffff70500070084000000060004404e22000006000540"], 0x50}, 0x1, 0x0, 0x0, 0x30000092}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00"/13], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f00000001c0)='f2fs_unlink_enter\x00'}, 0x18) mknod(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r6 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x2, 0x0) r7 = open(&(0x7f0000000400)='./bus\x00', 0x42202, 0x0) splice(r6, 0x0, r7, 0x0, 0x114, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r8 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf09000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0xffffffffffffff2b, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r10}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r8}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) r11 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x201, 0x2) syz_mount_image$ext4(&(0x7f0000001140)='ext4\x00', &(0x7f0000000080)='./bus\x00', 0x0, &(0x7f0000000400), 0x1, 0x76f, &(0x7f0000001580)="$eJzs3c9rHOUbAPBnNknTpv1+E0HQegoIGijdmBpbBQ8VDyJYKOjZumy2oWaTLdlNaUJARQQvgooHQS89+6PevIk/rvpfeJCWqmmx4kEis5lNN81uk22TrHU/H5j2eWdm886zM/O+7+4MOwH0rNH0n1zE4Yh4P4kYzuYnETFQj/ojTq6td3NluZhOSayuvvxbUl/nxspyMZpekzqYFR6OiO/fiTiS21xvdXFpplAul+az8nht9vx4dXHp6LnZwnRpujR3fGJy8tiJp04c37lc//hp6dDVD154/MuTf7390OX3fkjiZBzKljXnsVNGYzTWUh9I38INnt/pyros6fYGcFfS47Nv7SyPwzEcffUIAPgveyMiVgGAHpPo/wGgxzS+B7ixslxsTN39RmJvXXsuIvav5d+4vrm2pD+7Zre/fh106Eay4cpIEhEjO1D/aER8+vWrn6dT7NJ1SIBW3vwmCza1/8mmexY69cQ21hm9raz9g73zbTr+ebrV+C+3Pv6JFuOfwRbn7t3Y+vzPXdmBatpKx3/PNt3bdrMp/8xIX1b6X33MN5CcPVcupW3b/yNiLAYG0/LEHeoYu/739XbLmsd/v3/4+mdp/en/t9bIXekf3PiaqUKtcC85N7v2VsQj/a3yT9b3f9Jm/Ht6m3W8+My7n7Rbluaf5tuYNue/u1YvRTzWcv/fuqMtueP9ieP1w2G8cVC08NXPHw/F+pm0UfP+T6e0/sZngb2Q7v+hO+c/kjTfr1ntvI4fLw1/127Z1vm3Pv73Ja/U433ZvIuFWm1+ImJf8tLm+cduvbZRbqyf5j/2aD3/A9kqm9q/Vsd/+pnwta0Szzai/+qvX9x9/rsrzX+qo/3feXD55kxfu/q3t/8n69FYNmc77d92N/Be3jsAAAAAAAAAAAAAAAAAAAAAAAAA2K5cRByKJJdfj3O5fH7tGd4PxlCuXKnWjpytLMxNRf1Z2SMxkGv81OVw0++hTmS/h98oH7ut/GREPBARHw0eqJfzxUp5qtvJAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEDmYJvn/6d+Gez21gEAu2Z/tzcAANhz+n8A6D2d9v/GCwBw/9OfA0Dv0f8DQO/R/wMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALDLTp86lU6rf64sF9Py1IXFhZnKhaNTpepMfnahmC9W5s/npyuV6XIpX6zMbvX3ypXK+cmYW7g4XitVa+PVxaUzs5WFudqZc7OF6dKZ0sCeZAUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAnakuLs0UyuXSvKCj4ED2/v1btkcg2Nmgyw0TAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwH3inwAAAP//CDwgEQ==") mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1000002, 0x11012, r11, 0x0) 4m4.321387287s ago: executing program 8 (id=4837): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mountinfo\x00') epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f00000002c0)={0x50001011}) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x81105a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x8, &(0x7f0000000600)=ANY=[@ANYBLOB="1808000000000000000000000000000085100000030000e6170000000000000000000000000000009500000000000000cdaa0000000d000095000000000000005a60114a62c81f8eae0fd77026191fc10a62b94f47983a6da9bdaa10a794d73f346fa3ff3174c592a7c3a22fe6f713bd79ce0b26d6abb89c3a2fe0aabeb362e9bc9827079651dd9e970e6c042b8f5bdcd38d451a315c03e127abc80a46e9253136d69507deb3e4b183923c32059246fe1a88d4ce0bf1616ba0dae097509960da04de8df92e91d6762fc190354f2e9a334b9c8659a1d87294"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)=0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) timer_settime(r2, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {r3, r4+10000000}}, 0x0) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x3, 0x0, @mcast1}, 0x1c) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x0, 0x0, 0x0, 0xffffeffb, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = mq_open(&(0x7f00000008c0)='!\x7f\x00\xca\x00\x00\x00\f\x00\x00\x01E!T\xednux\x02\xc7\x12\xec\xca7\xbc\x1fS\x1c\x05y\x91\xe5\x9aL\xa9u\b\x00\x00\x00\xa0pC\x19\x9b\vY\x186\xa4\xe7\x1eg{`\xfa\xf3n\x8fIj6f\xfb\x13-g\x19(a6\x18\xe24nz\x83w8\xff\xfb\x83\f\x9a\xda\xc5w\x8eo\x02\xa3\xc1\x83\x91\xc6\xfd\x8c\xc4s\x03\x16\xa4+\xce|^\x98K_0\x8a\xb0\xff~\x1e\xd92\xb4r\xd8\xe7', 0x40, 0x110, 0x0) mq_timedreceive(r6, 0x0, 0xfffffffffffffee3, 0x2000000, 0x0) mount$bind(&(0x7f0000000880)='./file0/../file0\x00', &(0x7f0000000440)='./file0/file0\x00', 0x0, 0x1adc11, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r8, 0x0, 0x30, 0x0, 0x310) sendmsg$NFT_BATCH(r7, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000050000000900010073797a300000000078000000030a01030000000000000000050000000900010073797a300000000008000540000000001c0008800c00024000000000000000000c00014000000000000000000900030073797a3200000000280004800800024000000000140003007465616d5f736c6176655f3000000000080001"], 0xd4}}, 0x0) r9 = getuid() quotactl$Q_GETNEXTQUOTA(0xffffffff80000902, &(0x7f0000000380)=@filename='./file0/file0\x00', r9, &(0x7f00000003c0)) mount$bind(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0x887008, 0x0) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="1801000000050000000000000000ea0485000000d000000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r10}, 0x10) io_setup(0x1, &(0x7f0000000740)) 4m3.396822383s ago: executing program 8 (id=4868): r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f0000000100)=0x100000001) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x1, 0x4) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @dev}, 0x10) close(r0) 4m3.140979815s ago: executing program 8 (id=4874): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="e80000006c00010029bd7000fcdbdf2500000000", @ANYRES32, @ANYBLOB="001000008000000008000f002000000014003500726f7365300000000000000000000000a40034801400350070696d367265673000000020000000001400350076657468305f6d614176746170000000140035006d61637674617030020000000000000014003500677265300000000000000000000000001400350076657468305f746f5f626174616476001400350001657468315f6d6163767461700000001400350067726530000000000000000000000000140035006261746164765f736c6176655f31000008000f"], 0xe8}}, 0x0) (fail_nth: 13) 4m3.140639135s ago: executing program 43 (id=4874): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="e80000006c00010029bd7000fcdbdf2500000000", @ANYRES32, @ANYBLOB="001000008000000008000f002000000014003500726f7365300000000000000000000000a40034801400350070696d367265673000000020000000001400350076657468305f6d614176746170000000140035006d61637674617030020000000000000014003500677265300000000000000000000000001400350076657468305f746f5f626174616476001400350001657468315f6d6163767461700000001400350067726530000000000000000000000000140035006261746164765f736c6176655f31000008000f"], 0xe8}}, 0x0) (fail_nth: 13) 3.667495856s ago: executing program 7 (id=9174): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x16, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7de}, [@map_val={0x18, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfd}, @map_fd={0x18, 0x2, 0x1, 0x0, 0x1}, @map_fd={0x18, 0x9}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000300)='GPL\x00', 0x3ff, 0xb9, &(0x7f00000006c0)=""/185, 0x41100, 0x22, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000400)={0x0, 0x7, 0x8, 0xffffffff}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x168e, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000040)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000002c0)=0x8, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r5 = socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r6}, 0x38) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r7}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="5c0000001000030500"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000340012800e00010069703665727370616e0000002000028006000200300000001400060000000000000000000000ffff7f00000108000a00", @ANYRES32], 0x5c}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kmem_cache_free\x00', r4}, 0x10) r8 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x4, 0x0) r9 = syz_pidfd_open(r8, 0x0) r10 = open_tree(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r10, 0x6, 0x0, 0x0, 0x0) pidfd_send_signal(r9, 0x2, 0x0, 0x0) 3.478878427s ago: executing program 7 (id=9181): r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xb, &(0x7f0000000840)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f00000002c0)='GPL\x00', 0x7, 0x21, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000200)) ioctl$EVIOCGABS20(r0, 0x40044591, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x50) r2 = getpgrp(0x0) syz_pidfd_open(r2, 0x0) (async) epoll_create(0x1) gettid() prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000740)={0x2, &(0x7f0000000700)=[{0xba82, 0xfe, 0x2, 0xffff}, {0xff, 0x2, 0x8, 0x8}]}) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16, @ANYRESDEC], 0x0, 0x4, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000003d00fa00deff13090000000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000020000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYRES8=r3, @ANYRESDEC=r4], 0x48) (async) socket(0x3, 0x4, 0x1) (async) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000580)='./file1\x00', 0x40, &(0x7f0000000340), 0x1, 0x573, &(0x7f0000000ec0)="$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") (async) chdir(0x0) (async) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) (async) msgrcv(0x0, &(0x7f0000000800)={0x0, ""/28}, 0x24, 0x0, 0x2000) (async) fstat(r1, &(0x7f00000004c0)) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00'}, 0x10) r5 = syz_io_uring_setup(0xd2, &(0x7f0000000340)={0x0, 0x6299, 0x80, 0x80000, 0x334}, &(0x7f0000000280), &(0x7f0000000080)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, r5, {0x4}}, './file0\x00'}) (async) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) (async) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000240)={'wlan1\x00'}) (async) r6 = socket$netlink(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, 0x0, 0x0) (async) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r6, 0x10e, 0x1, &(0x7f0000000000)=0x8, 0x4) 3.420067757s ago: executing program 7 (id=9182): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @empty}, 0x1c) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000002e80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="6b549b5041ce22b8b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000e2b6040000000000008d0000ae8200000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r2}, 0x18) ioprio_set$uid(0x3, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYRESHEX=r3], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x18) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) fcntl$setlease(r6, 0x400, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x88040, 0x0) sendto$inet6(r0, &(0x7f0000000500)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback, 0x1}, 0x1c) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000e86000)="0022040000ffffebfffffffeffffff0700000000ff000207835eeb1317b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449b842f3e253be8a62b37f820fe75a9ea937ea4efbfb9b4a128f2dbe2837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d41991ac25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab190c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e3845", 0x118) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000}, 0xa}, 0x1c) r7 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x14) fcntl$setsig(r7, 0xa, 0x13) fcntl$setlease(r7, 0x400, 0x0) timer_create(0x2, &(0x7f0000000400)={0x0, 0x12, 0x4, @thr={&(0x7f0000000380)="0538672d74b16fb6a6a6a4feed3d1b9008272bf6f8f789141ac9075cfce668da26fee1aa378710e25021f197e06f329a864c321fbb1a20e36f8c3878fb7608b17a3311b1ab8cfca81e3ffafc8d941877b044d53cde4abc7629f122a0597af9871ca89c10b6f2def6be7cce2d59ef9457c386d8c69642", &(0x7f0000000a00)="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"}}, &(0x7f0000000280)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x1000000) syz_open_dev$sg(0x0, 0x0, 0x20c02) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_IPV6_PKTINFO(r8, 0x29, 0x32, &(0x7f0000000140)={@private1={0xfc, 0x1, '\x00', 0x1}}, 0x14) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0xd, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0xfffffffffffffc7c, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00'}, 0x10) 2.052697916s ago: executing program 1 (id=9211): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000027c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000f000000970000005000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='sys_enter\x00', r0, 0x0, 0xebf}, 0x18) inotify_init() r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001240)=@newqdisc={0x45c, 0x24, 0x4ee4e6a52ff56541, 0x70bd28, 0x4000000, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_RTAB={0x404, 0x2, [0x1, 0x3, 0x1ff, 0x0, 0xfffffc80, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x3f, 0x3, 0x0, 0x0, 0xffffffff, 0x2, 0xc00, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0xb97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5e, 0xfffffffc, 0x8, 0x0, 0x0, 0x400000, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20, 0x0, 0x200001, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x401, 0x0, 0x7, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x5, 0x0, 0x800000, 0x0, 0x7, 0x0, 0xfffffffc, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xd79, 0xfffffffd, 0x0, 0x200, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfd, 0x0, 0x4, 0xfffffffd, 0x80000000, 0x0, 0x0, 0xfffffffe, 0x9, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffd]}, @TCA_TBF_PARMS={0x28, 0x1, {{0x1, 0x0, 0x0, 0x0, 0x1, 0x6}, {0xff, 0x0, 0x0, 0x10}}}]}}]}, 0x45c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=@newqdisc={0x2cc, 0x24, 0xb00, 0x70bd2a, 0x25dfdbfc, {0x0, 0x0, 0x0, r4, {0xa, 0x6}, {0x10}, {0x8, 0xc}}, [@TCA_RATE={0x6, 0x5, {0x0, 0x4}}, @TCA_STAB={0x188, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x7, 0x6, 0xc1, 0x1ff, 0x0, 0x4, 0x0, 0x5}}, {0xe, 0x2, [0x0, 0x5, 0xfff7, 0x8, 0x1]}}, {{0x1c, 0x1, {0x1, 0x1, 0x8, 0x3, 0x1, 0x5, 0x9, 0x4}}, {0xc, 0x2, [0x5, 0x5, 0x2, 0x1]}}, {{0x1c, 0x1, {0xe, 0x1, 0xa, 0x4, 0x0, 0x10001, 0x6, 0x4}}, {0xc, 0x2, [0x4, 0x3, 0xc, 0x3]}}, {{0x1c, 0x1, {0x2, 0x4, 0x8001, 0x0, 0x1, 0x200, 0x5, 0x8}}, {0x14, 0x2, [0x8001, 0x378, 0x800, 0x401, 0x3, 0x0, 0xfffd, 0x840]}}, {{0x1c, 0x1, {0x2, 0x7, 0x7, 0x8d47, 0x2, 0x1, 0x2136, 0x3}}, {0xa, 0x2, [0x417, 0x9a, 0x3]}}, {{0x1c, 0x1, {0x6, 0x6, 0x849, 0x8, 0x1, 0x5, 0xd, 0x6}}, {0x10, 0x2, [0x12fd, 0x5bd, 0x73b, 0x7, 0x4, 0x32b]}}, {{0x1c, 0x1, {0x0, 0x7, 0x4, 0x478d, 0x0, 0x1, 0x10, 0x4}}, {0xc, 0x2, [0xff7f, 0x0, 0x42, 0x3ff]}}, {{0x1c, 0x1, {0x6, 0x0, 0x8, 0xe, 0x0, 0x2, 0x4, 0x3}}, {0xa, 0x2, [0x3, 0x5, 0x3]}}, {{0x1c, 0x1, {0x5, 0x2, 0x200, 0x8, 0x0, 0x8, 0x3642, 0x9}}, {0x16, 0x2, [0x2, 0x94f9, 0x8, 0x36, 0x7f, 0x5, 0x2, 0x3, 0x8]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x9}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x3}, @TCA_RATE={0x6, 0x5, {0x6, 0x40}}, @TCA_STAB={0xb0, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x6, 0x11, 0x5, 0xd, 0x1, 0xd, 0x7, 0x8}}, {0x14, 0x2, [0x2, 0x4, 0x101, 0x5, 0xfff9, 0x101, 0x8, 0x9]}}, {{0x1c, 0x1, {0x76, 0x1, 0x8, 0x7, 0x1, 0x6, 0x9, 0x1}}, {0x6, 0x2, [0x0]}}, {{0x1c, 0x1, {0x9, 0x1, 0x0, 0x80000001, 0x0, 0x0, 0x9, 0x1}}, {0x6, 0x2, [0xc]}}, {{0x1c, 0x1, {0xf, 0x30, 0x2, 0x400, 0x0, 0x1, 0x4, 0x9}}, {0x16, 0x2, [0x0, 0x6, 0x6, 0x1, 0x2, 0x4, 0x3, 0x405, 0x7]}}]}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x9084}, @qdisc_kind_options=@q_taprio={{0xb}, {0x2c, 0x2, [@TCA_TAPRIO_ATTR_TXTIME_DELAY={0x8, 0xb, 0xb7}, @TCA_TAPRIO_ATTR_FLAGS={0x8, 0xa, 0xff}, @TCA_TAPRIO_ATTR_SCHED_CYCLE_TIME_EXTENSION={0xc, 0x9, 0x4}, @TCA_TAPRIO_ATTR_SCHED_BASE_TIME={0xc, 0x3, 0x801}]}}, @TCA_RATE={0x6, 0x5, {0x1, 0x8}}, @TCA_RATE={0x6, 0x5, {0x0, 0xf}}]}, 0x2cc}, 0x1, 0x0, 0x0, 0x4}, 0x24000001) 1.977132516s ago: executing program 1 (id=9213): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000bc0)=ANY=[@ANYBLOB="1808000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000000082c2500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r3, 0x4) sendmsg$inet(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x0, 0x327}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) mount$9p_fd(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000a40)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@version_u}]}}) 1.926977037s ago: executing program 5 (id=9215): ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000080)=0x2) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000440)={0x28, 0x0, 0x0, @local}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bind$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r2, &(0x7f0000000280)={0x11, 0x7, r3, 0x1, 0xdf, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0900000004000000e27f000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r5], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_open_dev$hiddev(0x0, 0x7, 0x802) mkdir(0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = signalfd4(0xffffffffffffffff, &(0x7f0000000140)={[0xffeffffffffffffa]}, 0x8, 0x0) io_setup(0x206, &(0x7f0000000200)=0x0) io_submit(r8, 0x47f, &(0x7f00000005c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r7, &(0x7f00000003c0)="951aa14bd6f68579cac67c83bf8d4500e5cea1bb1596d4ee6645fa16fa7cacb9214070a622a2c57b89075f59b85c7b5b2c41edc9d2cd5a2c95ed1c2cf72425be9c1a2df1b60a309bc3228d7e85b300f0d7a042a40166b9208e9d2e423c32ad8e47adedf5dc425c6bcb031fb2230835d41afc23476eae602bad3246417e5ac757", 0x80}]) ioctl$SNAPSHOT_ATOMIC_RESTORE(r7, 0x3304) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7ff}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xae) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r9}, 0x10) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r10, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r11}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) sendmsg$nl_route_sched(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@getchain={0x24, 0x11, 0x1, 0x70bd2a, 0x8000000, {0x0, 0x0, 0x0, r3, {0x1f, 0x3}}}, 0x24}, 0x1, 0x0, 0x0, 0x20008040}, 0x4000000) 1.909280417s ago: executing program 1 (id=9216): getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14) 1.854246807s ago: executing program 1 (id=9217): syz_open_dev$tty20(0xc, 0x4, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000045000000020000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) syz_emit_ethernet(0x113e, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa000000b7000086dd606410a61108000000000000000000000000ffffffffffffff02000000000000000000000000000132"], 0x0) capset(&(0x7f0000000c00)={0x20080522}, &(0x7f0000000140)={0x0, 0x3, 0x7, 0x0, 0x40, 0x8b}) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x3e, 0x1, 0x3, 0x4, 0x0, 0x5, 0x8023c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x40c7, 0x2}, 0x20, 0x10fffffffe, 0x4, 0x1, 0x4, 0x1088f109, 0x35fa, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r2, 0x9) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00', 0x100}) mkdir(0x0, 0x8) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000300)={'ip6gre0\x00', 0x0, 0x29, 0x0, 0xb, 0x5, 0xd5, @remote, @dev={0xfe, 0x80, '\x00', 0x17}, 0x7800, 0x7800, 0xfffffffe, 0x3}}) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = fsopen(&(0x7f0000000100)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r6, 0x6, 0x0, 0x0, 0x0) fsmount(r6, 0x0, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80000001}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) r9 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000680)=@base={0xa, 0x16, 0xb4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r9}, @generic={0x79}, @initr0, @exit, @alu={0x5, 0x0, 0xd, 0xa}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x21) 1.853400257s ago: executing program 5 (id=9218): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x29) tkill(0x0, 0x12) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r3, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) close_range(r2, 0xffffffffffffffff, 0x10000000000000) 1.817312007s ago: executing program 5 (id=9220): syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000000)='./bus\x00', 0x280008a, &(0x7f0000000d00)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x97, 0x2a9, &(0x7f0000000500)="$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") (async) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000000)='./bus\x00', 0x280008a, &(0x7f0000000d00)=ANY=[@ANYBLOB="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", @ANYRESDEC], 0x97, 0x2a9, &(0x7f0000000500)="$eJzs3T9ra2UYAPDnpGkSdEgEJxE8oINTabu6pEgLxUxKBnXQYluQJggtFPyDsZOri6OriyC4+SVc/AaCq+BmwcKRk5xjkt40N+m9ae+f32/p2/c8z3ue9/QtpcN58vGr/ZPDNI4vvvojGo0kKu1ox2USrahE6ZuY0v4uAICn2WWWxd/ZyDJ5SUQ0VlcWALBCS//9/2XlJQEAK/be+x+8s9Pp7L6bpo3Y63973s3/s8+/jq7vHMen0Yuj2IxmXEVk/xuN97IsG1TTXCve6A/Ou3lm/6PfivV3/ooY5m9FM1rDqen8/c7uVjoykT/I63ihuH87z9+OZrw84/77nd3tGfnRrcWbr0/UvxHN+P2T+Cx6cTgsYpQflYivt9L07ez7f778MC8vz08G5936MG4sW7vjHw0AAAAAAAAAAAAAAAAAAAAAAM+wjaJ3Tj2G/XvyqaL/ztpV/s16pKXWdH+eUX5SLnStP9Agix/K/jybaZpmReA4vxqvVKN6P7sGAAAAAAAAAAAAAAAAAACAJ8vZ51+cHPR6R6ePZVB2Ayhf67/tOu2JmddifnB9fK9KMZyzcqyVMUnE3DLyTSxc879F24PbPbqXbqr5p58XXufHh++9GKwvEPOIg/J0nRwks59hPcqZRnlIfp2MqcWC96rddClb6vjVZl5qLr332ovDwWBOTCTzCnvrz9GTK2aS67uoDZ/qzPT1YjCRPh3TWPw8578pD0h06wAAAAAAAAAAAAAAAAAAgJUav/Q74+LF3NRKVl9ZWQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABwp8af/7/EYFAkLxBci9Oze94iAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAz4H/AgAA///uD2MO") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000940)="e65fcc6bcd7d15421a32839bce3e6e45eee8f048f45aec21e5712ae5056716892c9e1df210f6b1c9b92a07459440d5b9b192cf133ae9fed0d2174de091608b79ef0e976bef922d7a61b495dc67378a33a6fea31ce8cf122888e131b3f55b81ccb491", 0x5, r3}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4, 0x0, 0x2}, 0x18) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff8000}]}) r6 = socket$can_bcm(0x1d, 0x2, 0x2) setreuid(0xee00, 0x0) r7 = syz_clone(0x2a8000, 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) prlimit64(r7, 0x6, 0x0, 0x0) connect$can_bcm(r6, &(0x7f00000000c0), 0x10) close_range(r5, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x20800000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r10, &(0x7f0000000080)={0x0, 0xfffffcd0, 0x0}, 0x20000894) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f022eb"], 0xcfa4) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa35f022eb"], 0xcfa4) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 1.637969949s ago: executing program 6 (id=9223): r0 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) ftruncate(r0, 0x2007ffc) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000c"], 0x48) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000002380)={0x0, 0x0, 0x0, 0x4}) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000007c0)={{r1}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r2}, 0x10) sendfile(r0, r0, 0x0, 0x9) 1.58408402s ago: executing program 6 (id=9226): socket$can_bcm(0x1d, 0x2, 0x2) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'geneve1\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x18, r1, 0x1, 0xcb, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x31}}, 0x14) sendto$inet6(r0, &(0x7f0000000280)="0503092c8f0b480301020d00c52cf7c25975e010b02f0800eb2b2ff0dac8897c6b118777faffffff3066100cb600c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0xfc13, 0x800, 0x0, 0x2f) 1.46521121s ago: executing program 6 (id=9228): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) splice(r1, 0x0, r2, 0x0, 0x7fff, 0x0) ioctl$IMGETDEVINFO(r1, 0x80044944, &(0x7f0000000000)={0x3}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000180)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x2}, 0x40}) 985.294013ms ago: executing program 4 (id=9234): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="640000000001010400000000141a000002000000240001801400018008000100e000000108000200e00000010c00028005000100000000002400028014000180080001000000000008000200ac1e00010c0002800500010000000000080007"], 0x64}}, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000000c0)=0x3) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="3800000000010104000000000000000002000000240002801400018008000100e000000108000200e00000010c000280050001"], 0x38}}, 0x0) 984.691213ms ago: executing program 4 (id=9235): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000010000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x64, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28012, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000d40)=@raw={'raw\x00', 0x3c1, 0x3, 0x530, 0x0, 0x18c, 0x203, 0x0, 0x19030000, 0x460, 0x2e0, 0x2e0, 0x460, 0x2e0, 0x3, 0x0, {[{{@uncond, 0x300, 0x300, 0x348, 0x0, {}, [@common=@unspec=@bpf0={{0x230}, {0x13, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x16}, {}, {}, {}, {}, {}, {0xf}]}}, @common=@hl={{0x28}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x590) 930.443644ms ago: executing program 5 (id=9236): r0 = socket(0x1e, 0x805, 0x0) connect$tipc(r0, &(0x7f0000000040)=@name={0x1e, 0x2, 0x0, {{0x20, 0x1}, 0x4}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000940)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00', r2}, 0x18) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000006c0)=@newtaction={0x110, 0x30, 0xffff, 0xfffffffe, 0x0, {}, [{0xfc, 0x1, [@m_police={0x6c, 0x1, 0x0, 0x0, {{0xb}, {0x40, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x5, 0x0, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x6}}}]]}, {0x4}, {0xc}, {0xc}}}, @m_gact={0x48, 0x2, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc}}}, @m_bpf={0x44, 0x3, 0x0, 0x0, {{0x8}, {0x1c, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18, 0x2, {0xaf, 0x1, 0x20000000, 0x2d2f45bb, 0xaad1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x110}}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r4}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) connect$tipc(r0, &(0x7f0000000000)=@id, 0x10) close(r0) 862.305994ms ago: executing program 1 (id=9237): r0 = socket$inet6(0xa, 0x6, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000008500000072000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r1, 0x0, 0x8000}, 0x18) r2 = syz_io_uring_setup(0x7d98, &(0x7f0000000380)={0x0, 0x150, 0x10100, 0x0, 0x4}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000040)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r0, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x14a8}, 0x0, 0x0, 0x1}) io_uring_enter(r2, 0x2ded, 0x4000, 0x0, 0x0, 0x0) 841.831004ms ago: executing program 1 (id=9238): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000a00)=@newtaction={0x258, 0x30, 0x300, 0x70bd2d, 0x25dfdbff, {}, [{0x244, 0x1, [@m_skbedit={0x204, 0x19, 0x0, 0x0, {{0xc}, {0x4}, {0x1d5, 0x6, "de616dd9ce3b892bb6fafca061bed3e644dcf9151f4527045657b89def02bb9cad6c62f8293cff1e7df3eb0803889f2fd92b151ed17ab9007c47463bf4e7afe47ab1d24292b0103cbbc15977a51c0ae02a16535a666c86a6321ae76cba859e771aa7d0ff9fa033e50e56e0f68419fd47894ab8f8d473fc2af5fc18fb9399fdbb44bce22ac4c64feea69875f61ef4f46591d0547ce0f025b0a5f6dc470fd9635a05e318fa41b23e07582b3128621edbf17703923cea8b079f042f9924f50ce06116fc38e34430e0a4b60e7144cccb31d0a0457e528dd782264fec2417bd1b18aa82a223185cee31b2989e534df535b22243ec2971118b283cebb23130d1622a675cabf8788d71473f98949841ab1c34d28257f4b10e6eec198365490620753627951432cf82875ec0fccc70181d74035e141d4bbdd59571d5c3fa68b6a9365539b7e734e38e7083fe43b3104f03a618c99dc38b7b166c71dcda72645a7ddd09b867d20ef1d0f2154c6c2af7bfc13509c92a055f4ba6134cf5124359fccca93ea9ef30597c542c2e259bbd96051f001127d7e760711d895b0ae2dabbb4385da14ffe779acd84bec05fb4fc35fefad1a62e114c5f2ca5c6e884ddd618acecb553d05d8ec7fb455e2684ed4d3c3df3c35bee69"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x2}}}}, @m_gact={0x3c, 0x5, 0x0, 0x0, {{0x9}, {0x4}, {0xd, 0x6, "b78f55c15bbb4ca5b0"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}]}]}, 0x258}}, 0x0) socket(0x10, 0x803, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaabaaaaaa00000000000008004900002c000000000001ac1414bb860600000000000000b1601a7bf1c57ece9ce44fc8370a0c1e29e41f868f58fc2a5f1e0000907800000000"], 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x101042, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCSACTIVE(r0, 0x40047459, &(0x7f0000000080)={0xfffffffffffffe43, 0x0}) read(r0, 0x0, 0x0) add_key$keyring(&(0x7f00000101c0), &(0x7f0000010180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x6, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x16, &(0x7f0000000040)={&(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x548}}, 0x0) 600.997376ms ago: executing program 5 (id=9239): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x74541, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000006, 0x4, @perf_bp={&(0x7f0000000340), 0x4}, 0x10a042, 0x0, 0x0, 0x6, 0x7fffffffffffffff, 0x0, 0x6}, 0x0, 0x4, 0xffffffffffffffff, 0x8) r0 = fsopen(&(0x7f0000001340)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b5000000007b8af8ff00000000bfa200000000000007020000f8ff7fffb703000008000000b7042e7717d1bf1664ee00000000000085000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0xc8080) ioctl$SNDRV_TIMER_IOCTL_GINFO(r4, 0xc0f85403, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYRES64=r2], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="0a00000004000000fd0f000007"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r5}, &(0x7f0000000280), &(0x7f0000000080)=r6}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='itimer_state\x00', r7}, 0x10) setitimer(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x6, 0x6, 0x0, 0x1d) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x9, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x22, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000240)='kfree\x00', r8}, 0x18) r9 = add_key(&(0x7f0000000380)='pkcs7_test\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000300)="def5d2d8e41a30dc1ce2ac1b39", 0xd, 0x0) keyctl$chown(0x4, r9, 0xee00, 0xffffffffffffffff) add_key(&(0x7f0000000080)='dns_resolver\x00', 0x0, &(0x7f0000000040)="42d7", 0xfffff, 0xfffffffffffffffe) keyctl$chown(0x4, r9, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r10 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r10, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) 600.723676ms ago: executing program 6 (id=9240): mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000003c0)='kfree\x00'}, 0x18) mount(0x0, &(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)='devtmpfs\x00', 0x8, &(0x7f0000002040)='dirsync') 571.130866ms ago: executing program 6 (id=9241): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000a00)=@newtaction={0x258, 0x30, 0x300, 0x70bd2d, 0x25dfdbff, {}, [{0x244, 0x1, [@m_skbedit={0x204, 0x19, 0x0, 0x0, {{0xc}, {0x4}, {0x1d5, 0x6, "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"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x2}}}}, @m_gact={0x3c, 0x5, 0x0, 0x0, {{0x9}, {0x4}, {0xd, 0x6, "b78f55c15bbb4ca5b0"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}]}]}, 0x258}}, 0x0) socket(0x10, 0x803, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaabaaaaaa00000000000008004900002c000000000001ac1414bb860600000000000000b1601a7bf1c57ece9ce44fc8370a0c1e29e41f868f58fc2a5f1e0000907800000000"], 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x101042, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)) ioctl$PPPIOCSACTIVE(r0, 0x40047459, &(0x7f0000000080)={0xfffffffffffffe43, 0x0}) read(r0, 0x0, 0x0) write$ppp(r0, &(0x7f0000000000)="bc72", 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x6, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x16, &(0x7f0000000040)={&(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x548}}, 0x0) 472.500257ms ago: executing program 5 (id=9242): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = openat$binfmt_register(0xffffff9c, &(0x7f0000000040), 0x1, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000580)='./file1\x00', 0x40, &(0x7f0000000340), 0x1, 0x55b, &(0x7f0000000940)="$eJzs3U9oHNUfAPDvzGZ//ZefqaCg0kNRoULpJukfrZ7aq1go9CB4qctmG0I22ZDdaBNySO9F7EFUeqk3PXhUPHgQLx69elE8C6JBoelBVvZf2iabuK1JtnY+H5jd9+Zt9vvezH7f7gwzJIDMOtp8SCOejYiLScTIPW1D0Wk82n7d2upy6c7qcimJRuPSb0kkEXF7dbnUfX3SeT4UESsR8UxEfJuPOJ5ujltbXJouVirl+U59tD4zN1pbXDoxNVOcLE+WZ0+98uqZs6fPjJ8c37GxXv/pxnvXv3/91o3PPj+yUvqgmMS5GO603TuOndTeJvk4t2H96d0INkDJoDvAQ8l18jwfEU/HSOQ6WQ88/hr7IhpARiXyHzKq+zugefzbXfby98ev59sHIM24a52l3TLUPjcR+1vHJgf/SO47Mmkebx7ey47yWFq5FhFjQ0ObP/9J5/P38MZ2ooPsqm/Ot3fU5v2frs8/0WP+Ge6eO/2XuvPf2qb572783Bbz38U+Y/z11s8fbxn/WsRzPeMn6/GTHvHTiHi7z/g33/zq7FZtjU8ijkXv+F3J9ueHR69MVcpj7ceeMb4+duS17cZ/cIv47XO2+1tfM722/1yf4//yuy+eX9km/ksvbL//e23/AxHxfp/xn7z96RtbtTXjT2wx/u3iN9fd6jP+y+eO/tjnSwEAAAAAAAAAgAeQtq5lS9LCejlNC4X2PbxPxcG0Uq3Vj1+pLsxOtK95Oxz5tHul1Ui7njTr453rcbv1kxvqp3KdgLkDrXqhVK1MDHjsAAAAAAAAAAAAAAAAAAAA8Kg4tOH+/z9z7fv/gYzwL78hu+Q/ZNf9+Z8MrB/A3vP9D5nVkP+QXfIfskv+Q3bJf8gu+Q/ZJf8hu+Q/AAAAAAAAAAAAAAAAAAAAAAAAAADsiosXLjSXxp3V5VKzPjG0uDBdfefERLk2XZhZKBVK1fm5wmS1OlkpF0rVmX96v0q1OjcWswtXR+vlWn20trh0eaa6MFu/PDVTnCxfLuf3ZFQAAAAAAAAAAAAAAAAAAADw3zLcWpK0EBFpq5ymhULE/yPicOSTK1OV8lhEPBERP+Ty+5r18UF3GgAAAAAAAAAAAAAAAAAAAB4ztcWl6WKlUp5X2FyIiJWdfefmOz7wX+U7++pR2SwKWSgMeGICAAAAAAAAAAAAAAAAAIAMunvT76B7AgAAAAAAAAAAAAAAAAAAAFmW/pJERHM5NvLi8MbW/yVrudZzRLx789KHV4v1+vx4c/3v6+vrH3XWnxxE/4F+dfO0m8cAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAXbXFpelipVKe38XCoMcIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8DD+DgAA//+H69Sv") write$binfmt_register(r3, &(0x7f0000000100)={0x3a, 'syz3', 0x3a, 'E', 0x3a, 0x9, 0x3a, '#]+$', 0x3a, '{', 0x3a, './file0/file0', 0x3a, [0x46]}, 0x33) r4 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) renameat2(r4, &(0x7f0000000140)='./file0/file0\x00', r4, &(0x7f00000002c0)='./file1\x00', 0x2) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143240, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x530, 0x348, 0x18c, 0x203, 0x348, 0x19030000, 0x460, 0x2e0, 0x2e0, 0x460, 0x2e0, 0x3, 0x0, {[{{@uncond, 0x300, 0x312, 0x348, 0x0, {}, [@common=@unspec=@bpf0={{0x230}, {0x13, [{0x5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x7}, {}, {}, {}, {}, {}, {}, {0x16}, {}, {}, {}, {}, {}, {0x0, 0x4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x7}, {}, {}, {}, {0x0, 0x0, 0x0, 0xffff8acc}]}}, @common=@hl={{0x28}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@private, 'veth1_macvtap\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x590) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x9c2, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = io_uring_setup(0x46c9, &(0x7f0000000500)={0x0, 0x733c, 0x0, 0x3, 0x3e6, 0x0, r1}) io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000580), 0x422300, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x12, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x12, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) r9 = dup(r8) write$UHID_INPUT(r9, &(0x7f0000001040)={0xfc, {"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", 0x1000}}, 0x1006) r10 = socket(0x10, 0x803, 0x0) getsockname$packet(r10, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000540)=ANY=[], 0x38}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYRES16=r10, @ANYRES32=r11, @ANYBLOB="83000400cb1507002800128008000100736974001c000280080014000400000008000300ac141410050009"], 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x4000040) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[], 0xa0}}, 0x0) r12 = socket(0x10, 0x3, 0x0) sendmmsg(r12, &(0x7f0000000000), 0x400000000000235, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) pivot_root(0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x3c0, 0x210, 0x9403, 0x3002, 0x210, 0x2c0, 0x2f0, 0x3d8, 0x3d8, 0x2f0, 0x3d8, 0x3, 0x0, {[{{@ipv6={@private2, @remote, [0xffffff00, 0x0, 0xffffffff], [0xffffffff, 0xffffff00, 0xffffffff], 'macvlan1\x00', 'wg2\x00', {}, {0xa4c8dd0ffa9b1578}, 0x73, 0x9, 0x4, 0x48}, 0x0, 0x1c8, 0x210, 0x0, {}, [@inet=@rpfilter={{0x28}, {0xc}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x80, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@private1}}}, {{@uncond, 0x0, 0xa8, 0xe0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0xffffffffffffffff, 0x0, 0x2}, {0x4, 0x5, 0x5}, {0x3, 0x4}, 0xbf, 0xb}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x47b) 416.229867ms ago: executing program 7 (id=9243): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='kfree\x00', r0}, 0x18) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20000, 0x40) r1 = syz_open_dev$usbfs(&(0x7f0000000340), 0x800000001f7, 0x82) r2 = dup(r1) ioctl$USBDEVFS_CONTROL(r2, 0xc0185500, &(0x7f0000000040)={0x23, 0x3, 0x4, 0xf, 0x0, 0x2, 0x0}) 374.141337ms ago: executing program 7 (id=9244): ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000080)=0x2) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000440)={0x28, 0x0, 0x0, @local}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bind$inet(0xffffffffffffffff, &(0x7f0000000300)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r2, &(0x7f0000000280)={0x11, 0x7, r3, 0x1, 0xdf, 0x6, @local}, 0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0900000004000000e27f000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r5], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_open_dev$hiddev(0x0, 0x7, 0x802) mkdir(0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = signalfd4(0xffffffffffffffff, &(0x7f0000000140)={[0xffeffffffffffffa]}, 0x8, 0x0) io_setup(0x206, &(0x7f0000000200)=0x0) io_submit(r8, 0x47f, &(0x7f00000005c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r7, &(0x7f00000003c0)="951aa14bd6f68579cac67c83bf8d4500e5cea1bb1596d4ee6645fa16fa7cacb9214070a622a2c57b89075f59b85c7b5b2c41edc9d2cd5a2c95ed1c2cf72425be9c1a2df1b60a309bc3228d7e85b300f0d7a042a40166b9208e9d2e423c32ad8e47adedf5dc425c6bcb031fb2230835d41afc23476eae602bad3246417e5ac757", 0x80}]) ioctl$SNAPSHOT_ATOMIC_RESTORE(r7, 0x3304) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x7ff}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xae) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r9}, 0x10) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r10, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) sendmsg$nl_route_sched(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@getchain={0x24, 0x11, 0x1, 0x70bd2a, 0x8000000, {0x0, 0x0, 0x0, r3, {0x1f, 0x3}}}, 0x24}, 0x1, 0x0, 0x0, 0x20008040}, 0x4000000) 373.160507ms ago: executing program 6 (id=9245): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="580000000101010400000000000000250a0000034400018006000340000200000c00028005000100210000002c00018014000300"], 0x58}, 0x1, 0x0, 0x0, 0x8080}, 0x20000094) r4 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x130) r5 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4200, 0x1) write$9p(r4, &(0x7f0000001400)="3b27a4b403e92b", 0x4944) sendfile(r4, r5, 0x0, 0x7ffff000) getsockopt$inet_dccp_int(r4, 0x21, 0x5, &(0x7f0000000800), &(0x7f0000000840)=0x4) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r8}, 0x10) 310.395618ms ago: executing program 7 (id=9246): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_emit_ethernet(0x766, &(0x7f0000000840)={@link_local, @link_local, @void, {@ipv6={0x86dd, @tipc_packet={0x8, 0x6, "3de3ee", 0x730, 0x6, 0x0, @local, @private0={0xfc, 0x0, '\x00', 0x1}, {[@dstopts={0xff, 0xc, '\x00', [@pad1, @jumbo={0xc2, 0x4, 0xffffd165}, @pad1, @jumbo={0xc2, 0x4, 0x4}, @ra={0x5, 0x2, 0x7}, @generic={0x63, 0x4b, "738e8adae4bcbffae354d36aed491fe1a01d3716ea57909e4a5abd20c604b8955976436f33d60dae8ab6dfe6f96d1d4c2c48772f4cf751b3af2c9d6b03246af22d4af0cdbd62bf029ad231"}]}, @hopopts={0x21, 0x69, '\x00', [@calipso={0x7, 0x18, {0x0, 0x4, 0x3, 0x8, [0x4, 0x955]}}, @jumbo={0xc2, 0x4, 0x81}, @ra={0x5, 0x2, 0x400}, @calipso={0x7, 0x50, {0x2, 0x12, 0x7, 0x3, [0x1, 0x9, 0x3, 0x1, 0x1000, 0x7, 0x6, 0x8, 0x3]}}, @generic={0x0, 0xf4, "a686ad0e164a78d9ee24fb299129b1687b256c647f3f68471b8e53b79a730337fd7b1da26bd2629943563e9f3ca3d889036ce19e20ea9281de31b575fea733ab2809722ae2ff5ff91ed8fda0947ef7183f6f1a1929e8124a180c1339a62e33260ffa8e93a16bed5bcd31c1817d82f6d51de1140fa68c6bef5d0493850f5fdee6499a1e8557dba73ac6c5ab0468ad6f90a1a2552a2fa320966c663961922023e9b26e79d5075998ec031cddbe3ab3c73d175a058bf8319092acbdf3a74665d8f4a0c250ad411a1e6dcd8ff93c4aa4c7f45e1c962267ff1937f741b54b6deb538ddb0d1a0ed45c4c7507c66565f6865371d86b9be5"}, @generic={0x10, 0xf4, "cc4dd767ca28de76323b1380f51e5574351776432b9c01f029dc67c6534d23f4922537a2d2da7b5c0212c80dca5634c40374c32550a9e21c82df1880b7e6fe3c2d4d8984319e29dc93b3c18a421a6644b1a2352a7c44f929d0ac0723191b58632a120c4c456c706c695d14813b49f727ec8effdadd04bfa3cc4a951022df9bf0efa4b738fe8bb484ef31a502712fa07253149b9f1d621db7c6571cf2cbd8d43b1f0f402b4fdd719f7a16ae20474af5208d0477bc1c5bc2f4e9f9b5231a07354fd9fd22fb382009448d8b07d61cf1c9b4f4ef8ed387bcbeca8d4666e4fcdcf08efe53f392c920ba8c592c6427c5fe180a708625bf"}, @padn={0x1, 0x2, [0x0, 0x0]}, @generic={0x6, 0xe5, "e66b267293d08abcf14a21066ef17d8cd644c6b69d94715e65a783ca47bd0d27b45c90bdb500658e998628b005e89851be13212d1df59bb4c903694a957da2d795377b158decb8e509be97e6a96e9a74f98afa71d0c68ad72812f051898f1b23640fa649bcd88b5b44a2a99a2c1f42ad8115928e31b8a9ecafd4b178a3d4f3e46a2a238c7bf87f6f9105658deb4ec21b3fc878a724199cac9e167110d7b8e72d48a6ff3da51147441c16bf75f4ef6c6d5233374faf46680759b1c52fbb3380f12454b314714bb0fc2ee144c7e7e59b84b745af1a031048c796af7de90b6aa1012993da3828"}]}, @routing={0x2b, 0x8, 0x1, 0x81, 0x0, [@empty, @local, @loopback, @rand_addr=' \x01\x00']}, @srh={0xff, 0x6, 0x4, 0x3, 0x0, 0x0, 0xc2, [@remote, @remote, @remote]}, @fragment={0x3b, 0x0, 0x7, 0x1, 0x0, 0x17, 0x68}, @hopopts={0x2b, 0x26, '\x00', [@hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @enc_lim, @calipso={0x7, 0x28, {0x2, 0x8, 0xf7, 0x3, [0x5d, 0xe01, 0x14, 0x3]}}, @pad1, @ra={0x5, 0x2, 0x8}, @generic={0x9, 0xd9, "7b8420096fee7a42363fa64c34610c3405efc29cbe43f909b8e7deee49dd24db9cf1711ee645d14dfe498c51fcd8c243794052d7fb53f11e2cdfeadc29bae90b7115c81ee38e1048d097653f83941bb6d470b6c6466b052aa7ddb2538df1760a53c9787655eac6808b735cfde7198fc4ccb7c854805b3b0b14553d2e7a568b0fc3daf08ebbd804643d63ad3db943735894ca755b10e11657471e3da51654effb0cdce4407cc4939d42b096cfa377eea1a0117989b4eab52b4db8e03e0ded35ac0c40bfe9f94e353188561f6fe3b8fa06af26ba17e5e5f0d33e"}, @hao={0xc9, 0x10, @local}]}, @dstopts={0x3a, 0xe, '\x00', [@calipso={0x7, 0x20, {0x1, 0x6, 0x6, 0x5, [0x5d9, 0x2, 0x9]}}, @calipso={0x7, 0x50, {0x2, 0x12, 0xe1, 0xffff, [0xbc, 0x7, 0x0, 0x800, 0x8000000000000001, 0x7, 0x9, 0xa, 0x101]}}]}, @routing={0xff, 0x2, 0x2, 0x6b, 0x0, [@mcast1]}], @name_distributor={{0x108, 0x0, 0x0, 0x0, 0x1, 0xa, 0xb, 0x2, 0x9, 0x0, 0x0, 0x65bf, 0x208, 0x3, 0x4e24, 0x4e20, 0x3, 0x4}, [{0x10, 0x4, 0x0, 0xe, 0xfffffffb, 0x3, 0x8, 0x8}, {0xfffffff7, 0x9, 0x4, 0x400, 0x401, 0x8000, 0x9, 0x5}, {0x200, 0x0, 0x9050, 0x81, 0x401, 0x3, 0x1, 0x7fff}, {0x80000000, 0x1, 0x0, 0x7, 0x1, 0x0, 0xb, 0x40}, {0x7, 0x10001, 0x5cc, 0x2, 0x8, 0x5, 0x8, 0x7}, {0x6, 0xac, 0xffff9cf3, 0x0, 0xc1, 0x0, 0xd, 0x6}, {0x6, 0xfffffffc, 0x0, 0x8, 0x7ff, 0x9, 0x7, 0x284}, {0x0, 0x82ce, 0xb, 0x1000, 0xf0, 0x7, 0x7, 0x2}]}}}}}}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000001040)={'sit0\x00', &(0x7f0000001000)={'syztnl2\x00', 0x0, 0x0, 0xa000, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x64, 0x0, 0x0, 0x4, 0x0, @empty, @rand_addr=0x3}}}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$inet(r3, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x4001, @dev={0xac, 0x14, 0x14, 0x2d}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x200048cc) setsockopt$sock_attach_bpf(r3, 0x1, 0xd, &(0x7f0000000080), 0x24) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x1000}, 0x8, 0x10, &(0x7f00000001c0), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x2, @local, 'geneve1\x00'}}, 0x1e) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000200), 0x80000, 0x0) r4 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r4, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r4, 0x1, 0x8, &(0x7f0000000000)=0x80, 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r4, 0x10e, 0x4, &(0x7f0000000180)=0x800, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r4) r5 = socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000380)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x5, 0x0, @void, @value, @void, @value}, 0x50) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000001bc0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="010025bd7400fbdbdf2103000000180001777242b43a8f1b805f74756e00000000000000000005000300fcff0000"], 0x34}, 0x1, 0x0, 0x0, 0x20008015}, 0x4000080) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_sctp(0xa, 0x1, 0x84) connect$unix(r7, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r8, &(0x7f0000000000), 0x651, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) 84.729729ms ago: executing program 4 (id=9247): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x4c0201) quotactl$Q_SYNC(0x0, 0x0, 0x0, 0x0) quotactl$Q_SYNC(0xffffffff80000102, 0x0, 0x0, 0x0) r1 = fcntl$getown(r0, 0x9) process_vm_readv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/34, 0x22}], 0x1, &(0x7f00000005c0)=[{&(0x7f00000000c0)=""/208, 0xd0}, {&(0x7f00000001c0)=""/207, 0xcf}, {&(0x7f00000002c0)=""/170, 0xaa}, {&(0x7f0000000380)=""/154, 0x9a}, {&(0x7f0000000440)=""/54, 0x36}, {&(0x7f0000000480)=""/134, 0x86}, {&(0x7f0000000540)=""/22, 0x16}, {&(0x7f0000000580)=""/12, 0xc}], 0x8, 0x0) quotactl$Q_SYNC(0xffffffff80000101, 0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000640)=@xfs={0x1c, 0x81, {0x5, 0x7, 0x6, 0x6}}, 0x400000) quotactl$Q_SYNC(0xffffffff80000100, 0x0, 0x0, 0x0) r2 = getpid() r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x2, 0x14, 0x9, 0x7, 0x8, 0x0, 0x70bd2b, 0x25dfdbfe, [@sadb_x_nat_t_port={0x1, 0x16, 0x4e24}, @sadb_x_sa2={0x2, 0x13, 0x6, 0x0, 0x0, 0x70bd29, 0x3506}, @sadb_spirange={0x2, 0x10, 0x4d3, 0x4d2}, @sadb_x_nat_t_type={0x1, 0x14, 0x6}]}, 0x40}}, 0x20000834) clock_gettime(0x0, &(0x7f0000000740)={0x0, 0x0}) timer_settime(0x0, 0x1, &(0x7f0000000780)={{r4, r5+10000000}}, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f00000007c0)={0x18, 0x0, {0x3, @local, 'veth1\x00'}}, 0x1e) quotactl$Q_SYNC(0xffffffff80000101, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) quotactl$Q_SYNC(0xffffffff80000100, 0x0, 0x0, 0x0) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000800), 0x80002, 0x0) sendmsg$rds(r6, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000840), 0x0, &(0x7f0000000880), 0x0, 0x40}, 0xcc) r7 = inotify_init1(0x0) quotactl$Q_SYNC(0xffffffff80000100, 0x0, 0x0, 0x0) write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000900)={'full', 0x20, 0x1000, 0x20, 0x8}, 0x2f) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r6, 0x89f0, &(0x7f0000000a00)={'tunl0\x00', &(0x7f0000000940)={'syztnl2\x00', 0x0, 0x7800, 0x20, 0x5, 0x5, {{0x24, 0x4, 0x1, 0x3, 0x90, 0x65, 0x0, 0x10, 0x8d93f74b235ce108, 0x0, @multicast2, @broadcast, {[@lsrr={0x83, 0x27, 0x4d, [@loopback, @private=0xa010100, @remote, @rand_addr=0x64010102, @empty, @private=0xa010100, @broadcast, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_prespec={0x44, 0x14, 0x14, 0x3, 0xa, [{@empty, 0x6}, {@remote, 0xe}]}, @cipso={0x86, 0x3c, 0x3, [{0x2, 0xf, "24a189d9eb24951fcf46b994b5"}, {0x7, 0x12, "bdcbc1e1c2368b2948223fefb634773f"}, {0x0, 0xd, "e0b4c6ee526e51b60e3d50"}, {0x0, 0x8, "72eec2033108"}]}, @ra={0x94, 0x4, 0x1}, @noop]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@base={0x0, 0x8, 0x7fff, 0x4, 0x81000, r6, 0x1ff, '\x00', r8, r6, 0x1, 0x5, 0x3, 0x0, @void, @value, @void, @value}, 0x50) quotactl$Q_SYNC(0xffffffff80000101, 0x0, 0x0, 0x0) quotactl$Q_SYNC(0xffffffff80000100, 0x0, 0x0, 0x0) prlimit64(r2, 0x3, &(0x7f0000000ac0)={0x0, 0x8}, &(0x7f0000000b00)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000d80)={r6, 0x20, &(0x7f0000000d40)={&(0x7f0000000c40)=""/113, 0x71, 0x0, &(0x7f0000000cc0)=""/94, 0x5e}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x1, 0x3, &(0x7f0000000b40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10000}}, &(0x7f0000000b80)='GPL\x00', 0xcb, 0x27, &(0x7f0000000bc0)=""/39, 0x41000, 0x42, '\x00', r8, @fallback=0x1b, r6, 0x8, &(0x7f0000000c00)={0x0, 0x4}, 0x8, 0x10, 0x0, 0x0, r9, r7, 0x3, &(0x7f0000000dc0)=[r6, r6], &(0x7f0000000e00)=[{0x5, 0x2, 0x8, 0x3}, {0x0, 0x5, 0x8, 0x6}, {0x0, 0x3, 0x6, 0x3}], 0x10, 0x2, @void, @value}, 0x94) quotactl$Q_SYNC(0xffffffff80000101, 0x0, 0x0, 0x0) 1.02215ms ago: executing program 4 (id=9248): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0xc0c7ca0fac4b1cc) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x7f, 0x7ffc0000}]}) times(0x0) 581.7µs ago: executing program 4 (id=9249): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_SET_FLAGS(r0, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x5c, r1, 0x1, 0x70bd28, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_ADDR_REMOTE={0x2c, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}]}, @MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000004}, 0x10040880) 0s ago: executing program 4 (id=9250): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000008385000000710000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1) mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f00000000c0)='nfs\x00', 0x0, 0x0) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0x4) (async) close(0xffffffffffffffff) (async) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x2c00) (async) r3 = gettid() fcntl$setown(0xffffffffffffffff, 0x8, r3) (async) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(0x0, r4, 0x0) (async) setresuid(r4, 0x0, 0xffffffffffffffff) (async) r5 = getgid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000740)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000440)="f8751e9f16a60b345c54f9fd40488a07182899149fcce2c2c56c4f5cf79f871ff702499cf526cb451a3743d4f733973d92befd23ff10ec7f07bb3dc0bbb0db7b36817b103b2d2571073b7ec079182ab2158ff253fd42ea8653c0", 0x5a}], 0x1, &(0x7f0000000680)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xffffffffffffffff}}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, r1, r2, r0, r0]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [r0, r2]}}, @cred={{0x1c, 0x1, 0x2, {r3, r4, r5}}}], 0xc0, 0x40}}], 0x1, 0x0) (async) r6 = dup2(r2, r2) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x4c, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x20, 0x10, 0x401}, 0x20}}, 0x80) (async) pwrite64(r7, &(0x7f0000000280)="fbe12612afd66310a3a72b439ab831cbe9a404a27a9c97d26abe21d74801047bdb71bb1a16fa4340bad67d1fea7cd2b7f798e3a9c4aa4d1d860999fee027913b029b660207fe0da078f780237f9ab43c44d79790d233cac88297b6b9e3603abd2f6812f322ca9a0719b1e038e1cd45c49d99f9d0962a5f43335b1a6d043b7dfe56469f01e483594252c813d31d015b408545b7c9fd4d077f92a7abf89ee6aa27eeb6a0a3fc0855b546162592ed2724d46bae509a2c71a44f4934d5b8f09f81f49bd041656719c111285728334bfd5e7d679497795295149c", 0xd8, 0x5) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x200000a, 0x1}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0, 0x0, 0xca1f}, 0x18) (async) ioctl$BLKTRACESETUP(r6, 0x1276, 0x0) (async) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b7030000000080008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r9}, 0x18) (async) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f00001d8000/0x2000)=nil, 0x2000, 0x8, 0x12, r10, 0x0) (async) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r11, &(0x7f00000004c0)={'#! ', './file0'}, 0xb) (async) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x8404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x3200, 0x10001, 0x6, 0x0, 0x0, 0x1fffffff, 0x0, 0x0, 0x5}, 0x0, 0x1, 0xffffffffffffffff, 0x0) (async) chmod(&(0x7f0000000180)='./file0\x00', 0x1) kernel console output (not intermixed with test programs): no=246 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 504.331094][ T30] audit: type=1400 audit(2000000298.200:20618): avc: denied { create } for pid=28561 comm="syz.7.8088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 504.352497][ T30] audit: type=1400 audit(2000000298.210:20619): avc: denied { setopt } for pid=28561 comm="syz.7.8088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 504.387754][ T30] audit: type=1400 audit(2000000298.260:20620): avc: denied { create } for pid=28561 comm="syz.7.8088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 504.429640][ T30] audit: type=1400 audit(2000000298.300:20621): avc: denied { mounton } for pid=28564 comm="syz.6.8089" path="/568/file0" dev="tmpfs" ino=3059 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 504.493730][ T30] audit: type=1326 audit(2000000298.370:20622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28571 comm="syz.6.8093" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f8181a8d169 code=0x0 [ 504.723654][ T30] audit: type=1326 audit(2000000298.600:20623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28586 comm="syz.5.8099" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f24dfb4d169 code=0x0 [ 504.760976][T28589] net_ratelimit: 16 callbacks suppressed [ 504.760992][T28589] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 504.794627][T28589] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 504.819316][T28589] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 504.826711][ T30] audit: type=1400 audit(2000000298.690:20624): avc: denied { name_bind } for pid=28586 comm="syz.5.8099" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 504.833789][T28589] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 504.858242][T28589] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 504.949964][T28595] xt_hashlimit: size too large, truncated to 1048576 [ 505.086732][T28602] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) [ 505.172016][T28604] netlink: 20 bytes leftover after parsing attributes in process `syz.1.8103'. [ 505.399495][T28614] loop6: detected capacity change from 0 to 512 [ 505.406947][T28614] EXT4-fs (loop6): encrypted files will use data=ordered instead of data journaling mode [ 505.419800][T28614] EXT4-fs (loop6): 1 truncate cleaned up [ 505.426176][T28614] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 505.454679][T19576] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 505.576165][T28644] FAULT_INJECTION: forcing a failure. [ 505.576165][T28644] name failslab, interval 1, probability 0, space 0, times 0 [ 505.589274][T28644] CPU: 0 UID: 0 PID: 28644 Comm: syz.5.8120 Not tainted 6.14.0-rc7-syzkaller-00067-g76b6905c11fd #0 [ 505.589296][T28644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 505.589308][T28644] Call Trace: [ 505.589313][T28644] [ 505.589320][T28644] dump_stack_lvl+0xf2/0x150 [ 505.589345][T28644] dump_stack+0x15/0x1a [ 505.589427][T28644] should_fail_ex+0x24a/0x260 [ 505.589455][T28644] should_failslab+0x8f/0xb0 [ 505.589527][T28644] __kmalloc_node_noprof+0xad/0x410 [ 505.589574][T28644] ? __kvmalloc_node_noprof+0x72/0x170 [ 505.589602][T28644] __kvmalloc_node_noprof+0x72/0x170 [ 505.589627][T28644] nf_hook_entries_grow+0x1bd/0x470 [ 505.589658][T28644] __nf_register_net_hook+0x16b/0x480 [ 505.589693][T28644] nf_register_net_hook+0x88/0x130 [ 505.589719][T28644] nf_register_net_hooks+0x41/0x140 [ 505.589752][T28644] nf_ct_netns_do_get+0x2a6/0x370 [ 505.589777][T28644] ? nft_connlimit_do_init+0xba/0x170 [ 505.589878][T28644] nf_ct_netns_get+0x83/0xb0 [ 505.589903][T28644] nft_connlimit_do_init+0x113/0x170 [ 505.589945][T28644] nft_connlimit_init+0x29/0x40 [ 505.589966][T28644] nf_tables_newrule+0xfa1/0x1770 [ 505.590024][T28644] ? __nla_parse+0x40/0x60 [ 505.590115][T28644] nfnetlink_rcv+0xb3e/0x15d0 [ 505.590226][T28644] netlink_unicast+0x599/0x670 [ 505.590331][T28644] netlink_sendmsg+0x5cc/0x6e0 [ 505.590351][T28644] ? __pfx_netlink_sendmsg+0x10/0x10 [ 505.590472][T28644] __sock_sendmsg+0x140/0x180 [ 505.590501][T28644] ____sys_sendmsg+0x326/0x4b0 [ 505.590604][T28644] __sys_sendmsg+0x19d/0x230 [ 505.590638][T28644] __x64_sys_sendmsg+0x46/0x50 [ 505.590660][T28644] x64_sys_call+0x2734/0x2dc0 [ 505.590689][T28644] do_syscall_64+0xc9/0x1c0 [ 505.590752][T28644] ? clear_bhb_loop+0x55/0xb0 [ 505.590776][T28644] ? clear_bhb_loop+0x55/0xb0 [ 505.590799][T28644] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 505.590944][T28644] RIP: 0033:0x7f24dfb4d169 [ 505.590958][T28644] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 505.590974][T28644] RSP: 002b:00007f24de1b7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 505.590990][T28644] RAX: ffffffffffffffda RBX: 00007f24dfd65fa0 RCX: 00007f24dfb4d169 [ 505.591001][T28644] RDX: 0000000000000000 RSI: 00004000000002c0 RDI: 0000000000000005 [ 505.591067][T28644] RBP: 00007f24de1b7090 R08: 0000000000000000 R09: 0000000000000000 [ 505.591142][T28644] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 505.591154][T28644] R13: 0000000000000000 R14: 00007f24dfd65fa0 R15: 00007ffe8e47b9b8 [ 505.591170][T28644] [ 505.860626][T28649] tipc: Started in network mode [ 505.865618][T28649] tipc: Node identity aaaaaaaaaaaa, cluster identity 4711 [ 505.872877][T28649] tipc: Enabled bearer , priority 10 [ 505.887278][T28651] netlink: 20 bytes leftover after parsing attributes in process `wg1'. [ 505.896526][T28649] netlink: 14 bytes leftover after parsing attributes in process `syz.1.8122'. [ 505.897585][T28651] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 505.913468][T28651] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 505.925525][T28649] tipc: Resetting bearer [ 505.933966][T28649] tipc: Disabling bearer [ 505.991989][ T9] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 506.130404][T28660] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8126'. [ 506.145679][T28660] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8126'. [ 506.160670][T28660] bond0: entered promiscuous mode [ 506.165913][T28660] bond_slave_0: entered promiscuous mode [ 506.171800][T28660] bond_slave_1: entered promiscuous mode [ 506.293831][T28677] tipc: Started in network mode [ 506.298884][T28677] tipc: Node identity aaaaaaaaaaaa, cluster identity 4711 [ 506.306338][T28677] tipc: Enabled bearer , priority 10 [ 506.314504][T28677] netlink: 14 bytes leftover after parsing attributes in process `syz.5.8133'. [ 506.323765][T28677] tipc: Resetting bearer [ 506.333947][T28677] tipc: Disabling bearer [ 506.367655][T28679] netlink: 100 bytes leftover after parsing attributes in process `syz.5.8133'. [ 506.381747][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 506.390028][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 506.398257][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 506.406504][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 506.496095][T28690] atomic_op ffff88811bf94528 conn xmit_atomic 0000000000000000 [ 506.507766][T28690] loop6: detected capacity change from 0 to 128 [ 506.615014][ T29] kworker/u8:1: attempt to access beyond end of device [ 506.615014][ T29] loop6: rw=1, sector=153, nr_sectors = 8 limit=128 [ 506.630857][ T29] kworker/u8:1: attempt to access beyond end of device [ 506.630857][ T29] loop6: rw=1, sector=169, nr_sectors = 8 limit=128 [ 506.644552][ T29] kworker/u8:1: attempt to access beyond end of device [ 506.644552][ T29] loop6: rw=1, sector=185, nr_sectors = 8 limit=128 [ 506.658337][ T29] kworker/u8:1: attempt to access beyond end of device [ 506.658337][ T29] loop6: rw=1, sector=201, nr_sectors = 8 limit=128 [ 506.672005][ T29] kworker/u8:1: attempt to access beyond end of device [ 506.672005][ T29] loop6: rw=1, sector=217, nr_sectors = 8 limit=128 [ 506.685557][ T29] kworker/u8:1: attempt to access beyond end of device [ 506.685557][ T29] loop6: rw=1, sector=233, nr_sectors = 8 limit=128 [ 506.700179][ T29] kworker/u8:1: attempt to access beyond end of device [ 506.700179][ T29] loop6: rw=1, sector=249, nr_sectors = 8 limit=128 [ 506.713722][ T29] kworker/u8:1: attempt to access beyond end of device [ 506.713722][ T29] loop6: rw=1, sector=265, nr_sectors = 8 limit=128 [ 506.727165][ T29] kworker/u8:1: attempt to access beyond end of device [ 506.727165][ T29] loop6: rw=1, sector=281, nr_sectors = 8 limit=128 [ 506.740741][ T29] kworker/u8:1: attempt to access beyond end of device [ 506.740741][ T29] loop6: rw=1, sector=297, nr_sectors = 8 limit=128 [ 506.969508][T28720] loop6: detected capacity change from 0 to 512 [ 506.976231][T28720] ext4: Unknown parameter 'euid' [ 506.990998][T28720] loop6: detected capacity change from 0 to 128 [ 506.997948][T28720] FAT-fs (loop6): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 507.010747][T28720] FAT-fs (loop6): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 507.058753][T28728] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 507.091342][T28734] netlink: 4 bytes leftover after parsing attributes in process `syz.6.8153'. [ 507.110894][T28734] netlink: 4 bytes leftover after parsing attributes in process `syz.6.8153'. [ 507.396082][T28758] netlink: 8 bytes leftover after parsing attributes in process `syz.6.8160'. [ 507.902549][ T57] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 508.547098][T28812] usb usb5: usbfs: process 28812 (syz.5.8179) did not claim interface 0 before use [ 508.777613][T28824] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=28824 comm=syz.7.8182 [ 508.790307][T28824] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=28824 comm=syz.7.8182 [ 509.015050][T28795] FAULT_INJECTION: forcing a failure. [ 509.015050][T28795] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 509.028563][T28795] CPU: 0 UID: 0 PID: 28795 Comm: syz.4.8173 Not tainted 6.14.0-rc7-syzkaller-00067-g76b6905c11fd #0 [ 509.028594][T28795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 509.028638][T28795] Call Trace: [ 509.028656][T28795] [ 509.028739][T28795] dump_stack_lvl+0xf2/0x150 [ 509.028820][T28795] dump_stack+0x15/0x1a [ 509.028843][T28795] should_fail_ex+0x24a/0x260 [ 509.028875][T28795] should_fail_alloc_page+0xfd/0x110 [ 509.028910][T28795] __alloc_frozen_pages_noprof+0x109/0x340 [ 509.029020][T28795] alloc_pages_mpol+0xb4/0x260 [ 509.029096][T28795] vma_alloc_folio_noprof+0x1a0/0x310 [ 509.029125][T28795] handle_mm_fault+0xdd7/0x2b00 [ 509.029156][T28795] exc_page_fault+0x3b9/0x650 [ 509.029187][T28795] asm_exc_page_fault+0x26/0x30 [ 509.029213][T28795] RIP: 0033:0x7fe8595ca78b [ 509.029230][T28795] Code: c0 8b 87 c0 00 00 00 66 0f 6c c0 85 c0 0f 85 44 01 00 00 c7 87 c0 00 00 00 ff ff ff ff 48 8d 84 24 20 21 00 00 48 8d 7c 24 20 <0f> 29 44 24 40 49 89 e4 48 89 44 24 50 8b 43 74 48 89 9c 24 00 01 [ 509.029281][T28795] RSP: 002b:00007fe857c84e10 EFLAGS: 00010246 [ 509.029298][T28795] RAX: 00007fe857c86f30 RBX: 00007fe85980c620 RCX: 0000000000000000 [ 509.029311][T28795] RDX: 00007fe857c86f78 RSI: 00007fe85967cbd8 RDI: 00007fe857c84e30 [ 509.029324][T28795] RBP: 0000000000000009 R08: 0000000000000000 R09: 0000000000000000 [ 509.029337][T28795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 509.029349][T28795] R13: 0000000000000000 R14: 00007fe859835fa0 R15: 00007ffeeccd7738 [ 509.029369][T28795] [ 509.029381][T28795] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 509.195763][ T30] kauditd_printk_skb: 207 callbacks suppressed [ 509.195782][ T30] audit: type=1400 audit(2000000303.060:20832): avc: denied { setopt } for pid=28833 comm="syz.7.8187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 509.263966][ T30] audit: type=1326 audit(2000000303.110:20833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28833 comm="syz.7.8187" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f991716d169 code=0x7ffc0000 [ 509.287855][ T30] audit: type=1326 audit(2000000303.110:20834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28833 comm="syz.7.8187" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f991716d169 code=0x7ffc0000 [ 509.311634][ T30] audit: type=1326 audit(2000000303.110:20835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28833 comm="syz.7.8187" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f991716d169 code=0x7ffc0000 [ 509.335315][ T30] audit: type=1326 audit(2000000303.110:20836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28833 comm="syz.7.8187" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f991716d169 code=0x7ffc0000 [ 509.359068][ T30] audit: type=1326 audit(2000000303.110:20837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28833 comm="syz.7.8187" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f991716d169 code=0x7ffc0000 [ 509.382910][ T30] audit: type=1326 audit(2000000303.110:20838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28833 comm="syz.7.8187" exe="/root/syz-executor" sig=0 arch=c000003e syscall=25 compat=0 ip=0x7f991716d169 code=0x7ffc0000 [ 509.406561][ T30] audit: type=1326 audit(2000000303.110:20839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28833 comm="syz.7.8187" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f991716d169 code=0x7ffc0000 [ 509.430347][ T30] audit: type=1326 audit(2000000303.110:20840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28833 comm="syz.7.8187" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f991716d169 code=0x7ffc0000 [ 509.454053][ T30] audit: type=1326 audit(2000000303.110:20841): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28833 comm="syz.7.8187" exe="/root/syz-executor" sig=0 arch=c000003e syscall=49 compat=0 ip=0x7f991716d169 code=0x7ffc0000 [ 509.610248][T28859] netlink: 'syz.4.8194': attribute type 4 has an invalid length. [ 509.786955][T28866] net_ratelimit: 140 callbacks suppressed [ 509.786975][T28866] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 509.835075][T28867] netlink: 'syz.7.8199': attribute type 4 has an invalid length. [ 510.567795][T28887] __nla_validate_parse: 4 callbacks suppressed [ 510.567813][T28887] netlink: 4 bytes leftover after parsing attributes in process `syz.6.8208'. [ 510.639486][T28887] netlink: 4 bytes leftover after parsing attributes in process `syz.6.8208'. [ 510.849675][T28903] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8213'. [ 510.974310][T28933] IPv6: sit1: Disabled Multicast RS [ 510.980293][T28933] sit1: entered allmulticast mode [ 511.080537][T28933] sctp: [Deprecated]: syz.4.8223 (pid 28933) Use of struct sctp_assoc_value in delayed_ack socket option. [ 511.080537][T28933] Use struct sctp_sack_info instead [ 511.559943][T28982] netlink: 12 bytes leftover after parsing attributes in process `syz.5.8242'. [ 511.702217][T28996] netlink: 'syz.5.8243': attribute type 4 has an invalid length. [ 511.846587][T29005] loop6: detected capacity change from 0 to 512 [ 511.854017][T29005] EXT4-fs (loop6): encrypted files will use data=ordered instead of data journaling mode [ 511.865482][T29005] EXT4-fs (loop6): 1 truncate cleaned up [ 511.871544][T29005] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 511.908868][T19576] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 511.940954][T29011] netlink: 4 bytes leftover after parsing attributes in process `syz.6.8253'. [ 511.948406][T29013] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 511.960473][T29013] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 511.969487][T29013] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 511.979389][T29013] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 512.067420][T29024] netlink: 20 bytes leftover after parsing attributes in process `syz.7.8258'. [ 512.965244][T29079] netlink: 'syz.4.8273': attribute type 4 has an invalid length. [ 512.999818][ T3394] netdevsim netdevsim6 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 513.063324][ T3394] netdevsim netdevsim6 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 513.115434][ T3394] netdevsim netdevsim6 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 513.183415][ T3394] netdevsim netdevsim6 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 513.293254][T29073] chnl_net:caif_netlink_parms(): no params data found [ 513.589231][T29103] random: crng reseeded on system resumption [ 514.158219][T29102] Restarting kernel threads ... done. [ 514.199855][ T3394] bond0 (unregistering): Released all slaves [ 514.216427][T29090] netlink: 28 bytes leftover after parsing attributes in process `syz.5.8283'. [ 514.246856][ T30] kauditd_printk_skb: 283 callbacks suppressed [ 514.246875][ T30] audit: type=1400 audit(2000000308.120:21125): avc: denied { read } for pid=29110 comm="syz.1.8288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 514.288497][ T3394] tipc: Left network mode [ 514.348936][ T3394] veth0_macvtap: left promiscuous mode [ 514.358340][ T30] audit: type=1400 audit(2000000308.230:21126): avc: denied { setopt } for pid=29110 comm="syz.1.8288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 514.378126][ T30] audit: type=1400 audit(2000000308.230:21127): avc: denied { write } for pid=29110 comm="syz.1.8288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 514.479282][T29129] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8293'. [ 514.498183][T29073] bridge0: port 1(bridge_slave_0) entered blocking state [ 514.505567][T29073] bridge0: port 1(bridge_slave_0) entered disabled state [ 514.513017][T29073] bridge_slave_0: entered allmulticast mode [ 514.519663][T29073] bridge_slave_0: entered promiscuous mode [ 514.528144][T29073] bridge0: port 2(bridge_slave_1) entered blocking state [ 514.535293][T29073] bridge0: port 2(bridge_slave_1) entered disabled state [ 514.543626][T29131] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8293'. [ 514.554233][T29073] bridge_slave_1: entered allmulticast mode [ 514.560966][T29073] bridge_slave_1: entered promiscuous mode [ 514.637518][T29073] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 514.648238][T29073] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 514.671377][T29073] team0: Port device team_slave_0 added [ 514.678916][T29073] team0: Port device team_slave_1 added [ 514.698039][T29073] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 514.705113][T29073] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 514.731413][T29073] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 514.743384][T29073] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 514.750514][T29073] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 514.776659][T29073] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 514.819282][T29073] hsr_slave_0: entered promiscuous mode [ 514.825696][T29073] hsr_slave_1: entered promiscuous mode [ 514.827266][ T30] audit: type=1326 audit(2000000308.700:21128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29143 comm="syz.4.8299" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe85961d169 code=0x7ffc0000 [ 514.835710][T29073] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 514.870311][ T30] audit: type=1326 audit(2000000308.730:21129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29143 comm="syz.4.8299" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe85961d169 code=0x7ffc0000 [ 514.894107][ T30] audit: type=1326 audit(2000000308.730:21130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29143 comm="syz.4.8299" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fe85961d169 code=0x7ffc0000 [ 514.917851][ T30] audit: type=1326 audit(2000000308.730:21131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29143 comm="syz.4.8299" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7fe85961d1a3 code=0x7ffc0000 [ 514.941349][ T30] audit: type=1326 audit(2000000308.730:21132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29143 comm="syz.4.8299" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7fe85961bc1f code=0x7ffc0000 [ 514.965247][ T30] audit: type=1326 audit(2000000308.730:21133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29143 comm="syz.4.8299" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7fe85961d1f7 code=0x7ffc0000 [ 514.969262][T29073] Cannot create hsr debugfs directory [ 514.989022][ T30] audit: type=1326 audit(2000000308.730:21134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29143 comm="syz.4.8299" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fe85961bad0 code=0x7ffc0000 [ 515.040145][ T3394] IPVS: stop unused estimator thread 0... [ 515.186584][T29163] xt_hashlimit: max too large, truncated to 1048576 [ 515.197980][T29163] atomic_op ffff88811bfd5928 conn xmit_atomic 0000000000000000 [ 515.306722][T29173] FAULT_INJECTION: forcing a failure. [ 515.306722][T29173] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 515.320043][T29173] CPU: 0 UID: 0 PID: 29173 Comm: syz.5.8307 Not tainted 6.14.0-rc7-syzkaller-00067-g76b6905c11fd #0 [ 515.320104][T29173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 515.320117][T29173] Call Trace: [ 515.320124][T29173] [ 515.320170][T29173] dump_stack_lvl+0xf2/0x150 [ 515.320198][T29173] dump_stack+0x15/0x1a [ 515.320222][T29173] should_fail_ex+0x24a/0x260 [ 515.320286][T29173] should_fail+0xb/0x10 [ 515.320320][T29173] should_fail_usercopy+0x1a/0x20 [ 515.320359][T29173] _copy_from_user+0x1c/0xa0 [ 515.320383][T29173] move_addr_to_kernel+0x82/0x120 [ 515.320457][T29173] __sys_connect+0x67/0x1b0 [ 515.320488][T29173] __x64_sys_connect+0x41/0x50 [ 515.320509][T29173] x64_sys_call+0x22a7/0x2dc0 [ 515.320534][T29173] do_syscall_64+0xc9/0x1c0 [ 515.320571][T29173] ? clear_bhb_loop+0x55/0xb0 [ 515.320639][T29173] ? clear_bhb_loop+0x55/0xb0 [ 515.320666][T29173] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 515.320742][T29173] RIP: 0033:0x7f24dfb4d169 [ 515.320825][T29173] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 515.320847][T29173] RSP: 002b:00007f24de1b7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 515.320877][T29173] RAX: ffffffffffffffda RBX: 00007f24dfd65fa0 RCX: 00007f24dfb4d169 [ 515.320892][T29173] RDX: 0000000000000010 RSI: 0000400000000080 RDI: 0000000000000007 [ 515.320906][T29173] RBP: 00007f24de1b7090 R08: 0000000000000000 R09: 0000000000000000 [ 515.320920][T29173] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 515.320934][T29173] R13: 0000000000000000 R14: 00007f24dfd65fa0 R15: 00007ffe8e47b9b8 [ 515.320957][T29173] [ 515.509328][T29073] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 515.522785][T29073] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 515.531917][T29073] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 515.540794][T29073] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 515.585633][T29073] 8021q: adding VLAN 0 to HW filter on device bond0 [ 515.598449][T29073] 8021q: adding VLAN 0 to HW filter on device team0 [ 515.608518][T25894] bridge0: port 1(bridge_slave_0) entered blocking state [ 515.615884][T25894] bridge0: port 1(bridge_slave_0) entered forwarding state [ 515.636590][T29073] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 515.647102][T29073] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 515.662172][T25894] bridge0: port 2(bridge_slave_1) entered blocking state [ 515.669274][T25894] bridge0: port 2(bridge_slave_1) entered forwarding state [ 515.729285][T29073] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 515.844959][T29073] veth0_vlan: entered promiscuous mode [ 515.853024][T29073] veth1_vlan: entered promiscuous mode [ 515.868411][T29073] veth0_macvtap: entered promiscuous mode [ 515.877624][T29073] veth1_macvtap: entered promiscuous mode [ 515.888430][T29073] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 515.899080][T29073] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 515.909109][T29073] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 515.919639][T29073] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 515.931169][T29073] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 515.941302][T29073] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 515.951921][T29073] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 515.961788][T29073] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 515.972319][T29073] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 515.983099][T29073] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 516.003050][T29073] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 516.012039][T29073] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 516.020882][T29073] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 516.029705][T29073] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 516.052172][T29211] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 516.247835][T29213] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8317'. [ 516.472108][T29253] netlink: 'syz.5.8332': attribute type 39 has an invalid length. [ 516.623140][T29281] netlink: 28 bytes leftover after parsing attributes in process `syz.4.8345'. [ 517.049220][T29320] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pid=29320 comm=syz.1.8362 [ 517.063441][T29322] atomic_op ffff88815ebe9928 conn xmit_atomic 0000000000000000 [ 517.120756][T29320] tmpfs: Bad value for 'mpol' [ 517.208678][T29332] bridge0: port 3(macsec1) entered blocking state [ 517.215245][T29332] bridge0: port 3(macsec1) entered disabled state [ 517.223190][T29332] macsec1: entered allmulticast mode [ 517.228614][T29332] bridge0: entered allmulticast mode [ 517.234696][T29332] macsec1: left allmulticast mode [ 517.239879][T29332] bridge0: left allmulticast mode [ 517.251117][T29334] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8368'. [ 517.441314][T29347] netlink: 'syz.5.8372': attribute type 13 has an invalid length. [ 517.458489][T29347] gretap0: refused to change device tx_queue_len [ 517.464987][T29347] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 517.498174][T29347] bridge_slave_0: left allmulticast mode [ 517.504262][T29347] bridge_slave_0: left promiscuous mode [ 517.510080][T29347] bridge0: port 1(bridge_slave_0) entered disabled state [ 517.530400][T29347] bridge_slave_1: left allmulticast mode [ 517.536245][T29347] bridge_slave_1: left promiscuous mode [ 517.542021][T29347] bridge0: port 2(bridge_slave_1) entered disabled state [ 517.553408][T29347] bond0: (slave bond_slave_0): Releasing backup interface [ 517.563770][T29347] bond0: (slave bond_slave_1): Releasing backup interface [ 517.577401][T29347] team0: Port device team_slave_0 removed [ 517.586792][T29347] team0: Port device team_slave_1 removed [ 517.595343][T29347] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 517.602836][T29347] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 517.611601][T29347] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 517.619089][T29347] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 517.978286][T29369] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 518.003425][T29371] cgroup: Invalid name [ 518.008211][T29371] tipc: Enabling of bearer rejected, failed to enable media [ 518.076465][T29375] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 518.194899][T29394] netlink: 'syz.1.8387': attribute type 1 has an invalid length. [ 518.202733][T29394] netlink: 16 bytes leftover after parsing attributes in process `syz.1.8387'. [ 518.237323][T29400] FAULT_INJECTION: forcing a failure. [ 518.237323][T29400] name failslab, interval 1, probability 0, space 0, times 0 [ 518.250098][T29400] CPU: 0 UID: 0 PID: 29400 Comm: syz.7.8393 Not tainted 6.14.0-rc7-syzkaller-00067-g76b6905c11fd #0 [ 518.250160][T29400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 518.250174][T29400] Call Trace: [ 518.250183][T29400] [ 518.250192][T29400] dump_stack_lvl+0xf2/0x150 [ 518.250225][T29400] dump_stack+0x15/0x1a [ 518.250250][T29400] should_fail_ex+0x24a/0x260 [ 518.250349][T29400] ? tee_tg_check+0x122/0x290 [ 518.250368][T29400] should_failslab+0x8f/0xb0 [ 518.250461][T29400] __kmalloc_cache_noprof+0x4e/0x320 [ 518.250493][T29400] tee_tg_check+0x122/0x290 [ 518.250517][T29400] xt_check_target+0x266/0x480 [ 518.250553][T29400] ? strnlen+0x28/0x50 [ 518.250574][T29400] ? strcmp+0x21/0x50 [ 518.250596][T29400] ? xt_find_target+0x1c8/0x200 [ 518.250696][T29400] translate_table+0xd02/0x1080 [ 518.250730][T29400] do_ip6t_set_ctl+0x7cc/0x8c0 [ 518.250760][T29400] ? kstrtouint+0x77/0xc0 [ 518.250795][T29400] nf_setsockopt+0x195/0x1b0 [ 518.250829][T29400] ipv6_setsockopt+0x10f/0x130 [ 518.250874][T29400] tcp_setsockopt+0x93/0xb0 [ 518.250945][T29400] sock_common_setsockopt+0x64/0x80 [ 518.250981][T29400] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 518.251024][T29400] __sys_setsockopt+0x187/0x200 [ 518.251076][T29400] __x64_sys_setsockopt+0x66/0x80 [ 518.251108][T29400] x64_sys_call+0x282e/0x2dc0 [ 518.251142][T29400] do_syscall_64+0xc9/0x1c0 [ 518.251211][T29400] ? clear_bhb_loop+0x55/0xb0 [ 518.251238][T29400] ? clear_bhb_loop+0x55/0xb0 [ 518.251267][T29400] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 518.251379][T29400] RIP: 0033:0x7f991716d169 [ 518.251398][T29400] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 518.251422][T29400] RSP: 002b:00007f99157d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 518.251445][T29400] RAX: ffffffffffffffda RBX: 00007f9917385fa0 RCX: 00007f991716d169 [ 518.251488][T29400] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 518.251500][T29400] RBP: 00007f99157d7090 R08: 0000000000000520 R09: 0000000000000000 [ 518.251513][T29400] R10: 0000400000000c80 R11: 0000000000000246 R12: 0000000000000001 [ 518.251527][T29400] R13: 0000000000000000 R14: 00007f9917385fa0 R15: 00007fff2819fb88 [ 518.251550][T29400] [ 518.523221][T29414] netlink: 4 bytes leftover after parsing attributes in process `syz.6.8399'. [ 518.533040][T29414] netlink: 4 bytes leftover after parsing attributes in process `syz.6.8399'. [ 518.555452][T29409] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 518.690336][T29437] netlink: 28 bytes leftover after parsing attributes in process `syz.5.8407'. [ 518.819652][T29451] lo: entered allmulticast mode [ 518.825624][T29450] lo: left allmulticast mode [ 518.865289][T29455] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8413'. [ 518.881617][T29455] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8413'. [ 519.102179][T29464] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 519.112509][T29464] SELinux: failed to load policy [ 519.146904][T29470] netlink: 40 bytes leftover after parsing attributes in process `syz.5.8420'. [ 519.275991][T29489] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 519.311437][T29496] FAULT_INJECTION: forcing a failure. [ 519.311437][T29496] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 519.324622][T29496] CPU: 0 UID: 0 PID: 29496 Comm: syz.5.8430 Not tainted 6.14.0-rc7-syzkaller-00067-g76b6905c11fd #0 [ 519.324653][T29496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 519.324677][T29496] Call Trace: [ 519.324684][T29496] [ 519.324693][T29496] dump_stack_lvl+0xf2/0x150 [ 519.324722][T29496] dump_stack+0x15/0x1a [ 519.324814][T29496] should_fail_ex+0x24a/0x260 [ 519.324847][T29496] should_fail+0xb/0x10 [ 519.324873][T29496] should_fail_usercopy+0x1a/0x20 [ 519.324954][T29496] _copy_from_user+0x1c/0xa0 [ 519.324979][T29496] do_arpt_set_ctl+0x42f/0xa20 [ 519.325013][T29496] ? tcp_release_cb+0xfe/0x380 [ 519.325042][T29496] ? _raw_spin_unlock_bh+0x36/0x40 [ 519.325121][T29496] nf_setsockopt+0x195/0x1b0 [ 519.325148][T29496] ip_setsockopt+0xea/0x100 [ 519.325178][T29496] tcp_setsockopt+0x93/0xb0 [ 519.325291][T29496] sock_common_setsockopt+0x64/0x80 [ 519.325334][T29496] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 519.325431][T29496] smc_setsockopt+0x182/0x7a0 [ 519.325475][T29496] ? __pfx_smc_setsockopt+0x10/0x10 [ 519.325517][T29496] __sys_setsockopt+0x187/0x200 [ 519.325558][T29496] __x64_sys_setsockopt+0x66/0x80 [ 519.325584][T29496] x64_sys_call+0x282e/0x2dc0 [ 519.325610][T29496] do_syscall_64+0xc9/0x1c0 [ 519.325657][T29496] ? clear_bhb_loop+0x55/0xb0 [ 519.325702][T29496] ? clear_bhb_loop+0x55/0xb0 [ 519.325803][T29496] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 519.325837][T29496] RIP: 0033:0x7f24dfb4d169 [ 519.325857][T29496] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 519.325880][T29496] RSP: 002b:00007f24de1b7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 519.325903][T29496] RAX: ffffffffffffffda RBX: 00007f24dfd65fa0 RCX: 00007f24dfb4d169 [ 519.325998][T29496] RDX: 0000000000000060 RSI: 0000000000000000 RDI: 0000000000000003 [ 519.326010][T29496] RBP: 00007f24de1b7090 R08: 0000000000000440 R09: 0000000000000000 [ 519.326021][T29496] R10: 0000400000000000 R11: 0000000000000246 R12: 0000000000000001 [ 519.326036][T29496] R13: 0000000000000000 R14: 00007f24dfd65fa0 R15: 00007ffe8e47b9b8 [ 519.326058][T29496] [ 519.589773][ T30] kauditd_printk_skb: 242 callbacks suppressed [ 519.589839][ T30] audit: type=1400 audit(2000000313.460:21377): avc: denied { map } for pid=29499 comm="syz.5.8433" path="socket:[105595]" dev="sockfs" ino=105595 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 519.629196][ T30] audit: type=1400 audit(2000000313.460:21378): avc: denied { read } for pid=29499 comm="syz.5.8433" path="socket:[105595]" dev="sockfs" ino=105595 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 519.692823][ T30] audit: type=1326 audit(2000000313.560:21379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29508 comm="syz.5.8436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f24dfb4d169 code=0x7ffc0000 [ 519.716538][ T30] audit: type=1326 audit(2000000313.560:21380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29508 comm="syz.5.8436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f24dfb4d169 code=0x7ffc0000 [ 519.740239][ T30] audit: type=1326 audit(2000000313.560:21381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29508 comm="syz.5.8436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f24dfb4d169 code=0x7ffc0000 [ 519.763995][ T30] audit: type=1326 audit(2000000313.560:21382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29508 comm="syz.5.8436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f24dfb4d169 code=0x7ffc0000 [ 519.787689][ T30] audit: type=1326 audit(2000000313.560:21383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29508 comm="syz.5.8436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f24dfb4d169 code=0x7ffc0000 [ 519.811623][ T30] audit: type=1326 audit(2000000313.560:21384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29508 comm="syz.5.8436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f24dfb4d169 code=0x7ffc0000 [ 519.835333][ T30] audit: type=1326 audit(2000000313.560:21385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29508 comm="syz.5.8436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f24dfb4d169 code=0x7ffc0000 [ 519.859331][ T30] audit: type=1326 audit(2000000313.560:21386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29508 comm="syz.5.8436" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f24dfb4d169 code=0x7ffc0000 [ 519.914180][T29511] program syz.1.8438 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 519.934809][T29526] block device autoloading is deprecated and will be removed. [ 519.979920][T29529] x_tables: unsorted underflow at hook 4 [ 519.993840][T29540] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 520.234988][T29557] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 520.269482][T29567] netlink: 'syz.1.8458': attribute type 10 has an invalid length. [ 520.277779][T29567] bridge0: port 2(bridge_slave_1) entered disabled state [ 520.277957][T29567] bridge0: port 1(bridge_slave_0) entered disabled state [ 520.280751][T29567] bridge0: port 2(bridge_slave_1) entered blocking state [ 520.280788][T29567] bridge0: port 2(bridge_slave_1) entered forwarding state [ 520.280933][T29567] bridge0: port 1(bridge_slave_0) entered blocking state [ 520.280964][T29567] bridge0: port 1(bridge_slave_0) entered forwarding state [ 520.282916][T29567] bond0: (slave bridge0): Enslaving as an active interface with an up link [ 520.760093][T29634] FAULT_INJECTION: forcing a failure. [ 520.760093][T29634] name failslab, interval 1, probability 0, space 0, times 0 [ 520.772948][T29634] CPU: 0 UID: 0 PID: 29634 Comm: syz.7.8486 Not tainted 6.14.0-rc7-syzkaller-00067-g76b6905c11fd #0 [ 520.772978][T29634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 520.772993][T29634] Call Trace: [ 520.773001][T29634] [ 520.773011][T29634] dump_stack_lvl+0xf2/0x150 [ 520.773045][T29634] dump_stack+0x15/0x1a [ 520.773145][T29634] should_fail_ex+0x24a/0x260 [ 520.773182][T29634] should_failslab+0x8f/0xb0 [ 520.773227][T29634] kmem_cache_alloc_noprof+0x52/0x320 [ 520.773253][T29634] ? getname_kernel+0x3d/0x1f0 [ 520.773274][T29634] ? _raw_spin_unlock+0x26/0x50 [ 520.773300][T29634] getname_kernel+0x3d/0x1f0 [ 520.773323][T29634] kern_path+0x21/0x120 [ 520.773375][T29634] autofs_dev_ioctl_openmount+0xa1/0x290 [ 520.773400][T29634] ? __pfx_autofs_dev_ioctl_openmount+0x10/0x10 [ 520.773493][T29634] autofs_dev_ioctl+0x375/0x6d0 [ 520.773514][T29634] ? __pfx_autofs_dev_ioctl+0x10/0x10 [ 520.773536][T29634] __se_sys_ioctl+0xc9/0x140 [ 520.773596][T29634] __x64_sys_ioctl+0x43/0x50 [ 520.773639][T29634] x64_sys_call+0x1690/0x2dc0 [ 520.773671][T29634] do_syscall_64+0xc9/0x1c0 [ 520.773711][T29634] ? clear_bhb_loop+0x55/0xb0 [ 520.773744][T29634] ? clear_bhb_loop+0x55/0xb0 [ 520.773853][T29634] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 520.773885][T29634] RIP: 0033:0x7f991716d169 [ 520.773903][T29634] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 520.773925][T29634] RSP: 002b:00007f99157d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 520.773974][T29634] RAX: ffffffffffffffda RBX: 00007f9917385fa0 RCX: 00007f991716d169 [ 520.773989][T29634] RDX: 0000400000000240 RSI: 00000000c0189374 RDI: 0000000000000004 [ 520.774004][T29634] RBP: 00007f99157d7090 R08: 0000000000000000 R09: 0000000000000000 [ 520.774018][T29634] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 520.774032][T29634] R13: 0000000000000000 R14: 00007f9917385fa0 R15: 00007fff2819fb88 [ 520.774053][T29634] [ 521.309791][T29671] netlink: 'syz.1.8498': attribute type 4 has an invalid length. [ 521.327940][ T25] IPVS: starting estimator thread 0... [ 521.362073][T29681] tipc: Enabling of bearer rejected, failed to enable media [ 521.431674][T29675] IPVS: using max 1776 ests per chain, 88800 per kthread [ 521.576557][T29702] __nla_validate_parse: 2 callbacks suppressed [ 521.576576][T29702] netlink: 3 bytes leftover after parsing attributes in process `syz.6.8513'. [ 521.595647][T29702] 0ªX¹¦À: renamed from caif0 [ 521.602566][T29702] 0ªX¹¦À: entered allmulticast mode [ 521.607880][T29702] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 521.679190][T29709] netlink: 'syz.4.8512': attribute type 4 has an invalid length. [ 521.705354][T29712] FAULT_INJECTION: forcing a failure. [ 521.705354][T29712] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 521.718538][T29712] CPU: 0 UID: 0 PID: 29712 Comm: syz.6.8516 Not tainted 6.14.0-rc7-syzkaller-00067-g76b6905c11fd #0 [ 521.718572][T29712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 521.718639][T29712] Call Trace: [ 521.718649][T29712] [ 521.718658][T29712] dump_stack_lvl+0xf2/0x150 [ 521.718759][T29712] dump_stack+0x15/0x1a [ 521.718786][T29712] should_fail_ex+0x24a/0x260 [ 521.718824][T29712] should_fail+0xb/0x10 [ 521.718950][T29712] should_fail_usercopy+0x1a/0x20 [ 521.718990][T29712] strncpy_from_user+0x25/0x210 [ 521.719016][T29712] ? kmem_cache_alloc_noprof+0x18e/0x320 [ 521.719040][T29712] ? getname_flags+0x81/0x3b0 [ 521.719157][T29712] getname_flags+0xb0/0x3b0 [ 521.719195][T29712] getname+0x17/0x20 [ 521.719215][T29712] io_symlinkat_prep+0x148/0x1c0 [ 521.719267][T29712] io_submit_sqes+0x608/0x1070 [ 521.719310][T29712] __se_sys_io_uring_enter+0x1c0/0x1b00 [ 521.719335][T29712] ? 0xffffffff81000000 [ 521.719352][T29712] ? __rcu_read_unlock+0x4e/0x70 [ 521.719380][T29712] ? get_pid_task+0x8e/0xc0 [ 521.719423][T29712] ? proc_fail_nth_write+0x12a/0x150 [ 521.719455][T29712] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 521.719561][T29712] ? vfs_write+0x644/0x920 [ 521.719595][T29712] ? __fget_files+0x17c/0x1c0 [ 521.719650][T29712] ? fput+0x1c4/0x200 [ 521.719669][T29712] ? ksys_write+0x176/0x1b0 [ 521.719701][T29712] __x64_sys_io_uring_enter+0x78/0x90 [ 521.719776][T29712] x64_sys_call+0xb5e/0x2dc0 [ 521.719805][T29712] do_syscall_64+0xc9/0x1c0 [ 521.719836][T29712] ? clear_bhb_loop+0x55/0xb0 [ 521.719925][T29712] ? clear_bhb_loop+0x55/0xb0 [ 521.719951][T29712] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 521.719982][T29712] RIP: 0033:0x7fa29224d169 [ 521.720001][T29712] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 521.720023][T29712] RSP: 002b:00007fa2908b1038 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 521.720191][T29712] RAX: ffffffffffffffda RBX: 00007fa292465fa0 RCX: 00007fa29224d169 [ 521.720203][T29712] RDX: 0000000000000000 RSI: 00000000000047f8 RDI: 0000000000000003 [ 521.720215][T29712] RBP: 00007fa2908b1090 R08: 0000000000000000 R09: 0000000000000000 [ 521.720228][T29712] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 521.720243][T29712] R13: 0000000000000000 R14: 00007fa292465fa0 R15: 00007ffdfbf4b698 [ 521.720288][T29712] [ 522.101997][T29722] netlink: 118396 bytes leftover after parsing attributes in process `syz.6.8521'. [ 522.721451][T29758] netlink: 'syz.1.8537': attribute type 1 has an invalid length. [ 522.832849][T29777] veth1_virt_wifi: mtu less than device minimum [ 522.836746][T29771] xt_hashlimit: max too large, truncated to 1048576 [ 522.866157][T29771] Cannot find set identified by id 0 to match [ 522.931284][T29789] SELinux: ebitmap: truncated map [ 522.940433][T29789] SELinux: failed to load policy [ 523.014279][T29792] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 523.202502][T29828] FAULT_INJECTION: forcing a failure. [ 523.202502][T29828] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 523.215797][T29828] CPU: 0 UID: 0 PID: 29828 Comm: syz.4.8563 Not tainted 6.14.0-rc7-syzkaller-00067-g76b6905c11fd #0 [ 523.215826][T29828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 523.215839][T29828] Call Trace: [ 523.215846][T29828] [ 523.215854][T29828] dump_stack_lvl+0xf2/0x150 [ 523.215883][T29828] dump_stack+0x15/0x1a [ 523.215925][T29828] should_fail_ex+0x24a/0x260 [ 523.215959][T29828] should_fail+0xb/0x10 [ 523.216062][T29828] should_fail_usercopy+0x1a/0x20 [ 523.216097][T29828] _copy_from_iter+0xd5/0xd00 [ 523.216141][T29828] ? __alloc_skb+0x1b5/0x310 [ 523.216162][T29828] ? kmalloc_reserve+0x16e/0x190 [ 523.216229][T29828] ? __build_skb_around+0x196/0x1f0 [ 523.216254][T29828] ? __alloc_skb+0x21f/0x310 [ 523.216293][T29828] ? __virt_addr_valid+0x1ed/0x250 [ 523.216323][T29828] ? __check_object_size+0x364/0x520 [ 523.216354][T29828] netlink_sendmsg+0x460/0x6e0 [ 523.216381][T29828] ? __pfx_netlink_sendmsg+0x10/0x10 [ 523.216403][T29828] __sock_sendmsg+0x140/0x180 [ 523.216467][T29828] ____sys_sendmsg+0x326/0x4b0 [ 523.216497][T29828] __sys_sendmsg+0x19d/0x230 [ 523.216539][T29828] __x64_sys_sendmsg+0x46/0x50 [ 523.216565][T29828] x64_sys_call+0x2734/0x2dc0 [ 523.216606][T29828] do_syscall_64+0xc9/0x1c0 [ 523.216637][T29828] ? clear_bhb_loop+0x55/0xb0 [ 523.216664][T29828] ? clear_bhb_loop+0x55/0xb0 [ 523.216690][T29828] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 523.216738][T29828] RIP: 0033:0x7fe85961d169 [ 523.216753][T29828] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 523.216771][T29828] RSP: 002b:00007fe857c87038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 523.216790][T29828] RAX: ffffffffffffffda RBX: 00007fe859835fa0 RCX: 00007fe85961d169 [ 523.216803][T29828] RDX: 0000000000000000 RSI: 0000400000000580 RDI: 0000000000000004 [ 523.216815][T29828] RBP: 00007fe857c87090 R08: 0000000000000000 R09: 0000000000000000 [ 523.216902][T29828] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 523.216914][T29828] R13: 0000000000000000 R14: 00007fe859835fa0 R15: 00007ffeeccd7738 [ 523.216981][T29828] [ 523.584440][T29840] netlink: 'syz.4.8567': attribute type 1 has an invalid length. [ 523.592268][T29840] netlink: 1284 bytes leftover after parsing attributes in process `syz.4.8567'. [ 523.603291][T29840] program syz.4.8567 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 523.633143][T29842] netlink: 24 bytes leftover after parsing attributes in process `syz.6.8569'. [ 523.882747][T29859] bridge: RTM_NEWNEIGH with invalid ether address [ 523.905289][T29861] block device autoloading is deprecated and will be removed. [ 523.924155][T29859] pci 0000:00:05.0: vgaarb: VGA decodes changed: olddecodes=io+mem,decodes=io+mem:owns=io+mem [ 524.052773][T29875] FAULT_INJECTION: forcing a failure. [ 524.052773][T29875] name failslab, interval 1, probability 0, space 0, times 0 [ 524.065506][T29875] CPU: 0 UID: 0 PID: 29875 Comm: syz.7.8583 Not tainted 6.14.0-rc7-syzkaller-00067-g76b6905c11fd #0 [ 524.065536][T29875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 524.065617][T29875] Call Trace: [ 524.065625][T29875] [ 524.065633][T29875] dump_stack_lvl+0xf2/0x150 [ 524.065661][T29875] dump_stack+0x15/0x1a [ 524.065682][T29875] should_fail_ex+0x24a/0x260 [ 524.065756][T29875] ? io_getxattr_prep+0x126/0x1f0 [ 524.065787][T29875] should_failslab+0x8f/0xb0 [ 524.065882][T29875] __kmalloc_cache_noprof+0x4e/0x320 [ 524.065908][T29875] io_getxattr_prep+0x126/0x1f0 [ 524.066047][T29875] io_submit_sqes+0x608/0x1070 [ 524.066088][T29875] __se_sys_io_uring_enter+0x1c0/0x1b00 [ 524.066109][T29875] ? 0xffffffff81000000 [ 524.066122][T29875] ? __rcu_read_unlock+0x4e/0x70 [ 524.066145][T29875] ? get_pid_task+0x8e/0xc0 [ 524.066222][T29875] ? proc_fail_nth_write+0x12a/0x150 [ 524.066251][T29875] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 524.066366][T29875] ? vfs_write+0x644/0x920 [ 524.066393][T29875] ? __fget_files+0x17c/0x1c0 [ 524.066477][T29875] ? fput+0x1c4/0x200 [ 524.066497][T29875] ? ksys_write+0x176/0x1b0 [ 524.066523][T29875] __x64_sys_io_uring_enter+0x78/0x90 [ 524.066544][T29875] x64_sys_call+0xb5e/0x2dc0 [ 524.066571][T29875] do_syscall_64+0xc9/0x1c0 [ 524.066629][T29875] ? clear_bhb_loop+0x55/0xb0 [ 524.066687][T29875] ? clear_bhb_loop+0x55/0xb0 [ 524.066712][T29875] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 524.066739][T29875] RIP: 0033:0x7f991716d169 [ 524.066753][T29875] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 524.066771][T29875] RSP: 002b:00007f99157d7038 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 524.066854][T29875] RAX: ffffffffffffffda RBX: 00007f9917385fa0 RCX: 00007f991716d169 [ 524.066866][T29875] RDX: 0000000000000002 RSI: 00000000000047bc RDI: 0000000000000003 [ 524.066878][T29875] RBP: 00007f99157d7090 R08: 0000000000000000 R09: 0000000000000000 [ 524.066890][T29875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 524.066901][T29875] R13: 0000000000000000 R14: 00007f9917385fa0 R15: 00007fff2819fb88 [ 524.066951][T29875] [ 524.356985][T29883] netlink: 'syz.1.8585': attribute type 27 has an invalid length. [ 524.384915][T29883] lo: left promiscuous mode [ 524.426344][T29883] bridge0: port 2(bridge_slave_1) entered disabled state [ 524.433633][T29883] bridge0: port 1(bridge_slave_0) entered disabled state [ 524.527747][T29883] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 524.547988][T29883] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 524.612152][T29883] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 524.621159][T29883] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 524.630393][T29883] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 524.639712][T29883] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 524.733268][ T30] kauditd_printk_skb: 486 callbacks suppressed [ 524.733287][ T30] audit: type=1326 audit(2000000318.610:21873): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29894 comm="syz.5.8589" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f24dfb4d169 code=0x7ffc0000 [ 524.764596][ T30] audit: type=1326 audit(2000000318.610:21874): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29894 comm="syz.5.8589" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f24dfb4d169 code=0x7ffc0000 [ 524.788227][ T30] audit: type=1326 audit(2000000318.640:21875): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29894 comm="syz.5.8589" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f24dfb4d169 code=0x7ffc0000 [ 524.811895][ T30] audit: type=1326 audit(2000000318.640:21876): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29894 comm="syz.5.8589" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f24dfb4d169 code=0x7ffc0000 [ 524.835615][ T30] audit: type=1326 audit(2000000318.640:21877): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29894 comm="syz.5.8589" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f24dfb4d169 code=0x7ffc0000 [ 524.859421][ T30] audit: type=1326 audit(2000000318.640:21878): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29894 comm="syz.5.8589" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f24dfb4d169 code=0x7ffc0000 [ 524.886755][T29899] netlink: 20 bytes leftover after parsing attributes in process `syz.6.8590'. [ 524.966160][ T30] audit: type=1326 audit(2000000318.670:21879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29894 comm="syz.5.8589" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f24dfb4d169 code=0x7ffc0000 [ 524.989851][ T30] audit: type=1326 audit(2000000318.670:21880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29894 comm="syz.5.8589" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f24dfb4d169 code=0x7ffc0000 [ 525.013581][ T30] audit: type=1326 audit(2000000318.670:21881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29894 comm="syz.5.8589" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f24dfb4d169 code=0x7ffc0000 [ 525.037269][ T30] audit: type=1326 audit(2000000318.670:21882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29894 comm="syz.5.8589" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f24dfb4d169 code=0x7ffc0000 [ 525.189632][T29913] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 525.318938][T29928] SELinux: syz.7.8600 (29928) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 525.392267][T29931] netlink: 12 bytes leftover after parsing attributes in process `syz.4.8601'. [ 525.437908][T29928] lo speed is unknown, defaulting to 1000 [ 525.448009][T29928] lo speed is unknown, defaulting to 1000 [ 525.465792][T29935] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 525.471006][T29928] lo speed is unknown, defaulting to 1000 [ 525.490881][T29928] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 525.505533][T29938] FAULT_INJECTION: forcing a failure. [ 525.505533][T29938] name failslab, interval 1, probability 0, space 0, times 0 [ 525.518435][T29938] CPU: 1 UID: 0 PID: 29938 Comm: syz.5.8603 Not tainted 6.14.0-rc7-syzkaller-00067-g76b6905c11fd #0 [ 525.518462][T29938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 525.518474][T29938] Call Trace: [ 525.518483][T29938] [ 525.518493][T29938] dump_stack_lvl+0xf2/0x150 [ 525.518568][T29938] dump_stack+0x15/0x1a [ 525.518591][T29938] should_fail_ex+0x24a/0x260 [ 525.518630][T29938] should_failslab+0x8f/0xb0 [ 525.518736][T29938] __kmalloc_noprof+0xab/0x3f0 [ 525.518799][T29938] ? io_cache_alloc_new+0x2b/0xa0 [ 525.518830][T29938] io_cache_alloc_new+0x2b/0xa0 [ 525.518866][T29938] io_msg_alloc_async+0xef/0x180 [ 525.518891][T29938] io_send_zc_prep+0x303/0x5e0 [ 525.518934][T29938] io_submit_sqes+0x608/0x1070 [ 525.518986][T29938] __se_sys_io_uring_enter+0x1c0/0x1b00 [ 525.519025][T29938] ? 0xffffffff81000000 [ 525.519039][T29938] ? __rcu_read_unlock+0x4e/0x70 [ 525.519126][T29938] ? get_pid_task+0x8e/0xc0 [ 525.519167][T29938] ? proc_fail_nth_write+0x12a/0x150 [ 525.519200][T29938] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 525.519291][T29938] ? vfs_write+0x644/0x920 [ 525.519318][T29938] ? __fget_files+0x17c/0x1c0 [ 525.519352][T29938] ? fput+0x1c4/0x200 [ 525.519383][T29938] ? ksys_write+0x176/0x1b0 [ 525.519416][T29938] __x64_sys_io_uring_enter+0x78/0x90 [ 525.519442][T29938] x64_sys_call+0xb5e/0x2dc0 [ 525.519475][T29938] do_syscall_64+0xc9/0x1c0 [ 525.519569][T29938] ? clear_bhb_loop+0x55/0xb0 [ 525.519602][T29938] ? clear_bhb_loop+0x55/0xb0 [ 525.519635][T29938] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 525.519668][T29938] RIP: 0033:0x7f24dfb4d169 [ 525.519686][T29938] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 525.519708][T29938] RSP: 002b:00007f24de1b7038 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 525.519779][T29938] RAX: ffffffffffffffda RBX: 00007f24dfd65fa0 RCX: 00007f24dfb4d169 [ 525.519791][T29938] RDX: 0000000000000000 RSI: 00000000000047bc RDI: 0000000000000005 [ 525.519803][T29938] RBP: 00007f24de1b7090 R08: 0000000000000000 R09: 0000000000000000 [ 525.519815][T29938] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 525.519830][T29938] R13: 0000000000000000 R14: 00007f24dfd65fa0 R15: 00007ffe8e47b9b8 [ 525.519853][T29938] [ 525.797090][T29928] lo speed is unknown, defaulting to 1000 [ 525.815724][T29928] lo speed is unknown, defaulting to 1000 [ 525.835246][T29928] lo speed is unknown, defaulting to 1000 [ 525.843442][T29928] lo speed is unknown, defaulting to 1000 [ 525.862504][T29928] lo speed is unknown, defaulting to 1000 [ 526.058149][T29960] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8612'. [ 526.298972][T29966] lo speed is unknown, defaulting to 1000 [ 526.475000][T29986] +}[@ (29986): attempted to duplicate a private mapping with mremap. This is not supported. [ 526.524695][T29966] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 526.533372][T29966] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 526.618791][T29995] netlink: 36 bytes leftover after parsing attributes in process `syz.6.8624'. [ 527.464856][T30031] lo speed is unknown, defaulting to 1000 [ 528.564793][T30087] netlink: 20 bytes leftover after parsing attributes in process `syz.1.8662'. [ 529.542844][T30105] netlink: 20 bytes leftover after parsing attributes in process `syz.6.8667'. [ 529.824297][ T30] kauditd_printk_skb: 159 callbacks suppressed [ 529.824314][ T30] audit: type=1326 audit(2000000323.700:22042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30111 comm="syz.7.8671" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f991716d169 code=0x7ffc0000 [ 529.854412][ T30] audit: type=1326 audit(2000000323.700:22043): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30111 comm="syz.7.8671" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f991716d169 code=0x7ffc0000 [ 529.878183][ T30] audit: type=1326 audit(2000000323.700:22044): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30111 comm="syz.7.8671" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f991716d169 code=0x7ffc0000 [ 529.902095][ T30] audit: type=1326 audit(2000000323.700:22045): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30111 comm="syz.7.8671" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f991716d169 code=0x7ffc0000 [ 529.925954][ T30] audit: type=1326 audit(2000000323.700:22046): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30111 comm="syz.7.8671" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f991716d169 code=0x7ffc0000 [ 529.949884][ T30] audit: type=1326 audit(2000000323.700:22047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30111 comm="syz.7.8671" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f991716d169 code=0x7ffc0000 [ 529.973576][ T30] audit: type=1326 audit(2000000323.700:22048): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30111 comm="syz.7.8671" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f991716d169 code=0x7ffc0000 [ 529.997355][ T30] audit: type=1326 audit(2000000323.700:22049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30111 comm="syz.7.8671" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f991716d169 code=0x7ffc0000 [ 530.021094][ T30] audit: type=1326 audit(2000000323.700:22050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30111 comm="syz.7.8671" exe="/root/syz-executor" sig=0 arch=c000003e syscall=271 compat=0 ip=0x7f991716d169 code=0x7ffc0000 [ 530.045125][ T30] audit: type=1326 audit(2000000323.750:22051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30111 comm="syz.7.8671" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f991716d169 code=0x7ffc0000 [ 530.246075][T30140] pimreg: entered allmulticast mode [ 530.252274][T30140] pimreg: left allmulticast mode [ 530.284969][T30148] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8684'. [ 530.312287][T30154] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=30154 comm=syz.4.8686 [ 530.367379][T30162] hub 3-0:1.0: USB hub found [ 530.372224][T30162] hub 3-0:1.0: 8 ports detected [ 530.401870][T30165] netlink: 4 bytes leftover after parsing attributes in process `syz.6.8690'. [ 530.417640][T30165] netlink: 4 bytes leftover after parsing attributes in process `syz.6.8690'. [ 530.534296][T30174] FAULT_INJECTION: forcing a failure. [ 530.534296][T30174] name failslab, interval 1, probability 0, space 0, times 0 [ 530.547165][T30174] CPU: 1 UID: 0 PID: 30174 Comm: syz.4.8693 Not tainted 6.14.0-rc7-syzkaller-00067-g76b6905c11fd #0 [ 530.547195][T30174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 530.547209][T30174] Call Trace: [ 530.547217][T30174] [ 530.547274][T30174] dump_stack_lvl+0xf2/0x150 [ 530.547307][T30174] dump_stack+0x15/0x1a [ 530.547334][T30174] should_fail_ex+0x24a/0x260 [ 530.547370][T30174] should_failslab+0x8f/0xb0 [ 530.547405][T30174] __kmalloc_noprof+0xab/0x3f0 [ 530.547485][T30174] ? sock_kmalloc+0x83/0xc0 [ 530.547520][T30174] sock_kmalloc+0x83/0xc0 [ 530.547548][T30174] ____sys_sendmsg+0x127/0x4b0 [ 530.547579][T30174] __sys_sendmsg+0x19d/0x230 [ 530.547631][T30174] __x64_sys_sendmsg+0x46/0x50 [ 530.547666][T30174] x64_sys_call+0x2734/0x2dc0 [ 530.547695][T30174] do_syscall_64+0xc9/0x1c0 [ 530.547729][T30174] ? clear_bhb_loop+0x55/0xb0 [ 530.547807][T30174] ? clear_bhb_loop+0x55/0xb0 [ 530.547938][T30174] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 530.547968][T30174] RIP: 0033:0x7fe85961d169 [ 530.547986][T30174] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 530.548010][T30174] RSP: 002b:00007fe857c87038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 530.548048][T30174] RAX: ffffffffffffffda RBX: 00007fe859835fa0 RCX: 00007fe85961d169 [ 530.548060][T30174] RDX: 000000000000ff00 RSI: 0000400000000000 RDI: 0000000000000005 [ 530.548072][T30174] RBP: 00007fe857c87090 R08: 0000000000000000 R09: 0000000000000000 [ 530.548084][T30174] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 530.548096][T30174] R13: 0000000000000000 R14: 00007fe859835fa0 R15: 00007ffeeccd7738 [ 530.548119][T30174] [ 530.733760][T30182] FAULT_INJECTION: forcing a failure. [ 530.733760][T30182] name failslab, interval 1, probability 0, space 0, times 0 [ 530.746596][T30182] CPU: 1 UID: 0 PID: 30182 Comm: syz.4.8695 Not tainted 6.14.0-rc7-syzkaller-00067-g76b6905c11fd #0 [ 530.746628][T30182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 530.746643][T30182] Call Trace: [ 530.746651][T30182] [ 530.746665][T30182] dump_stack_lvl+0xf2/0x150 [ 530.746706][T30182] dump_stack+0x15/0x1a [ 530.746728][T30182] should_fail_ex+0x24a/0x260 [ 530.746838][T30182] should_failslab+0x8f/0xb0 [ 530.746868][T30182] kmem_cache_alloc_node_noprof+0x59/0x320 [ 530.746965][T30182] ? __alloc_skb+0x10b/0x310 [ 530.746992][T30182] __alloc_skb+0x10b/0x310 [ 530.747071][T30182] netlink_alloc_large_skb+0xad/0xe0 [ 530.747107][T30182] netlink_sendmsg+0x3b4/0x6e0 [ 530.747134][T30182] ? __pfx_netlink_sendmsg+0x10/0x10 [ 530.747161][T30182] __sock_sendmsg+0x140/0x180 [ 530.747316][T30182] ____sys_sendmsg+0x326/0x4b0 [ 530.747354][T30182] __sys_sendmsg+0x19d/0x230 [ 530.747447][T30182] __x64_sys_sendmsg+0x46/0x50 [ 530.747472][T30182] x64_sys_call+0x2734/0x2dc0 [ 530.747498][T30182] do_syscall_64+0xc9/0x1c0 [ 530.747536][T30182] ? clear_bhb_loop+0x55/0xb0 [ 530.747570][T30182] ? clear_bhb_loop+0x55/0xb0 [ 530.747628][T30182] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 530.747675][T30182] RIP: 0033:0x7fe85961d169 [ 530.747693][T30182] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 530.747714][T30182] RSP: 002b:00007fe857c87038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 530.747772][T30182] RAX: ffffffffffffffda RBX: 00007fe859835fa0 RCX: 00007fe85961d169 [ 530.747788][T30182] RDX: 0000000020050800 RSI: 00004000000000c0 RDI: 0000000000000006 [ 530.747801][T30182] RBP: 00007fe857c87090 R08: 0000000000000000 R09: 0000000000000000 [ 530.747813][T30182] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 530.747825][T30182] R13: 0000000000000000 R14: 00007fe859835fa0 R15: 00007ffeeccd7738 [ 530.747843][T30182] [ 530.963012][T30184] netlink: 96 bytes leftover after parsing attributes in process `syz.4.8696'. [ 530.982757][T30184] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8696'. [ 531.048472][T30190] pimreg: entered allmulticast mode [ 531.062453][T30190] pimreg: left allmulticast mode [ 531.270823][T30195] lo speed is unknown, defaulting to 1000 [ 531.697425][T30217] block device autoloading is deprecated and will be removed. [ 532.850173][T30296] wireguard0: entered promiscuous mode [ 532.855780][T30296] wireguard0: entered allmulticast mode [ 533.040250][T30309] pimreg: entered allmulticast mode [ 533.056478][T30309] pimreg: left allmulticast mode [ 533.254587][T30326] 9pnet_fd: Insufficient options for proto=fd [ 533.852192][T30372] bridge_slave_0: left allmulticast mode [ 533.857886][T30372] bridge_slave_0: left promiscuous mode [ 533.863726][T30372] bridge0: port 1(bridge_slave_0) entered disabled state [ 533.875575][T30372] bridge_slave_1: left allmulticast mode [ 533.881286][T30372] bridge_slave_1: left promiscuous mode [ 533.887100][T30372] bridge0: port 2(bridge_slave_1) entered disabled state [ 533.903935][T30357] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=30357 comm=syz.7.8764 [ 533.917302][T30372] bond0: (slave bond_slave_0): Releasing backup interface [ 533.926186][T30375] netlink: 60 bytes leftover after parsing attributes in process `syz.4.8771'. [ 533.942532][T30372] bond_slave_0: left promiscuous mode [ 533.948725][T30372] bond0: (slave bond_slave_1): Releasing backup interface [ 533.957807][T30372] bond_slave_1: left promiscuous mode [ 533.966411][T30372] team0: Port device team_slave_0 removed [ 533.973143][T30372] team0: Port device team_slave_1 removed [ 533.979507][T30375] FAULT_INJECTION: forcing a failure. [ 533.979507][T30375] name failslab, interval 1, probability 0, space 0, times 0 [ 533.992218][T30375] CPU: 1 UID: 0 PID: 30375 Comm: syz.4.8771 Not tainted 6.14.0-rc7-syzkaller-00067-g76b6905c11fd #0 [ 533.992244][T30375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 533.992294][T30375] Call Trace: [ 533.992302][T30375] [ 533.992312][T30375] dump_stack_lvl+0xf2/0x150 [ 533.992353][T30375] dump_stack+0x15/0x1a [ 533.992374][T30375] should_fail_ex+0x24a/0x260 [ 533.992405][T30375] should_failslab+0x8f/0xb0 [ 533.992439][T30375] __kmalloc_node_track_caller_noprof+0xa8/0x410 [ 533.992521][T30375] ? team_options_register+0xdf/0x720 [ 533.992552][T30375] kmemdup_noprof+0x2b/0x70 [ 533.992584][T30375] team_options_register+0xdf/0x720 [ 533.992608][T30375] ? init_timer_key+0x7a/0x170 [ 533.992717][T30375] lb_init+0x20c/0x270 [ 533.992749][T30375] __team_change_mode+0x1f8/0x330 [ 533.992824][T30375] team_mode_option_set+0x254/0x2b0 [ 533.992853][T30375] team_nl_options_set_doit+0x6c4/0x9c0 [ 533.992890][T30375] genl_rcv_msg+0x620/0x6d0 [ 533.992996][T30375] ? __pfx_team_nl_options_set_doit+0x10/0x10 [ 533.993054][T30375] ? security_inode_alloc+0x37/0x100 [ 533.993078][T30375] ? should_fail_ex+0x31/0x260 [ 533.993112][T30375] netlink_rcv_skb+0x12c/0x230 [ 533.993202][T30375] ? __pfx_genl_rcv_msg+0x10/0x10 [ 533.993232][T30375] genl_rcv+0x28/0x40 [ 533.993258][T30375] netlink_unicast+0x599/0x670 [ 533.993318][T30375] netlink_sendmsg+0x5cc/0x6e0 [ 533.993376][T30375] ? __pfx_netlink_sendmsg+0x10/0x10 [ 533.993399][T30375] __sock_sendmsg+0x140/0x180 [ 533.993438][T30375] ____sys_sendmsg+0x326/0x4b0 [ 533.993502][T30375] __sys_sendmsg+0x19d/0x230 [ 533.993545][T30375] __x64_sys_sendmsg+0x46/0x50 [ 533.993576][T30375] x64_sys_call+0x2734/0x2dc0 [ 533.993689][T30375] do_syscall_64+0xc9/0x1c0 [ 533.993768][T30375] ? clear_bhb_loop+0x55/0xb0 [ 533.993841][T30375] ? clear_bhb_loop+0x55/0xb0 [ 533.993874][T30375] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 533.993973][T30375] RIP: 0033:0x7fe85961d169 [ 533.993992][T30375] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 533.994013][T30375] RSP: 002b:00007fe857c66038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 533.994105][T30375] RAX: ffffffffffffffda RBX: 00007fe859836080 RCX: 00007fe85961d169 [ 533.994120][T30375] RDX: 0000000000044084 RSI: 0000400000004bc0 RDI: 0000000000000003 [ 533.994133][T30375] RBP: 00007fe857c66090 R08: 0000000000000000 R09: 0000000000000000 [ 533.994145][T30375] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 533.994157][T30375] R13: 0000000000000000 R14: 00007fe859836080 R15: 00007ffeeccd7738 [ 533.994243][T30375] [ 533.994371][T30375] team0: Failed to change to mode "loadbalance" [ 534.318930][T30389] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8775'. [ 534.337069][T30389] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8775'. [ 534.346566][T30392] pimreg: entered allmulticast mode [ 534.402545][T30392] pimreg: left allmulticast mode [ 534.887024][ T30] kauditd_printk_skb: 340 callbacks suppressed [ 534.887042][ T30] audit: type=1400 audit(2000000328.760:22392): avc: denied { write } for pid=30429 comm="syz.6.8789" path="socket:[108305]" dev="sockfs" ino=108305 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 535.248109][T30436] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8791'. [ 535.264307][T30436] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8791'. [ 535.380735][T30443] block device autoloading is deprecated and will be removed. [ 535.435284][ T30] audit: type=1326 audit(2000000329.310:22393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30448 comm="syz.7.8797" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f991716d169 code=0x7ffc0000 [ 535.471371][T30451] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8798'. [ 535.478488][ T30] audit: type=1326 audit(2000000329.330:22394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30448 comm="syz.7.8797" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f991716d169 code=0x7ffc0000 [ 535.490616][T30451] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8798'. [ 535.503888][ T30] audit: type=1326 audit(2000000329.330:22395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30448 comm="syz.7.8797" exe="/root/syz-executor" sig=0 arch=c000003e syscall=85 compat=0 ip=0x7f991716d169 code=0x7ffc0000 [ 535.536476][ T30] audit: type=1326 audit(2000000329.330:22396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30448 comm="syz.7.8797" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f991716d169 code=0x7ffc0000 [ 535.560053][ T30] audit: type=1326 audit(2000000329.330:22397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30448 comm="syz.7.8797" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f991716d169 code=0x7ffc0000 [ 535.583699][ T30] audit: type=1326 audit(2000000329.330:22398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30448 comm="syz.7.8797" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f991716d169 code=0x7ffc0000 [ 535.607153][ T30] audit: type=1326 audit(2000000329.330:22399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30448 comm="syz.7.8797" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f991716d169 code=0x7ffc0000 [ 535.630748][ T30] audit: type=1326 audit(2000000329.330:22400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30448 comm="syz.7.8797" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f991716d169 code=0x7ffc0000 [ 535.654665][ T30] audit: type=1326 audit(2000000329.330:22401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30448 comm="syz.7.8797" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f991716d169 code=0x7ffc0000 [ 535.832861][T30481] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 535.856406][T30483] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 536.646908][T30532] netlink: 20 bytes leftover after parsing attributes in process `syz.4.8829'. [ 536.704893][T30534] FAULT_INJECTION: forcing a failure. [ 536.704893][T30534] name failslab, interval 1, probability 0, space 0, times 0 [ 536.717692][T30534] CPU: 0 UID: 0 PID: 30534 Comm: syz.6.8830 Not tainted 6.14.0-rc7-syzkaller-00067-g76b6905c11fd #0 [ 536.717723][T30534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 536.717738][T30534] Call Trace: [ 536.717747][T30534] [ 536.717773][T30534] dump_stack_lvl+0xf2/0x150 [ 536.717808][T30534] dump_stack+0x15/0x1a [ 536.717835][T30534] should_fail_ex+0x24a/0x260 [ 536.717897][T30534] should_failslab+0x8f/0xb0 [ 536.717977][T30534] kmem_cache_alloc_node_noprof+0x59/0x320 [ 536.718033][T30534] ? __alloc_skb+0x10b/0x310 [ 536.718063][T30534] __alloc_skb+0x10b/0x310 [ 536.718095][T30534] ethnl_default_notify+0x1e0/0x4d0 [ 536.718142][T30534] ethtool_notify+0xbb/0x1b0 [ 536.718175][T30534] ethnl_default_set_doit+0x45a/0x5f0 [ 536.718257][T30534] genl_rcv_msg+0x620/0x6d0 [ 536.718283][T30534] ? __pfx_ethnl_default_set_doit+0x10/0x10 [ 536.718311][T30534] ? __dev_queue_xmit+0xb6e/0x2090 [ 536.718343][T30534] netlink_rcv_skb+0x12c/0x230 [ 536.718409][T30534] ? __pfx_genl_rcv_msg+0x10/0x10 [ 536.718448][T30534] genl_rcv+0x28/0x40 [ 536.718474][T30534] netlink_unicast+0x599/0x670 [ 536.718593][T30534] netlink_sendmsg+0x5cc/0x6e0 [ 536.718621][T30534] ? __pfx_netlink_sendmsg+0x10/0x10 [ 536.718644][T30534] __sock_sendmsg+0x140/0x180 [ 536.718745][T30534] ____sys_sendmsg+0x326/0x4b0 [ 536.718775][T30534] __sys_sendmsg+0x19d/0x230 [ 536.718822][T30534] __x64_sys_sendmsg+0x46/0x50 [ 536.718847][T30534] x64_sys_call+0x2734/0x2dc0 [ 536.718951][T30534] do_syscall_64+0xc9/0x1c0 [ 536.719016][T30534] ? clear_bhb_loop+0x55/0xb0 [ 536.719049][T30534] ? clear_bhb_loop+0x55/0xb0 [ 536.719078][T30534] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 536.719104][T30534] RIP: 0033:0x7fa29224d169 [ 536.719122][T30534] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 536.719152][T30534] RSP: 002b:00007fa2908b1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 536.719175][T30534] RAX: ffffffffffffffda RBX: 00007fa292465fa0 RCX: 00007fa29224d169 [ 536.719190][T30534] RDX: 0000000000000000 RSI: 0000400000000280 RDI: 0000000000000006 [ 536.719241][T30534] RBP: 00007fa2908b1090 R08: 0000000000000000 R09: 0000000000000000 [ 536.719252][T30534] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 536.719264][T30534] R13: 0000000000000000 R14: 00007fa292465fa0 R15: 00007ffdfbf4b698 [ 536.719283][T30534] [ 537.167424][ T6401] hid-generic 0000:0000:20000000.0007: unknown main item tag 0x0 [ 537.175383][ T6401] hid-generic 0000:0000:20000000.0007: unknown main item tag 0x0 [ 537.183177][ T6401] hid-generic 0000:0000:20000000.0007: unknown main item tag 0x0 [ 537.193583][ T6401] hid-generic 0000:0000:20000000.0007: unknown main item tag 0x0 [ 537.201371][ T6401] hid-generic 0000:0000:20000000.0007: unknown main item tag 0x0 [ 537.209282][ T6401] hid-generic 0000:0000:20000000.0007: unknown main item tag 0x0 [ 537.217288][ T6401] hid-generic 0000:0000:20000000.0007: unknown main item tag 0x0 [ 537.225134][ T6401] hid-generic 0000:0000:20000000.0007: unknown main item tag 0x0 [ 537.233167][ T6401] hid-generic 0000:0000:20000000.0007: unknown main item tag 0x0 [ 537.241052][ T6401] hid-generic 0000:0000:20000000.0007: unknown main item tag 0x0 [ 537.249031][ T6401] hid-generic 0000:0000:20000000.0007: unknown main item tag 0x0 [ 537.256845][ T6401] hid-generic 0000:0000:20000000.0007: unknown main item tag 0x0 [ 537.264862][ T6401] hid-generic 0000:0000:20000000.0007: unknown main item tag 0x0 [ 537.272651][ T6401] hid-generic 0000:0000:20000000.0007: unknown main item tag 0x0 [ 537.284867][ T6401] hid-generic 0000:0000:20000000.0007: unknown main item tag 0x0 [ 537.292720][ T6401] hid-generic 0000:0000:20000000.0007: unknown main item tag 0x0 [ 537.300571][ T6401] hid-generic 0000:0000:20000000.0007: unknown main item tag 0x0 [ 537.308423][ T6401] hid-generic 0000:0000:20000000.0007: unknown main item tag 0x0 [ 537.316329][ T6401] hid-generic 0000:0000:20000000.0007: unknown main item tag 0x0 [ 537.324243][ T6401] hid-generic 0000:0000:20000000.0007: unknown main item tag 0x0 [ 537.332381][ T6401] hid-generic 0000:0000:20000000.0007: unknown main item tag 0x0 [ 537.340300][ T6401] hid-generic 0000:0000:20000000.0007: unknown main item tag 0x0 [ 537.348209][ T6401] hid-generic 0000:0000:20000000.0007: unknown main item tag 0x0 [ 537.356009][ T6401] hid-generic 0000:0000:20000000.0007: unknown main item tag 0x0 [ 537.363943][ T6401] hid-generic 0000:0000:20000000.0007: unknown main item tag 0x0 [ 537.371791][ T6401] hid-generic 0000:0000:20000000.0007: unknown main item tag 0x0 [ 537.379567][ T6401] hid-generic 0000:0000:20000000.0007: unknown main item tag 0x0 [ 537.387476][ T6401] hid-generic 0000:0000:20000000.0007: unknown main item tag 0x0 [ 537.395294][ T6401] hid-generic 0000:0000:20000000.0007: unknown main item tag 0x0 [ 537.417043][ T6401] hid-generic 0000:0000:20000000.0007: hidraw0: HID v0.01 Device [syz0] on syz1 [ 537.443173][T30568] netlink: 8 bytes leftover after parsing attributes in process `syz.7.8844'. [ 537.452915][T30567] netlink: 8 bytes leftover after parsing attributes in process `+}[@'. [ 537.497759][T30567] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 537.553067][T30584] pimreg: entered allmulticast mode [ 537.565854][T30584] pimreg: left allmulticast mode [ 537.627836][T30590] block device autoloading is deprecated and will be removed. [ 537.821472][T30618] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 537.854613][T30626] FAULT_INJECTION: forcing a failure. [ 537.854613][T30626] name failslab, interval 1, probability 0, space 0, times 0 [ 537.867342][T30626] CPU: 0 UID: 0 PID: 30626 Comm: syz.4.8869 Not tainted 6.14.0-rc7-syzkaller-00067-g76b6905c11fd #0 [ 537.867368][T30626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 537.867380][T30626] Call Trace: [ 537.867421][T30626] [ 537.867430][T30626] dump_stack_lvl+0xf2/0x150 [ 537.867459][T30626] dump_stack+0x15/0x1a [ 537.867480][T30626] should_fail_ex+0x24a/0x260 [ 537.867569][T30626] should_failslab+0x8f/0xb0 [ 537.867602][T30626] __kmalloc_node_noprof+0xad/0x410 [ 537.867626][T30626] ? do_syscall_64+0xc9/0x1c0 [ 537.867738][T30626] ? qdisc_alloc+0x65/0x450 [ 537.867775][T30626] qdisc_alloc+0x65/0x450 [ 537.867873][T30626] qdisc_create_dflt+0x4c/0x280 [ 537.867942][T30626] taprio_init+0x29e/0x610 [ 537.867963][T30626] ? __pfx_taprio_init+0x10/0x10 [ 537.867980][T30626] qdisc_create+0x6c1/0xae0 [ 537.868000][T30626] ? __mod_memcg_lruvec_state+0x141/0x290 [ 537.868138][T30626] ? __nla_parse+0x40/0x60 [ 537.868167][T30626] tc_modify_qdisc+0x668/0x1100 [ 537.868207][T30626] ? __pfx_tc_modify_qdisc+0x10/0x10 [ 537.868230][T30626] rtnetlink_rcv_msg+0x6aa/0x710 [ 537.868322][T30626] ? avc_has_perm_noaudit+0x1cc/0x210 [ 537.868404][T30626] netlink_rcv_skb+0x12c/0x230 [ 537.868445][T30626] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 537.868511][T30626] rtnetlink_rcv+0x1c/0x30 [ 537.868574][T30626] netlink_unicast+0x599/0x670 [ 537.868602][T30626] netlink_sendmsg+0x5cc/0x6e0 [ 537.868653][T30626] ? __pfx_netlink_sendmsg+0x10/0x10 [ 537.868669][T30626] __sock_sendmsg+0x140/0x180 [ 537.868768][T30626] ____sys_sendmsg+0x326/0x4b0 [ 537.868795][T30626] __sys_sendmsg+0x19d/0x230 [ 537.868832][T30626] __x64_sys_sendmsg+0x46/0x50 [ 537.868920][T30626] x64_sys_call+0x2734/0x2dc0 [ 537.868944][T30626] do_syscall_64+0xc9/0x1c0 [ 537.869022][T30626] ? clear_bhb_loop+0x55/0xb0 [ 537.869046][T30626] ? clear_bhb_loop+0x55/0xb0 [ 537.869155][T30626] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 537.869246][T30626] RIP: 0033:0x7fe85961d169 [ 537.869260][T30626] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 537.869275][T30626] RSP: 002b:00007fe857c87038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 537.869291][T30626] RAX: ffffffffffffffda RBX: 00007fe859835fa0 RCX: 00007fe85961d169 [ 537.869302][T30626] RDX: 0000000000000000 RSI: 00004000000007c0 RDI: 0000000000000007 [ 537.869312][T30626] RBP: 00007fe857c87090 R08: 0000000000000000 R09: 0000000000000000 [ 537.869396][T30626] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 537.869412][T30626] R13: 0000000000000000 R14: 00007fe859835fa0 R15: 00007ffeeccd7738 [ 537.869436][T30626] [ 538.148473][T30629] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 538.165196][T30631] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 538.174994][T30633] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 538.224754][T30640] netdevsim netdevsim4: loading /lib/firmware/. failed with error -22 [ 538.233092][T30640] netdevsim netdevsim4: Direct firmware load for . failed with error -22 [ 538.325056][T30658] netlink: zone id is out of range [ 538.330298][T30658] netlink: zone id is out of range [ 538.335663][T30658] netlink: zone id is out of range [ 538.340813][T30658] netlink: zone id is out of range [ 538.346177][T30658] netlink: zone id is out of range [ 538.351418][T30658] netlink: zone id is out of range [ 538.356637][T30658] netlink: zone id is out of range [ 538.361977][T30658] netlink: zone id is out of range [ 538.370621][T30658] netlink: set zone limit has 8 unknown bytes [ 538.416134][T30670] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=30670 comm=syz.4.8887 [ 538.470604][T30681] xt_hashlimit: size too large, truncated to 1048576 [ 538.480776][T30683] pimreg: entered allmulticast mode [ 538.487345][T30683] pimreg: left allmulticast mode [ 538.578200][T30687] team0 (unregistering): Port device team_slave_0 removed [ 538.634238][T30687] team0 (unregistering): Port device team_slave_1 removed [ 538.757376][T30701] lo speed is unknown, defaulting to 1000 [ 538.841147][T30719] netlink: 'syz.1.8898': attribute type 4 has an invalid length. [ 538.852367][T30721] SELinux: policydb version -1930250258 does not match my version range 15-34 [ 538.861368][T30721] SELinux: failed to load policy [ 539.554885][T30740] __nla_validate_parse: 3 callbacks suppressed [ 539.554902][T30740] netlink: 20 bytes leftover after parsing attributes in process `syz.4.8911'. [ 539.949408][T30771] netlink: 44 bytes leftover after parsing attributes in process `syz.1.8922'. [ 539.980431][ T30] kauditd_printk_skb: 321 callbacks suppressed [ 539.980450][ T30] audit: type=1400 audit(2000000333.850:22721): avc: denied { setopt } for pid=30774 comm="syz.7.8924" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 540.012071][T30771] netlink: 44 bytes leftover after parsing attributes in process `syz.1.8922'. [ 540.021642][T30775] netlink: 24 bytes leftover after parsing attributes in process `syz.7.8924'. [ 540.072778][ T30] audit: type=1326 audit(2000000333.940:22722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30779 comm="syz.7.8926" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f991716d169 code=0x0 [ 540.074023][T30783] xt_hashlimit: max too large, truncated to 1048576 [ 540.428477][T30791] lo speed is unknown, defaulting to 1000 [ 540.495041][ T30] audit: type=1326 audit(2000000334.370:22723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30795 comm="gtp" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f24dfb4d169 code=0x7ffc0000 [ 540.541593][ T30] audit: type=1326 audit(2000000334.370:22724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30795 comm="gtp" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f24dfb4d169 code=0x7ffc0000 [ 540.564720][ T30] audit: type=1326 audit(2000000334.390:22725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30795 comm="gtp" exe="/root/syz-executor" sig=0 arch=c000003e syscall=103 compat=0 ip=0x7f24dfb4d169 code=0x7ffc0000 [ 540.587810][ T30] audit: type=1326 audit(2000000334.390:22726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30795 comm="gtp" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f24dfb4d169 code=0x7ffc0000 [ 540.610817][ T30] audit: type=1326 audit(2000000334.390:22727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30795 comm="gtp" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f24dfb4d169 code=0x7ffc0000 [ 540.633910][ T30] audit: type=1326 audit(2000000334.400:22728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30795 comm="gtp" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f24dfb4d169 code=0x7ffc0000 [ 540.656898][ T30] audit: type=1326 audit(2000000334.400:22729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30795 comm="gtp" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f24dfb4d169 code=0x7ffc0000 [ 540.679952][ T30] audit: type=1326 audit(2000000334.400:22730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30795 comm="gtp" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f24dfb4d169 code=0x7ffc0000 [ 540.706757][T30799] netlink: 24 bytes leftover after parsing attributes in process `syz.5.8934'. [ 540.753680][T30803] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 541.211339][T30844] pimreg: entered allmulticast mode [ 541.231618][T30844] pimreg: left allmulticast mode [ 541.285084][T30851] $Hÿ: renamed from  [ 541.290954][T30851] $Hÿ: entered promiscuous mode [ 541.402758][T30863] Cannot find del_set index 4 as target [ 541.422117][T30865] netlink: 24 bytes leftover after parsing attributes in process `syz.1.8958'. [ 541.513219][T30864] lo speed is unknown, defaulting to 1000 [ 541.864848][T30873] FAULT_INJECTION: forcing a failure. [ 541.864848][T30873] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 541.878125][T30873] CPU: 0 UID: 0 PID: 30873 Comm: syz.5.8962 Not tainted 6.14.0-rc7-syzkaller-00067-g76b6905c11fd #0 [ 541.878152][T30873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 541.878166][T30873] Call Trace: [ 541.878174][T30873] [ 541.878185][T30873] dump_stack_lvl+0xf2/0x150 [ 541.878219][T30873] dump_stack+0x15/0x1a [ 541.878241][T30873] should_fail_ex+0x24a/0x260 [ 541.878329][T30873] should_fail+0xb/0x10 [ 541.878363][T30873] should_fail_usercopy+0x1a/0x20 [ 541.878405][T30873] _copy_from_user+0x1c/0xa0 [ 541.878445][T30873] sctp_getsockopt_enable_strreset+0x71/0x350 [ 541.878473][T30873] sctp_getsockopt+0x7cb/0xab0 [ 541.878498][T30873] sock_common_getsockopt+0x5b/0x70 [ 541.878590][T30873] ? __pfx_sock_common_getsockopt+0x10/0x10 [ 541.878678][T30873] do_sock_getsockopt+0x1ca/0x260 [ 541.878726][T30873] __x64_sys_getsockopt+0x18c/0x200 [ 541.878772][T30873] x64_sys_call+0x1288/0x2dc0 [ 541.878810][T30873] do_syscall_64+0xc9/0x1c0 [ 541.878874][T30873] ? clear_bhb_loop+0x55/0xb0 [ 541.878909][T30873] ? clear_bhb_loop+0x55/0xb0 [ 541.878942][T30873] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 541.878969][T30873] RIP: 0033:0x7f24dfb4d169 [ 541.879042][T30873] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 541.879066][T30873] RSP: 002b:00007f24de1b7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 541.879086][T30873] RAX: ffffffffffffffda RBX: 00007f24dfd65fa0 RCX: 00007f24dfb4d169 [ 541.879099][T30873] RDX: 0000000000000076 RSI: 0000000000000084 RDI: 0000000000000003 [ 541.879137][T30873] RBP: 00007f24de1b7090 R08: 00004000000001c0 R09: 0000000000000000 [ 541.879148][T30873] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 541.879162][T30873] R13: 0000000000000000 R14: 00007f24dfd65fa0 R15: 00007ffe8e47b9b8 [ 541.879186][T30873] [ 542.515709][T30887] netlink: 8 bytes leftover after parsing attributes in process `syz.4.8966'. [ 542.524775][T30887] netlink: 8 bytes leftover after parsing attributes in process `syz.4.8966'. [ 542.547103][T30889] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8967'. [ 542.632117][T30890] netlink: 4 bytes leftover after parsing attributes in process `syz.7.8967'. [ 542.900560][T30907] tipc: Started in network mode [ 542.905539][T30907] tipc: Node identity c6c4473e7987, cluster identity 4711 [ 542.912907][T30907] tipc: Enabled bearer , priority 0 [ 542.934655][T30908] tipc: Disabling bearer [ 543.175667][T30927] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 543.223034][T30938] sock: sock_set_timeout: `syz.7.8986' (pid 30938) tries to set negative timeout [ 543.264982][T30939] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=30939 comm=syz.4.8987 [ 543.331203][T30949] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30949 comm=syz.4.8991 [ 543.348217][T30943] dvmrp0: entered allmulticast mode [ 543.366054][T30943] pimreg: entered allmulticast mode [ 543.379431][T30953] 8021q: adding VLAN 0 to HW filter on device team1 [ 543.387946][T30941] dvmrp0: left allmulticast mode [ 543.603686][T30980] bridge_slave_0: left allmulticast mode [ 543.609653][T30980] bridge_slave_0: left promiscuous mode [ 543.615926][T30980] bridge0: port 1(bridge_slave_0) entered disabled state [ 543.638188][T30980] bridge_slave_1: left allmulticast mode [ 543.643992][T30980] bridge_slave_1: left promiscuous mode [ 543.644167][T30984] FAULT_INJECTION: forcing a failure. [ 543.644167][T30984] name failslab, interval 1, probability 0, space 0, times 0 [ 543.649736][T30980] bridge0: port 2(bridge_slave_1) entered disabled state [ 543.662529][T30984] CPU: 0 UID: 0 PID: 30984 Comm: syz.1.9007 Not tainted 6.14.0-rc7-syzkaller-00067-g76b6905c11fd #0 [ 543.662639][T30984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 543.662656][T30984] Call Trace: [ 543.662663][T30984] [ 543.662672][T30984] dump_stack_lvl+0xf2/0x150 [ 543.662709][T30984] dump_stack+0x15/0x1a [ 543.662737][T30984] should_fail_ex+0x24a/0x260 [ 543.662848][T30984] should_failslab+0x8f/0xb0 [ 543.662928][T30984] kmem_cache_alloc_noprof+0x52/0x320 [ 543.662955][T30984] ? getname_flags+0x81/0x3b0 [ 543.663118][T30984] getname_flags+0x81/0x3b0 [ 543.663161][T30984] user_path_at+0x26/0x120 [ 543.663188][T30984] __se_sys_mount+0x24b/0x2d0 [ 543.663278][T30984] ? fput+0x1c4/0x200 [ 543.663307][T30984] __x64_sys_mount+0x67/0x80 [ 543.663346][T30984] x64_sys_call+0x2c84/0x2dc0 [ 543.663438][T30984] do_syscall_64+0xc9/0x1c0 [ 543.663488][T30984] ? clear_bhb_loop+0x55/0xb0 [ 543.663549][T30984] ? clear_bhb_loop+0x55/0xb0 [ 543.663584][T30984] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 543.663618][T30984] RIP: 0033:0x7f3015e8d169 [ 543.663712][T30984] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 543.663810][T30984] RSP: 002b:00007f30144f1038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 543.663835][T30984] RAX: ffffffffffffffda RBX: 00007f30160a5fa0 RCX: 00007f3015e8d169 [ 543.663853][T30984] RDX: 0000400000000040 RSI: 0000400000000440 RDI: 0000000000000000 [ 543.663997][T30984] RBP: 00007f30144f1090 R08: 00004000000001c0 R09: 0000000000000000 [ 543.664013][T30984] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 543.664028][T30984] R13: 0000000000000000 R14: 00007f30160a5fa0 R15: 00007fffe96263e8 [ 543.664052][T30984] [ 543.716856][T30990] usb usb5: usbfs: process 30990 (syz.6.9005) did not claim interface 0 before use [ 543.863104][T30994] FAULT_INJECTION: forcing a failure. [ 543.863104][T30994] name failslab, interval 1, probability 0, space 0, times 0 [ 543.875861][T30994] CPU: 0 UID: 0 PID: 30994 Comm: syz.4.9010 Not tainted 6.14.0-rc7-syzkaller-00067-g76b6905c11fd #0 [ 543.875937][T30994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 543.875986][T30994] Call Trace: [ 543.875992][T30994] [ 543.876000][T30994] dump_stack_lvl+0xf2/0x150 [ 543.876033][T30994] dump_stack+0x15/0x1a [ 543.876058][T30994] should_fail_ex+0x24a/0x260 [ 543.876135][T30994] should_failslab+0x8f/0xb0 [ 543.876168][T30994] __kmalloc_noprof+0xab/0x3f0 [ 543.876250][T30994] ? bpf_test_init+0xa9/0x140 [ 543.876325][T30994] bpf_test_init+0xa9/0x140 [ 543.876435][T30994] bpf_prog_test_run_xdp+0x321/0x8b0 [ 543.876477][T30994] ? __rcu_read_unlock+0x4e/0x70 [ 543.876547][T30994] ? __pfx_bpf_prog_test_run_xdp+0x10/0x10 [ 543.876582][T30994] bpf_prog_test_run+0x20f/0x3a0 [ 543.876638][T30994] __sys_bpf+0x400/0x7a0 [ 543.876680][T30994] __x64_sys_bpf+0x43/0x50 [ 543.876705][T30994] x64_sys_call+0x2914/0x2dc0 [ 543.876732][T30994] do_syscall_64+0xc9/0x1c0 [ 543.876832][T30994] ? clear_bhb_loop+0x55/0xb0 [ 543.876863][T30994] ? clear_bhb_loop+0x55/0xb0 [ 543.876898][T30994] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 543.876976][T30994] RIP: 0033:0x7fe85961d169 [ 543.876994][T30994] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 543.877017][T30994] RSP: 002b:00007fe857c87038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 543.877074][T30994] RAX: ffffffffffffffda RBX: 00007fe859835fa0 RCX: 00007fe85961d169 [ 543.877100][T30994] RDX: 0000000000000048 RSI: 0000400000000600 RDI: 000000000000000a [ 543.877115][T30994] RBP: 00007fe857c87090 R08: 0000000000000000 R09: 0000000000000000 [ 543.877129][T30994] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 543.877142][T30994] R13: 0000000000000000 R14: 00007fe859835fa0 R15: 00007ffeeccd7738 [ 543.877165][T30994] [ 544.093795][T30980] bond0: (slave bond_slave_0): Releasing backup interface [ 544.123187][T30980] bond0: (slave bond_slave_1): Releasing backup interface [ 544.170645][T30980] team0: Port device team_slave_0 removed [ 544.205847][T30980] team0: Port device team_slave_1 removed [ 544.225081][T30980] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 544.232555][T30980] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 544.273708][T30980] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 544.281162][T30980] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 544.318884][T31001] netlink: 'syz.7.9012': attribute type 4 has an invalid length. [ 544.790936][T31053] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=31053 comm=syz.4.9032 [ 544.803589][T31053] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=31053 comm=syz.4.9032 [ 544.851193][T31046] __nla_validate_parse: 7 callbacks suppressed [ 544.851217][T31046] netlink: 8 bytes leftover after parsing attributes in process `syz.1.9031'. [ 544.937969][T31062] sg_write: data in/out 122/14 bytes for SCSI command 0x0-- guessing data in; [ 544.937969][T31062] program syz.1.9036 not setting count and/or reply_len properly [ 544.964610][T31065] netlink: 68 bytes leftover after parsing attributes in process `syz.5.9037'. [ 544.986979][T31068] pimreg: entered allmulticast mode [ 544.993710][T31068] pimreg: left allmulticast mode [ 545.013954][T31071] vlan2: entered allmulticast mode [ 545.019228][T31071] bridge_slave_0: entered allmulticast mode [ 545.029496][T31071] bridge_slave_0: left allmulticast mode [ 545.061139][T31073] netlink: 4 bytes leftover after parsing attributes in process `syz.5.9040'. [ 545.104443][T31087] tipc: Failed to remove unknown binding: 66,1,1/0:4278058001/4278058003 [ 545.109659][ T30] kauditd_printk_skb: 259 callbacks suppressed [ 545.109679][ T30] audit: type=1400 audit(2000000338.980:22990): avc: denied { connect } for pid=31088 comm="syz.7.9045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 545.113089][T31087] tipc: Failed to remove unknown binding: 66,1,1/0:4278058001/4278058003 [ 545.119680][ T30] audit: type=1400 audit(2000000338.990:22991): avc: denied { setopt } for pid=31088 comm="syz.7.9045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 545.168044][ T30] audit: type=1400 audit(2000000339.020:22992): avc: denied { bind } for pid=31088 comm="syz.7.9045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 545.187837][ T30] audit: type=1400 audit(2000000339.020:22993): avc: denied { read } for pid=31088 comm="syz.7.9045" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 545.248393][ T30] audit: type=1400 audit(2000000339.120:22994): avc: denied { read } for pid=31098 comm="syz.5.9049" name="rtc0" dev="devtmpfs" ino=244 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 545.271788][ T30] audit: type=1400 audit(2000000339.120:22995): avc: denied { open } for pid=31098 comm="syz.5.9049" path="/dev/rtc0" dev="devtmpfs" ino=244 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 545.296671][ T30] audit: type=1400 audit(2000000339.150:22996): avc: denied { ioctl } for pid=31098 comm="syz.5.9049" path="/dev/rtc0" dev="devtmpfs" ino=244 ioctlcmd=0x7005 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 545.321962][ T30] audit: type=1326 audit(2000000339.150:22997): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31095 comm="gtp" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3015e8d169 code=0x7ffc0000 [ 545.345384][ T30] audit: type=1326 audit(2000000339.150:22998): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31095 comm="gtp" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3015e8d169 code=0x7ffc0000 [ 545.351099][T31106] netlink: 68 bytes leftover after parsing attributes in process `syz.6.9051'. [ 545.368673][ T30] audit: type=1326 audit(2000000339.150:22999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31095 comm="gtp" exe="/root/syz-executor" sig=0 arch=c000003e syscall=103 compat=0 ip=0x7f3015e8d169 code=0x7ffc0000 [ 545.607852][T31135] netlink: 8 bytes leftover after parsing attributes in process `syz.4.9059'. [ 545.617035][T31135] netlink: 12 bytes leftover after parsing attributes in process `syz.4.9059'. [ 545.626136][T31135] netlink: 'syz.4.9059': attribute type 14 has an invalid length. [ 545.643838][T31133] netlink: 'syz.1.9058': attribute type 1 has an invalid length. [ 545.647627][T31135] netlink: 12 bytes leftover after parsing attributes in process `syz.4.9059'. [ 545.691079][T31142] netlink: 96 bytes leftover after parsing attributes in process `syz.1.9062'. [ 545.732855][T31142] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 545.737106][T31146] netlink: 'syz.4.9063': attribute type 27 has an invalid length. [ 545.751666][T31146] sit0: left promiscuous mode [ 545.756840][T31146] bond0: left promiscuous mode [ 545.809417][T31146] 8021q: adding VLAN 0 to HW filter on device bond0 [ 545.817710][T31146] 8021q: adding VLAN 0 to HW filter on device team0 [ 545.846156][T31154] netlink: 'syz.7.9067': attribute type 8 has an invalid length. [ 545.856186][T31146] net_ratelimit: 19 callbacks suppressed [ 545.856200][T31146] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 545.936911][T31167] netlink: 1272 bytes leftover after parsing attributes in process `syz.1.9068'. [ 546.028550][T31176] netlink: 4 bytes leftover after parsing attributes in process `syz.4.9075'. [ 546.173846][T31188] pimreg: entered allmulticast mode [ 546.181217][T31188] pimreg: left allmulticast mode [ 546.269584][T31190] pimreg: entered allmulticast mode [ 546.280711][T31190] pimreg: left allmulticast mode [ 546.375235][T31192] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 546.586273][T31196] pim6reg1: entered promiscuous mode [ 546.591669][T31196] pim6reg1: entered allmulticast mode [ 546.714274][T31214] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5136 sclass=netlink_route_socket pid=31214 comm=syz.5.9089 [ 546.745663][T31216] FAULT_INJECTION: forcing a failure. [ 546.745663][T31216] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 546.758966][T31216] CPU: 1 UID: 0 PID: 31216 Comm: syz.1.9090 Not tainted 6.14.0-rc7-syzkaller-00067-g76b6905c11fd #0 [ 546.758992][T31216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 546.759003][T31216] Call Trace: [ 546.759008][T31216] [ 546.759022][T31216] dump_stack_lvl+0xf2/0x150 [ 546.759060][T31216] dump_stack+0x15/0x1a [ 546.759080][T31216] should_fail_ex+0x24a/0x260 [ 546.759230][T31216] should_fail+0xb/0x10 [ 546.759315][T31216] should_fail_usercopy+0x1a/0x20 [ 546.759343][T31216] _copy_from_iter+0xd5/0xd00 [ 546.759370][T31216] ? kmalloc_reserve+0x16e/0x190 [ 546.759390][T31216] ? __build_skb_around+0x196/0x1f0 [ 546.759440][T31216] ? __alloc_skb+0x21f/0x310 [ 546.759511][T31216] ? __virt_addr_valid+0x1ed/0x250 [ 546.759532][T31216] ? __check_object_size+0x364/0x520 [ 546.759555][T31216] netlink_sendmsg+0x460/0x6e0 [ 546.759651][T31216] ? __pfx_netlink_sendmsg+0x10/0x10 [ 546.759738][T31216] __sock_sendmsg+0x140/0x180 [ 546.759780][T31216] ____sys_sendmsg+0x326/0x4b0 [ 546.759808][T31216] __sys_sendmsg+0x19d/0x230 [ 546.759846][T31216] __x64_sys_sendmsg+0x46/0x50 [ 546.759926][T31216] x64_sys_call+0x2734/0x2dc0 [ 546.759962][T31216] do_syscall_64+0xc9/0x1c0 [ 546.759990][T31216] ? clear_bhb_loop+0x55/0xb0 [ 546.760096][T31216] ? clear_bhb_loop+0x55/0xb0 [ 546.760120][T31216] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 546.760144][T31216] RIP: 0033:0x7f3015e8d169 [ 546.760184][T31216] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 546.760203][T31216] RSP: 002b:00007f30144f1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 546.760220][T31216] RAX: ffffffffffffffda RBX: 00007f30160a5fa0 RCX: 00007f3015e8d169 [ 546.760232][T31216] RDX: 0000000000000000 RSI: 0000400000000400 RDI: 0000000000000003 [ 546.760259][T31216] RBP: 00007f30144f1090 R08: 0000000000000000 R09: 0000000000000000 [ 546.760340][T31216] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 546.760351][T31216] R13: 0000000000000000 R14: 00007f30160a5fa0 R15: 00007fffe96263e8 [ 546.760370][T31216] [ 547.247238][T31245] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 547.308295][T31256] netlink: 'syz.1.9107': attribute type 2 has an invalid length. [ 547.322628][T31251] bond0: entered promiscuous mode [ 547.327804][T31251] bond0: entered allmulticast mode [ 547.333649][T31251] 8021q: adding VLAN 0 to HW filter on device bond0 [ 547.344090][T31251] bond0 (unregistering): Released all slaves [ 547.462793][T31270] FAULT_INJECTION: forcing a failure. [ 547.462793][T31270] name failslab, interval 1, probability 0, space 0, times 0 [ 547.475501][T31270] CPU: 1 UID: 0 PID: 31270 Comm: syz.6.9109 Not tainted 6.14.0-rc7-syzkaller-00067-g76b6905c11fd #0 [ 547.475588][T31270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 547.475604][T31270] Call Trace: [ 547.475611][T31270] [ 547.475621][T31270] dump_stack_lvl+0xf2/0x150 [ 547.475692][T31270] dump_stack+0x15/0x1a [ 547.475720][T31270] should_fail_ex+0x24a/0x260 [ 547.475753][T31270] should_failslab+0x8f/0xb0 [ 547.475791][T31270] kmem_cache_alloc_lru_noprof+0x57/0x320 [ 547.475875][T31270] ? __d_alloc+0x3d/0x350 [ 547.475904][T31270] __d_alloc+0x3d/0x350 [ 547.475933][T31270] d_alloc_pseudo+0x1e/0x80 [ 547.476013][T31270] alloc_file_pseudo+0x73/0x160 [ 547.476044][T31270] __shmem_file_setup+0x1bb/0x1f0 [ 547.476090][T31270] shmem_file_setup+0x3b/0x50 [ 547.476123][T31270] __se_sys_memfd_create+0x2e1/0x5a0 [ 547.476162][T31270] __x64_sys_memfd_create+0x31/0x40 [ 547.476192][T31270] x64_sys_call+0x2d4c/0x2dc0 [ 547.476305][T31270] do_syscall_64+0xc9/0x1c0 [ 547.476376][T31270] ? clear_bhb_loop+0x55/0xb0 [ 547.476406][T31270] ? clear_bhb_loop+0x55/0xb0 [ 547.476471][T31270] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 547.476499][T31270] RIP: 0033:0x7fa29224d169 [ 547.476514][T31270] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 547.476533][T31270] RSP: 002b:00007fa29086ee18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 547.476559][T31270] RAX: ffffffffffffffda RBX: 000000000000050a RCX: 00007fa29224d169 [ 547.476610][T31270] RDX: 00007fa29086eef0 RSI: 0000000000000000 RDI: 00007fa2922cec3c [ 547.476623][T31270] RBP: 0000400000000200 R08: 00007fa29086ebb7 R09: 00007fa29086ee40 [ 547.476635][T31270] R10: 000000000000000a R11: 0000000000000202 R12: 00004000000001c0 [ 547.476647][T31270] R13: 00007fa29086eef0 R14: 00007fa29086eeb0 R15: 00004000000008c0 [ 547.476665][T31270] [ 547.868297][T31269] pim6reg: entered allmulticast mode [ 547.919711][T31271] pim6reg: left allmulticast mode [ 548.068364][T31282] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 548.104830][T31286] No such timeout policy "syz0" [ 548.373596][T31293] lo speed is unknown, defaulting to 1000 [ 548.390219][T31301] netlink: 'syz.7.9123': attribute type 4 has an invalid length. [ 548.654421][T31306] pim6reg: entered allmulticast mode [ 548.660619][T31306] pim6reg: left allmulticast mode [ 548.822614][T31320] FAULT_INJECTION: forcing a failure. [ 548.822614][T31320] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 548.835743][T31320] CPU: 0 UID: 0 PID: 31320 Comm: syz.5.9131 Not tainted 6.14.0-rc7-syzkaller-00067-g76b6905c11fd #0 [ 548.835780][T31320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 548.835794][T31320] Call Trace: [ 548.835802][T31320] [ 548.835812][T31320] dump_stack_lvl+0xf2/0x150 [ 548.835856][T31320] dump_stack+0x15/0x1a [ 548.835883][T31320] should_fail_ex+0x24a/0x260 [ 548.835914][T31320] should_fail+0xb/0x10 [ 548.836023][T31320] should_fail_usercopy+0x1a/0x20 [ 548.836128][T31320] _copy_to_user+0x20/0xa0 [ 548.836150][T31320] simple_read_from_buffer+0xa0/0x110 [ 548.836186][T31320] proc_fail_nth_read+0xf9/0x140 [ 548.836223][T31320] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 548.836300][T31320] vfs_read+0x19b/0x6f0 [ 548.836327][T31320] ? __rcu_read_unlock+0x4e/0x70 [ 548.836351][T31320] ? __fget_files+0x17c/0x1c0 [ 548.836385][T31320] ksys_read+0xe8/0x1b0 [ 548.836416][T31320] __x64_sys_read+0x42/0x50 [ 548.836442][T31320] x64_sys_call+0x2874/0x2dc0 [ 548.836525][T31320] do_syscall_64+0xc9/0x1c0 [ 548.836556][T31320] ? clear_bhb_loop+0x55/0xb0 [ 548.836596][T31320] ? clear_bhb_loop+0x55/0xb0 [ 548.836627][T31320] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 548.836659][T31320] RIP: 0033:0x7f24dfb4bb7c [ 548.836678][T31320] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 548.836752][T31320] RSP: 002b:00007f24de1b7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 548.836783][T31320] RAX: ffffffffffffffda RBX: 00007f24dfd65fa0 RCX: 00007f24dfb4bb7c [ 548.836838][T31320] RDX: 000000000000000f RSI: 00007f24de1b70a0 RDI: 0000000000000003 [ 548.836851][T31320] RBP: 00007f24de1b7090 R08: 0000000000000000 R09: 0000000000000000 [ 548.836863][T31320] R10: 000000000000003e R11: 0000000000000246 R12: 0000000000000001 [ 548.836874][T31320] R13: 0000000000000001 R14: 00007f24dfd65fa0 R15: 00007ffe8e47b9b8 [ 548.836892][T31320] [ 549.072682][T31324] FAULT_INJECTION: forcing a failure. [ 549.072682][T31324] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 549.085865][T31324] CPU: 0 UID: 0 PID: 31324 Comm: syz.5.9133 Not tainted 6.14.0-rc7-syzkaller-00067-g76b6905c11fd #0 [ 549.085894][T31324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 549.085907][T31324] Call Trace: [ 549.085921][T31324] [ 549.085929][T31324] dump_stack_lvl+0xf2/0x150 [ 549.085959][T31324] dump_stack+0x15/0x1a [ 549.085980][T31324] should_fail_ex+0x24a/0x260 [ 549.086017][T31324] should_fail+0xb/0x10 [ 549.086076][T31324] should_fail_usercopy+0x1a/0x20 [ 549.086116][T31324] strncpy_from_user+0x25/0x210 [ 549.086144][T31324] ? kmem_cache_alloc_noprof+0x18e/0x320 [ 549.086170][T31324] ? getname_flags+0x81/0x3b0 [ 549.086236][T31324] getname_flags+0xb0/0x3b0 [ 549.086274][T31324] user_path_at+0x26/0x120 [ 549.086300][T31324] __se_sys_mount+0x24b/0x2d0 [ 549.086335][T31324] ? fput+0x1c4/0x200 [ 549.086360][T31324] __x64_sys_mount+0x67/0x80 [ 549.086494][T31324] x64_sys_call+0x2c84/0x2dc0 [ 549.086524][T31324] do_syscall_64+0xc9/0x1c0 [ 549.086621][T31324] ? clear_bhb_loop+0x55/0xb0 [ 549.086653][T31324] ? clear_bhb_loop+0x55/0xb0 [ 549.086684][T31324] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 549.086880][T31324] RIP: 0033:0x7f24dfb4d169 [ 549.086896][T31324] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 549.086916][T31324] RSP: 002b:00007f24de1b7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 549.086987][T31324] RAX: ffffffffffffffda RBX: 00007f24dfd65fa0 RCX: 00007f24dfb4d169 [ 549.087003][T31324] RDX: 0000000000000000 RSI: 0000400000000240 RDI: 0000000000000000 [ 549.087018][T31324] RBP: 00007f24de1b7090 R08: 0000400000000000 R09: 0000000000000000 [ 549.087033][T31324] R10: 0000000002200020 R11: 0000000000000246 R12: 0000000000000001 [ 549.087048][T31324] R13: 0000000000000000 R14: 00007f24dfd65fa0 R15: 00007ffe8e47b9b8 [ 549.087127][T31324] [ 549.478192][T31358] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 549.526342][T31359] FAULT_INJECTION: forcing a failure. [ 549.526342][T31359] name failslab, interval 1, probability 0, space 0, times 0 [ 549.539127][T31359] CPU: 0 UID: 0 PID: 31359 Comm: syz.4.9145 Not tainted 6.14.0-rc7-syzkaller-00067-g76b6905c11fd #0 [ 549.539153][T31359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 549.539166][T31359] Call Trace: [ 549.539174][T31359] [ 549.539183][T31359] dump_stack_lvl+0xf2/0x150 [ 549.539246][T31359] dump_stack+0x15/0x1a [ 549.539340][T31359] should_fail_ex+0x24a/0x260 [ 549.539374][T31359] should_failslab+0x8f/0xb0 [ 549.539435][T31359] kmem_cache_alloc_noprof+0x52/0x320 [ 549.539464][T31359] ? skb_clone+0x154/0x1f0 [ 549.539497][T31359] skb_clone+0x154/0x1f0 [ 549.539528][T31359] __netlink_deliver_tap+0x2bd/0x4f0 [ 549.539623][T31359] netlink_unicast+0x64a/0x670 [ 549.539654][T31359] netlink_sendmsg+0x5cc/0x6e0 [ 549.539707][T31359] ? __pfx_netlink_sendmsg+0x10/0x10 [ 549.539729][T31359] __sock_sendmsg+0x140/0x180 [ 549.539762][T31359] ____sys_sendmsg+0x326/0x4b0 [ 549.539846][T31359] __sys_sendmsg+0x19d/0x230 [ 549.539888][T31359] __x64_sys_sendmsg+0x46/0x50 [ 549.539914][T31359] x64_sys_call+0x2734/0x2dc0 [ 549.539982][T31359] do_syscall_64+0xc9/0x1c0 [ 549.540066][T31359] ? clear_bhb_loop+0x55/0xb0 [ 549.540098][T31359] ? clear_bhb_loop+0x55/0xb0 [ 549.540125][T31359] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 549.540206][T31359] RIP: 0033:0x7fe85961d169 [ 549.540225][T31359] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 549.540246][T31359] RSP: 002b:00007fe857c66038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 549.540264][T31359] RAX: ffffffffffffffda RBX: 00007fe859836080 RCX: 00007fe85961d169 [ 549.540306][T31359] RDX: 0000000000000000 RSI: 0000400000000280 RDI: 000000000000000c [ 549.540319][T31359] RBP: 00007fe857c66090 R08: 0000000000000000 R09: 0000000000000000 [ 549.540333][T31359] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 549.540347][T31359] R13: 0000000000000000 R14: 00007fe859836080 R15: 00007ffeeccd7738 [ 549.540368][T31359] [ 549.806478][T31369] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 549.870040][T31373] __nla_validate_parse: 19 callbacks suppressed [ 549.870058][T31373] netlink: 68 bytes leftover after parsing attributes in process `syz.5.9151'. [ 550.007698][T31392] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 550.014707][T31394] FAULT_INJECTION: forcing a failure. [ 550.014707][T31394] name failslab, interval 1, probability 0, space 0, times 0 [ 550.028566][T31394] CPU: 0 UID: 0 PID: 31394 Comm: syz.6.9161 Not tainted 6.14.0-rc7-syzkaller-00067-g76b6905c11fd #0 [ 550.028675][T31394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 550.028733][T31394] Call Trace: [ 550.028743][T31394] [ 550.028753][T31394] dump_stack_lvl+0xf2/0x150 [ 550.028885][T31394] dump_stack+0x15/0x1a [ 550.028913][T31394] should_fail_ex+0x24a/0x260 [ 550.028951][T31394] should_failslab+0x8f/0xb0 [ 550.029025][T31394] __kmalloc_node_track_caller_noprof+0xa8/0x410 [ 550.029057][T31394] ? sidtab_sid2str_get+0xb8/0x140 [ 550.029096][T31394] kmemdup_noprof+0x2b/0x70 [ 550.029197][T31394] sidtab_sid2str_get+0xb8/0x140 [ 550.029253][T31394] security_sid_to_context_core+0x1eb/0x2f0 [ 550.029401][T31394] security_sid_to_context+0x27/0x30 [ 550.029437][T31394] selinux_lsmprop_to_secctx+0x68/0xf0 [ 550.029487][T31394] security_lsmprop_to_secctx+0x40/0x80 [ 550.029515][T31394] audit_log_task_context+0x76/0x180 [ 550.029560][T31394] audit_log_task+0xf9/0x250 [ 550.029592][T31394] audit_seccomp+0x68/0x130 [ 550.029626][T31394] __seccomp_filter+0x6fa/0x1180 [ 550.029781][T31394] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 550.029817][T31394] ? vfs_write+0x644/0x920 [ 550.029845][T31394] ? putname+0xcf/0xf0 [ 550.029862][T31394] ? kmem_cache_free+0xdc/0x2d0 [ 550.029892][T31394] __secure_computing+0x9f/0x1c0 [ 550.029982][T31394] syscall_trace_enter+0xd1/0x1f0 [ 550.030015][T31394] do_syscall_64+0xaa/0x1c0 [ 550.030070][T31394] ? clear_bhb_loop+0x55/0xb0 [ 550.030104][T31394] ? clear_bhb_loop+0x55/0xb0 [ 550.030138][T31394] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 550.030248][T31394] RIP: 0033:0x7fa29224d169 [ 550.030267][T31394] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 550.030290][T31394] RSP: 002b:00007fa2908b1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 550.030313][T31394] RAX: ffffffffffffffda RBX: 00007fa292465fa0 RCX: 00007fa29224d169 [ 550.030327][T31394] RDX: 0000000000000000 RSI: 0000000000fbe000 RDI: 0000400000000000 [ 550.030341][T31394] RBP: 00007fa2908b1090 R08: ffffffffffffffff R09: 0000000000000000 [ 550.030352][T31394] R10: 0000000000000031 R11: 0000000000000246 R12: 0000000000000001 [ 550.030363][T31394] R13: 0000000000000000 R14: 00007fa292465fa0 R15: 00007ffdfbf4b698 [ 550.030392][T31394] [ 550.283453][ T30] kauditd_printk_skb: 189 callbacks suppressed [ 550.283472][ T30] audit: type=1326 audit(2000000343.900:23188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31393 comm="syz.6.9161" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7fa29224bb7c code=0x7ffc0000 [ 550.289945][T31402] netlink: 28 bytes leftover after parsing attributes in process `syz.7.9163'. [ 550.313528][ T30] audit: type=1326 audit(2000000344.140:23189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31393 comm="syz.6.9161" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7fa29224bc1f code=0x7ffc0000 [ 550.346046][ T30] audit: type=1326 audit(2000000344.140:23190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31393 comm="syz.6.9161" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7fa29224bdca code=0x7ffc0000 [ 550.369772][ T30] audit: type=1326 audit(2000000344.140:23191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31393 comm="syz.6.9161" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa29224d169 code=0x7ffc0000 [ 550.393686][ T30] audit: type=1326 audit(2000000344.140:23192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31393 comm="syz.6.9161" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa29224d169 code=0x7ffc0000 [ 550.417766][ T30] audit: type=1326 audit(2000000344.150:23193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31395 comm="syz.4.9162" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe85961d169 code=0x0 [ 550.429668][T31411] netlink: 68 bytes leftover after parsing attributes in process `syz.1.9166'. [ 550.441038][ T30] audit: type=1326 audit(2000000344.160:23194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31376 comm="syz.1.9153" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f3015e29359 code=0x7ffc0000 [ 550.474640][ T30] audit: type=1326 audit(2000000344.160:23195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31376 comm="syz.1.9153" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3015e8d169 code=0x7ffc0000 [ 550.498424][ T30] audit: type=1326 audit(2000000344.160:23196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31376 comm="syz.1.9153" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3015e8d169 code=0x7ffc0000 [ 550.599320][ T30] audit: type=1326 audit(2000000344.440:23197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31415 comm="syz.6.9167" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa29224d169 code=0x7ffc0000 [ 550.742882][T31429] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 550.783290][T31433] netlink: 4 bytes leftover after parsing attributes in process `syz.1.9175'. [ 550.792748][T31433] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 550.801632][T31433] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 550.912093][T31439] netlink: 68 bytes leftover after parsing attributes in process `syz.5.9178'. [ 551.150142][T31476] netdevsim netdevsim5: loading /lib/firmware/. failed with error -22 [ 551.158430][T31476] netdevsim netdevsim5: Direct firmware load for . failed with error -22 [ 551.174825][T31478] netlink: 'syz.1.9193': attribute type 10 has an invalid length. [ 551.310674][T31489] netlink: 'syz.1.9196': attribute type 10 has an invalid length. [ 551.890207][T31491] netlink: 'syz.4.9197': attribute type 3 has an invalid length. [ 551.925813][T31496] FAULT_INJECTION: forcing a failure. [ 551.925813][T31496] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 551.939085][T31496] CPU: 0 UID: 0 PID: 31496 Comm: syz.6.9199 Not tainted 6.14.0-rc7-syzkaller-00067-g76b6905c11fd #0 [ 551.939157][T31496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 551.939172][T31496] Call Trace: [ 551.939179][T31496] [ 551.939188][T31496] dump_stack_lvl+0xf2/0x150 [ 551.939222][T31496] dump_stack+0x15/0x1a [ 551.939246][T31496] should_fail_ex+0x24a/0x260 [ 551.939361][T31496] should_fail+0xb/0x10 [ 551.939394][T31496] should_fail_usercopy+0x1a/0x20 [ 551.939429][T31496] _copy_from_iter+0xd5/0xd00 [ 551.939521][T31496] ? kmalloc_reserve+0x16e/0x190 [ 551.939625][T31496] ? __build_skb_around+0x196/0x1f0 [ 551.939649][T31496] ? __alloc_skb+0x21f/0x310 [ 551.939673][T31496] ? __virt_addr_valid+0x1ed/0x250 [ 551.939705][T31496] ? __check_object_size+0x364/0x520 [ 551.939758][T31496] netlink_sendmsg+0x460/0x6e0 [ 551.939882][T31496] ? __pfx_netlink_sendmsg+0x10/0x10 [ 551.939905][T31496] __sock_sendmsg+0x140/0x180 [ 551.939943][T31496] ____sys_sendmsg+0x326/0x4b0 [ 551.940058][T31496] __sys_sendmsg+0x19d/0x230 [ 551.940109][T31496] __x64_sys_sendmsg+0x46/0x50 [ 551.940142][T31496] x64_sys_call+0x2734/0x2dc0 [ 551.940227][T31496] do_syscall_64+0xc9/0x1c0 [ 551.940266][T31496] ? clear_bhb_loop+0x55/0xb0 [ 551.940293][T31496] ? clear_bhb_loop+0x55/0xb0 [ 551.940319][T31496] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 551.940483][T31496] RIP: 0033:0x7fa29224d169 [ 551.940504][T31496] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 551.940579][T31496] RSP: 002b:00007fa2908b1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 551.940600][T31496] RAX: ffffffffffffffda RBX: 00007fa292465fa0 RCX: 00007fa29224d169 [ 551.940613][T31496] RDX: 0000000000000000 RSI: 000040000000c2c0 RDI: 0000000000000006 [ 551.940629][T31496] RBP: 00007fa2908b1090 R08: 0000000000000000 R09: 0000000000000000 [ 551.940644][T31496] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 551.940659][T31496] R13: 0000000000000000 R14: 00007fa292465fa0 R15: 00007ffdfbf4b698 [ 551.940683][T31496] [ 552.297140][T31514] netlink: 28 bytes leftover after parsing attributes in process `syz.4.9205'. [ 552.381690][T31526] sch_tbf: burst 0 is lower than device lo mtu (18) ! [ 552.547831][T31533] netlink: 4 bytes leftover after parsing attributes in process `syz.5.9215'. [ 552.800080][T31557] netlink: 8 bytes leftover after parsing attributes in process `syz.4.9224'. [ 553.012808][T31570] ALSA: seq fatal error: cannot create timer (-22) [ 553.263734][T31578] pimreg: entered allmulticast mode [ 553.287211][T31578] pimreg: left allmulticast mode [ 554.027062][T31606] binfmt_misc: register: failed to install interpreter file ./file0/file0 [ 554.063120][T31612] netlink: 20 bytes leftover after parsing attributes in process `syz.6.9245'. [ 554.083423][T31608] netlink: 4 bytes leftover after parsing attributes in process `syz.7.9244'. [ 554.092405][T31606] Cannot find del_set index 4 as target [ 554.432234][T31626] ================================================================== [ 554.440395][T31626] BUG: KCSAN: data-race in mas_wr_store_entry / mtree_range_walk [ 554.448196][T31626] [ 554.450537][T31626] write to 0xffff888104941860 of 8 bytes by task 31623 on cpu 0: [ 554.458372][T31626] mas_wr_store_entry+0x1222/0x23f0 [ 554.463611][T31626] mas_store_prealloc+0x6bf/0x960 [ 554.468666][T31626] commit_merge+0x441/0x740 [ 554.473217][T31626] vma_expand+0x211/0x360 [ 554.477581][T31626] vma_merge_new_range+0x2da/0x340 [ 554.482749][T31626] mmap_region+0x7e0/0x1620 [ 554.487298][T31626] do_mmap+0x98a/0xc30 [ 554.491389][T31626] vm_mmap_pgoff+0x16d/0x2d0 [ 554.495997][T31626] ksys_mmap_pgoff+0xd0/0x330 [ 554.500691][T31626] x64_sys_call+0x1940/0x2dc0 [ 554.505383][T31626] do_syscall_64+0xc9/0x1c0 [ 554.509917][T31626] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 554.515826][T31626] [ 554.518241][T31626] read to 0xffff888104941860 of 8 bytes by task 31626 on cpu 1: [ 554.525892][T31626] mtree_range_walk+0x1b4/0x460 [ 554.530862][T31626] mas_walk+0x16e/0x320 [ 554.535044][T31626] lock_vma_under_rcu+0x95/0x270 [ 554.540002][T31626] exc_page_fault+0x150/0x650 [ 554.544691][T31626] asm_exc_page_fault+0x26/0x30 [ 554.549639][T31626] [ 554.551966][T31626] value changed: 0x00007fe857c24fff -> 0x00007fe857c03fff [ 554.559073][T31626] [ 554.561396][T31626] Reported by Kernel Concurrency Sanitizer on: [ 554.567573][T31626] CPU: 1 UID: 0 PID: 31626 Comm: syz.4.9250 Not tainted 6.14.0-rc7-syzkaller-00067-g76b6905c11fd #0 [ 554.578357][T31626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 554.588420][T31626] ==================================================================