last executing test programs: 4.871461386s ago: executing program 0 (id=18): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000400)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) syz_open_dev$evdev(&(0x7f0000000000), 0x3, 0x6800) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, 0x0, &(0x7f0000000340)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[{0x0}], 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000005c00)={&(0x7f0000000000)=@newtaction={0xa0, 0x30, 0x9, 0x0, 0x0, {}, [{0x8c, 0x1, [@m_bpf={0x88, 0x1, 0x0, 0x0, {{0x8}, {0x60, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x7}, @TCA_ACT_BPF_OPS={0x3c, 0x4, [{}, {}, {0x3, 0x0, 0x0, 0x1000000}, {}, {}, {}, {0x6}]}, @TCA_ACT_BPF_PARMS={0x18}]}, {}, {0xc}, {0xc}}}]}]}, 0xa0}}, 0x0) recvfrom$inet(r0, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x720, 0x0, 0xfffffffffffffd25) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000300)='./file0\x00', 0x21081e, &(0x7f0000000640)={[{@grpquota}, {@nodiscard}, {@delalloc}, {@jqfmt_vfsv0}, {@journal_path={'journal_path', 0x3d, './file1'}}], [{@subj_role={'subj_role', 0x3d, '$:7^^'}}, {@smackfshat={'smackfshat', 0x3d, '\xac-\')\\'}}, {@uid_gt}, {@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, 'bpf\x00'}}, {@dont_hash}, {@pcr={'pcr', 0x3d, 0x2e}}]}, 0x1, 0x50c, &(0x7f0000001000)="$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") 3.992654507s ago: executing program 0 (id=32): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7f00000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300ec5114119de55b000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000001640)='kfree\x00', r1}, 0x10) syz_usbip_server_init(0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3ff, @void, @value}, 0x94) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x2, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x2, 0x800000000003}, 0x105300, 0xffffffff, 0x20000, 0x5, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x0, 0x400000000005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r6}, 0x38) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000080)='kfree\x00', r7}, 0x18) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r5, @ANYBLOB="01032757c38d085641a7260000000c000180080001"], 0x20}, 0x1, 0x0, 0x0, 0x20040005}, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={0x0, @dev, @loopback}, &(0x7f0000000540)=0xc) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) fsetxattr(r4, &(0x7f0000000040)=@known='trusted.overlay.metacopy\x00', &(0x7f00000001c0)='}@\x00', 0x3, 0x3) ioctl$sock_SIOCETHTOOL(r9, 0x8946, &(0x7f0000000180)={'bridge_slave_1\x00', &(0x7f0000000080)=@ethtool_gstrings={0x1b, 0x7}}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x1, 0x1, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', r8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000540)='inet_sock_set_state\x00', r11}, 0x10) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) socket(0x10, 0x3, 0x0) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r12], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r12}, &(0x7f0000000000), &(0x7f00000005c0)=r13}, 0x20) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000540)='inet_sock_set_state\x00', r14}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) 3.180157028s ago: executing program 0 (id=42): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) r2 = socket(0x400000000010, 0x3, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0x1}, {0xffff, 0xffff}, {0x0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=@newtfilter={0x84, 0x2c, 0xd27, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r4, {0x0, 0xf}, {}, {0x7}}, [@filter_kind_options=@f_matchall={{0xd}, {0x50, 0x2, [@TCA_MATCHALL_ACT={0x4c, 0x2, [@m_gact={0x48, 0x1, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x3ed05f89, 0x3, 0x5, 0x2, 0x4810}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x2, 0x3}}}}]}]}}]}, 0x84}, 0x1, 0x0, 0x0, 0x10}, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200800, &(0x7f0000000180), 0xfb, 0x5bb, &(0x7f0000000b40)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r5, &(0x7f0000000000), 0x2a979d) ioctl$SIOCSIFHWADDR(r5, 0x401c5820, &(0x7f0000000080)={'macvlan1\x00', @broadcast}) syz_usbip_server_init(0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa10000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$IPCTNL_MSG_CT_DELETE(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0xac, 0x2, 0x1, 0x5, 0x0, 0x0, {0x3, 0x0, 0x4}, [@CTA_TUPLE_ORIG={0x2c, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}]}, @CTA_ID={0x8}, @CTA_TUPLE_REPLY={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}]}, @CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_REPLY_FLAGS={0x8, 0x2, 0x10}]}, @CTA_TUPLE_ORIG={0x4}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x6}, @CTA_FILTER={0x3c, 0x19, 0x0, 0x1, [@CTA_FILTER_ORIG_FLAGS={0x8}, @CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x4}, @CTA_FILTER_REPLY_FLAGS={0x8, 0x2, 0x902}, @CTA_FILTER_ORIG_FLAGS={0x8}, @CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x2}, @CTA_FILTER_ORIG_FLAGS={0x8, 0x1, 0x40}, @CTA_FILTER_REPLY_FLAGS={0x8, 0x2, 0x40}]}]}, 0xac}}, 0x4) r6 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$selinux_load(r6, &(0x7f0000000340)={0xf97cff8c, 0x8}, 0x2000) write$UHID_CREATE(r5, &(0x7f0000000700)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000600)=""/251, 0xfb, 0x1, 0xfffffffb, 0x6, 0x623, 0x6}}, 0x120) unlink(&(0x7f0000000340)='./cgroup.cpu/cpuset.cpus\x00') r7 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xc3, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xa19a, 0x1000}, 0x0, 0x0, 0xffffffff, 0x9752333b9a87418, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f0000000340)='cpu\t&0&&\t') ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x541b, &(0x7f0000000000)) ioctl$TUNGETVNETLE(r0, 0x4010744d, &(0x7f0000000180)) 2.376273738s ago: executing program 0 (id=58): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000300)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000440)='kmem_cache_free\x00', r1}, 0x10) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x11000) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="050000000e0000004000000003"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100000220702500000000202020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000280)='rpc_xdr_alignment\x00', r3, 0x0, 0x1}, 0x18) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00'}) r7 = socket$kcm(0xa, 0x2, 0x3a) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x44000) sendmsg$kcm(r7, &(0x7f0000000440)={&(0x7f0000000800)=@in6={0xa, 0x0, 0x0, @loopback={0xff00000000000000}}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000780)="80005b020eaa4da2", 0xfdef}], 0x1, 0x0, 0x0, 0x900}, 0x0) 2.279378908s ago: executing program 4 (id=60): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400001cb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='kfree\x00', r1, 0x0, 0x8}, 0x18) pipe2(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000, 0x0, 0x0, 0x6, 0x3, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r4 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x0, 0x0) r5 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x7ffff000) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',access=', @ANYBLOB="9d"]) 2.069059708s ago: executing program 4 (id=64): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r0 = socket$packet(0x11, 0x2, 0x300) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[], 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB='2'], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) close(0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000280)={0x11, 0x7, r5, 0x1, 0xdf, 0x6, @local}, 0x14) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@getchain={0x24, 0x11, 0x1, 0x70bd2a, 0x8000000, {0x0, 0x0, 0x0, r5, {0x1f, 0x3}}}, 0x24}, 0x1, 0x0, 0x0, 0x20008040}, 0x4000000) 2.016561638s ago: executing program 2 (id=66): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) getrlimit(0x7, &(0x7f00000000c0)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x4000811}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r4) getsockname$packet(r4, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x1, 0x0, {0x0, 0x0, 0x0, r5, {0x0, 0x2}, {0xffff, 0xffff}, {0xc, 0x4}}, [@qdisc_kind_options=@q_mq={0x7}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=@gettclass={0x24, 0x2a, 0x129, 0x1, 0x0, {0x0, 0x0, 0x0, r5, {0x0, 0x3}, {0x0, 0x2}, {0xfff1, 0x9}}}, 0x24}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000800)=@newtfilter={0x3f4, 0x2c, 0x500, 0x70bd25, 0x25dfdbfd, {0x0, 0x0, 0x0, r5, {0x2}, {0x9, 0x63b6199f8484abea}, {0xe}}, [@filter_kind_options=@f_flower={{0xb}, {0x3a0, 0x2, [@TCA_FLOWER_ACT={0x350, 0x3, [@m_skbmod={0x148, 0x3, 0x0, 0x0, {{0xb}, {0x70, 0x2, 0x0, 0x1, [@TCA_SKBMOD_PARMS={0x24, 0x2, {{0xa, 0x4, 0x10000000, 0x8001, 0xfffffffb}, 0x3}}, @TCA_SKBMOD_SMAC={0xa, 0x4, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x18}}, @TCA_SKBMOD_PARMS={0x24, 0x2, {{0xfffffffb, 0x5, 0x7, 0xffff, 0xb}, 0x3}}, @TCA_SKBMOD_SMAC={0xa, 0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, @TCA_SKBMOD_SMAC={0xa, 0x4, @remote}]}, {0xad, 0x6, "5ea16a7713f2fd2d388500171aedad9f902595306b840113adcc4c51743c9991bc91bd7476a2a85567a1c5b712d3399d2a734a44b9fcdec88d8174fac739eae5e54d033e98dbe8115fe12765f7f34e27148a088692ad7667c15142c348c69e44eaac9fb45b1d5ba90d2a65bb27dff8570c13875e437ab81f08a4492f642e8a8ecc4adaaa0a7f44035aace87ae5b047277a8d240c18c43b53f91b8ab61726a09e840969a53866b35fb3"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_bpf={0x11c, 0xc, 0x0, 0x0, {{0x8}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18, 0x2, {0xb9, 0x200000, 0x9, 0x400, 0x3}}, @TCA_ACT_BPF_FD={0x8, 0x5, r1}]}, {0xd1, 0x6, "7b4060798fa7062672699ccfd49686ad81d7a6b9c5eaf7ac5359ae0cd138ad875cf9f0851fad371fa42c5361a00dfa8342ebef4f69ee6bc5356d631ba4694191cbb7fc74c1af8e59dc3d3b239c1858be2eec19ac4750b2f340e2ee30bd1d13ea3a94eef27679db23ea5c3d469ad59b2b55f3890612931642446c942682930e22ee65ec442acc25770f0f558b1298e1136bd8333cd08fbe9b24261d6ca87a6bf54d4ece4a90a1abf24481cf5488ab290d15885a73968161c52c4e97a67fafaca56db64f411be911e474c17b7e45"}, {0xc}, {0xc, 0x8, {0x1, 0x1}}}}, @m_simple={0xe8, 0x3, 0x0, 0x0, {{0xb}, {0x34, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0xe, 0x3, 'syzkaller\x00'}, @TCA_DEF_DATA={0x5, 0x3, '\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x4, 0xca1ae99, 0x20000000, 0xbe7}}]}, {0x8b, 0x6, "2f25612ae826aa1883c2c8e3353a97297afcc2eb65af08ddaf3c13a033352f0f67bedcc6dedc54551149b8e9e3c41c8431496360c08c33626d57aecf7cf70865941ecf42c5af144f19d472c69fa0384203f15ba3c3b9675b606c79f46ff1a3841f12de845836754c7e61bff59e735ec5e946f77fec66ea663246bf55a2ed022968ec4bb81daa3d"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x1}}}}]}, @TCA_FLOWER_KEY_ENC_IPV6_SRC={0x14, 0x1f, @local}, @TCA_FLOWER_KEY_SCTP_DST_MASK={0x6}, @TCA_FLOWER_KEY_CVLAN_ID={0x6, 0x4d, 0x7f1}, @TCA_FLOWER_KEY_MPLS_OPTS={0x8, 0x63, 0x0, 0x1, @TCA_FLOWER_KEY_MPLS_OPTS_LSE={0x4}}, @TCA_FLOWER_KEY_ENC_IPV4_DST={0x8, 0x1d, @dev={0xac, 0x14, 0x14, 0x14}}, @TCA_FLOWER_KEY_ARP_SIP={0x8, 0x39, @initdev={0xac, 0x1e, 0x1, 0x0}}, @TCA_FLOWER_KEY_IPV4_DST_MASK={0x8}, @TCA_FLOWER_KEY_FLAGS={0x8, 0x2f, 0xff}]}}, @filter_kind_options=@f_fw={{0x7}, {0xc, 0x2, [@TCA_FW_CLASSID={0x8, 0x1, {0xffe0, 0xffff}}]}}, @TCA_CHAIN={0x8, 0xb, 0x7943}, @TCA_RATE={0x6, 0x5, {0x6, 0x95}}]}, 0x3f4}, 0x1, 0x0, 0x0, 0x4}, 0x43) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000780)='./file1/file0\x00', 0x10000, 0x100) flock(r6, 0x5) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000740)={&(0x7f0000000400)="93c8410e5b1bb40447", &(0x7f0000000440)=""/103, &(0x7f0000000580)="5934503a3d677689e07c6ca249dc2ed0de313da20a02ce8dd119e153c64cf8d6a2183fb5dd94444e319f70f0f7a593fc070ca7b593e4fd4ba330aa3f776b749d8e8c0300cff697e884e96cd8f67e2aee3ac164a64d334708ec6ebe4fb285d408ce57d853f7ff4e6bdc548c9a17fa315b1e8210fb8fac0c432f89771844f6469085e0d42e7507ab423b9416cc7004ce372a7d31340a968f8f5638dc8bb281c37fecb8fb05dd5e1deed75dc6bd26d0a72273a03a9711de01c9bc1bb7a64103491b0268ef6641e25cd3ae50", &(0x7f0000000680)="ce228291842eedb318650a32d77d791b18074e2fdd3cb1b8ed78cdaac546f03c2ed785d31bebef00d69b3a78df76a1ec98ad9cd25c52036ea736cbf3ccbcb1302ac2357d50563330cbaf94ca29408e7ae99d416d5d2eabd08fd0cee0d28341ee1dfafb7ef1b553ecea5ed643ea204d16d948b4609d39149a0a9c6e33ca9e24b49b6fd561fbc233da2a73fed0", 0x3, r0}, 0x38) r7 = inotify_init1(0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000a50000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffc9a, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r8}, 0x10) r9 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000080)={'vxcan1\x00', 0x0}) bind$can_raw(r9, &(0x7f00000005c0)={0x1d, r10}, 0x10) sendmsg$can_raw(r9, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000140)=@can={{0x0, 0x0, 0x0, 0x1}, 0x2, 0x0, 0x0, 0x0, "5b7ba3698f28aaf0"}, 0x10}}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1}, 0x8002, 0x0, 0xfff, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) inotify_add_watch(r7, &(0x7f0000000040)='./file1\x00', 0x100) sendmmsg(r1, &(0x7f00000002c0), 0x40000000000009f, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000040), 0x81, r0}, 0x38) r11 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f00000007c0), r11) 1.825002969s ago: executing program 4 (id=67): r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'macsec0\x00', 0x0}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x14, 0x7, 0x1, 0x301, 0x0, 0x0, {0x1, 0x0, 0x8}}, 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x4042) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="080000000018110300000000", @ANYRES8=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r3}, &(0x7f0000000000), &(0x7f0000000040)=r4}, 0x20) r5 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_CONTROL(r5, 0xc0105500, &(0x7f0000000000)={0x60, 0xb, 0x10, 0x5, 0x0, 0x10001, 0x0}) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000580)=ANY=[@ANYBLOB="54001000010584d85084eb2b0000003bff01b0d5b5347a000009848e66209ab400b0944015f66d2b05f941f313ccf3879ddd7c62adf2ec524227cceaa9f6b3b9a7911e4795bc143bfd428cc7e07d091f71b36688b1223c0cd58f2cd2776a56cdf247b60af4e2bcb25d9ceca257068fdb58f184518e64a1cd91de6f5e096ef7ac0817652fd9e708cad4a089f6a75d6239bb46d54d88f566de0c4e5b8499ba1870504ac7e665b19c3c35d1", @ANYRES32=0x0, @ANYRESDEC=r1, @ANYRES32=r1], 0x54}, 0x1, 0x0, 0x0, 0x20042840}, 0x800) r7 = msgget(0x1, 0x2b0) msgrcv(r7, 0x0, 0x0, 0x1, 0x2000) msgctl$IPC_SET(r7, 0x1, &(0x7f0000000400)={{0x2, 0x0, 0x0, 0x0, 0x0, 0x14, 0x7}, 0x0, 0x0, 0x28596bc9, 0x8c, 0x20000000000000a, 0x100, 0x200000000, 0x803, 0x9, 0x9}) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r11 = msgget$private(0x0, 0x790) msgsnd(r11, &(0x7f0000000d00)=ANY=[@ANYRES8], 0x401, 0x0) r12 = shmget$private(0x0, 0x13000, 0x1, &(0x7f0000feb000/0x13000)=nil) shmat(r12, &(0x7f0000fff000/0x1000)=nil, 0x0) shmctl$IPC_INFO(r12, 0x3, &(0x7f0000001180)=""/4096) msgsnd(r11, &(0x7f0000000d40)=ANY=[@ANYBLOB="01"], 0x401, 0x0) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@empty}}, &(0x7f0000000540)=0xe8) msgctl$IPC_SET(r11, 0x1, &(0x7f0000000400)={{0x2, 0x0, r13, r14, r13, 0x51, 0x7}, 0x0, 0x0, 0x100000000, 0x8c, 0x7, 0x100, 0x200000000, 0x3, 0x9, 0x9}) sendmsg$IPSET_CMD_DESTROY(r6, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, 0x3, 0x6, 0x0, 0x0, 0x0, {0xa, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40010}, 0x0) msgctl$IPC_SET(r7, 0x1, &(0x7f0000000080)={{0x0, r9, r10, 0xffffffffffffffff, r13, 0x8, 0x7fff}, 0x0, 0x0, 0x3482, 0x8000000000000000, 0xd4e4, 0xd1, 0xe, 0x1, 0x2, 0x8}) 1.758428329s ago: executing program 2 (id=70): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\n\x00'/20, @ANYRES32, @ANYBLOB='\x00'/16, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'/28], 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0xffff0000, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0, 0xffff0000}, 0x48) 1.697257349s ago: executing program 3 (id=71): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount(0x0, &(0x7f00000001c0)='./file0/../file0\x00', 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x6}, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x71, 0x0, 0x0, 0x0, 0xa9a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='kfree\x00', r4}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000001c0)='cpu>20\t&&') r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000000)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000080)='9p_protocol_dump\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r9}, 0x10) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r10, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x4b0}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000740)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@call={0x85, 0x0, 0x0, 0xad}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x4}, {0x85, 0x0, 0x0, 0x84}}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r12 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r12, 0x0, 0x2e, 0x0, 0x0) fsetxattr$trusted_overlay_opaque(r12, &(0x7f0000000400), &(0x7f0000000580), 0x2, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='9p_protocol_dump\x00', r11}, 0x10) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 1.556437839s ago: executing program 1 (id=75): openat$tun(0xffffffffffffff9c, 0x0, 0x80000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000800000001"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) io_submit(0x0, 0x1, &(0x7f0000000dc0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0xa, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0x1}]) socket$inet6_mptcp(0xa, 0x1, 0x106) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r1) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) unshare(0x600) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) sendmmsg(r3, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[{0x10, 0x110, 0x1}], 0x10, 0xe000}, 0x5}], 0x1, 0x0) listen(r2, 0xfffffffc) r4 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x30, 0x0, 0x1, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x1c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x6}]}]}, 0x30}, 0x1, 0x0, 0x0, 0xaa34a4cfdf933201}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r5, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000200)={0x28, r6, 0x1, 0x0, 0x0, {0x7}, [@MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x1}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1a}]}]}, 0x28}}, 0x0) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, 0x0, 0x10) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x60) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r7, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000004c0)={0x1c, r8, 0x1, 0x30bd2c, 0x0, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}]}, 0x1c}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a6c000000160a030200000000000000000200fffb0900020073797a30000000000900010073797a300000000040000380080001400000000008000240004000002c0003801400010074756e6c3000000000000000000000001400010074"], 0x94}, 0x1, 0x0, 0x0, 0x200000d0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0a00000009000000020000000900000042"], 0x48) 1.513733059s ago: executing program 3 (id=76): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="3800000055002f03020000000000000007000000", @ANYRES32, @ANYBLOB=' '], 0x38}, 0x1, 0x0, 0x0, 0xfe0f}, 0x0) (fail_nth: 4) 1.289168129s ago: executing program 0 (id=77): socket$nl_xfrm(0x10, 0x3, 0x6) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800000000003}, 0x1320, 0xffffffff, 0x3, 0x5, 0x0, 0x1, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r2}, 0x10) syz_io_uring_setup(0x111, &(0x7f0000000340)={0x0, 0x0, 0x2, 0x4}, 0x0, 0x0) 1.273843939s ago: executing program 3 (id=78): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='workqueue_queue_work\x00', r0}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000003c0)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x45, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, @void, @value}, 0x94) open(&(0x7f0000000080)='./bus\x00', 0x143c62, 0x0) mount(&(0x7f0000000240)=@sr0, &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000300)='trans=rdma,') r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRES32=r2, @ANYBLOB], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r2}, &(0x7f0000000800), &(0x7f0000000840)=r3}, 0x20) set_mempolicy_home_node(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x68, 0x0, 0x0, 0x0, 0x0, 0x1000040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x400, 0x2, 0x625a, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket(0x40000000015, 0x5, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x80042, 0x0) capset(&(0x7f0000000080)={0x20080522}, &(0x7f0000000040)={0x1000, 0x10ffff, 0xfffffffd}) fsetxattr$security_capability(r5, &(0x7f0000000080), &(0x7f0000000140)=@v3={0x3000000, [{0x3, 0x4}, {0x80000001, 0x80000001}]}, 0x18, 0x2) r6 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r6}, &(0x7f0000bbdffc)=0x0) timer_settime(r7, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) recvmmsg(r4, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x1, 0x60010020, 0x0) 1.217705139s ago: executing program 1 (id=79): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0xfffff000) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup(r2) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x4, 0x0, 0x0) 1.070109759s ago: executing program 4 (id=80): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) getrlimit(0x7, &(0x7f00000000c0)) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x4000811}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r4) getsockname$packet(r4, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x1, 0x0, {0x0, 0x0, 0x0, r5, {0x0, 0x2}, {0xffff, 0xffff}, {0xc, 0x4}}, [@qdisc_kind_options=@q_mq={0x7}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=@gettclass={0x24, 0x2a, 0x129, 0x1, 0x0, {0x0, 0x0, 0x0, r5, {0x0, 0x3}, {0x0, 0x2}, {0xfff1, 0x9}}}, 0x24}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000800)=@newtfilter={0x3f4, 0x2c, 0x500, 0x70bd25, 0x25dfdbfd, {0x0, 0x0, 0x0, r5, {0x2}, {0x9, 0x63b6199f8484abea}, {0xe}}, [@filter_kind_options=@f_flower={{0xb}, {0x3a0, 0x2, [@TCA_FLOWER_ACT={0x350, 0x3, [@m_skbmod={0x148, 0x3, 0x0, 0x0, {{0xb}, {0x70, 0x2, 0x0, 0x1, [@TCA_SKBMOD_PARMS={0x24, 0x2, {{0xa, 0x4, 0x10000000, 0x8001, 0xfffffffb}, 0x3}}, @TCA_SKBMOD_SMAC={0xa, 0x4, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x18}}, @TCA_SKBMOD_PARMS={0x24, 0x2, {{0xfffffffb, 0x5, 0x7, 0xffff, 0xb}, 0x3}}, @TCA_SKBMOD_SMAC={0xa, 0x4, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, @TCA_SKBMOD_SMAC={0xa, 0x4, @remote}]}, {0xad, 0x6, "5ea16a7713f2fd2d388500171aedad9f902595306b840113adcc4c51743c9991bc91bd7476a2a85567a1c5b712d3399d2a734a44b9fcdec88d8174fac739eae5e54d033e98dbe8115fe12765f7f34e27148a088692ad7667c15142c348c69e44eaac9fb45b1d5ba90d2a65bb27dff8570c13875e437ab81f08a4492f642e8a8ecc4adaaa0a7f44035aace87ae5b047277a8d240c18c43b53f91b8ab61726a09e840969a53866b35fb3"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_bpf={0x11c, 0xc, 0x0, 0x0, {{0x8}, {0x24, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18, 0x2, {0xb9, 0x200000, 0x9, 0x400, 0x3}}, @TCA_ACT_BPF_FD={0x8, 0x5, r1}]}, {0xd1, 0x6, "7b4060798fa7062672699ccfd49686ad81d7a6b9c5eaf7ac5359ae0cd138ad875cf9f0851fad371fa42c5361a00dfa8342ebef4f69ee6bc5356d631ba4694191cbb7fc74c1af8e59dc3d3b239c1858be2eec19ac4750b2f340e2ee30bd1d13ea3a94eef27679db23ea5c3d469ad59b2b55f3890612931642446c942682930e22ee65ec442acc25770f0f558b1298e1136bd8333cd08fbe9b24261d6ca87a6bf54d4ece4a90a1abf24481cf5488ab290d15885a73968161c52c4e97a67fafaca56db64f411be911e474c17b7e45"}, {0xc}, {0xc, 0x8, {0x1, 0x1}}}}, @m_simple={0xe8, 0x3, 0x0, 0x0, {{0xb}, {0x34, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0xe, 0x3, 'syzkaller\x00'}, @TCA_DEF_DATA={0x5, 0x3, '\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x4, 0xca1ae99, 0x20000000, 0xbe7}}]}, {0x8b, 0x6, "2f25612ae826aa1883c2c8e3353a97297afcc2eb65af08ddaf3c13a033352f0f67bedcc6dedc54551149b8e9e3c41c8431496360c08c33626d57aecf7cf70865941ecf42c5af144f19d472c69fa0384203f15ba3c3b9675b606c79f46ff1a3841f12de845836754c7e61bff59e735ec5e946f77fec66ea663246bf55a2ed022968ec4bb81daa3d"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x1}}}}]}, @TCA_FLOWER_KEY_ENC_IPV6_SRC={0x14, 0x1f, @local}, @TCA_FLOWER_KEY_SCTP_DST_MASK={0x6}, @TCA_FLOWER_KEY_CVLAN_ID={0x6, 0x4d, 0x7f1}, @TCA_FLOWER_KEY_MPLS_OPTS={0x8, 0x63, 0x0, 0x1, @TCA_FLOWER_KEY_MPLS_OPTS_LSE={0x4}}, @TCA_FLOWER_KEY_ENC_IPV4_DST={0x8, 0x1d, @dev={0xac, 0x14, 0x14, 0x14}}, @TCA_FLOWER_KEY_ARP_SIP={0x8, 0x39, @initdev={0xac, 0x1e, 0x1, 0x0}}, @TCA_FLOWER_KEY_IPV4_DST_MASK={0x8}, @TCA_FLOWER_KEY_FLAGS={0x8, 0x2f, 0xff}]}}, @filter_kind_options=@f_fw={{0x7}, {0xc, 0x2, [@TCA_FW_CLASSID={0x8, 0x1, {0xffe0, 0xffff}}]}}, @TCA_CHAIN={0x8, 0xb, 0x7943}, @TCA_RATE={0x6, 0x5, {0x6, 0x95}}]}, 0x3f4}, 0x1, 0x0, 0x0, 0x4}, 0x43) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000780)='./file1/file0\x00', 0x10000, 0x100) flock(r6, 0x5) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000740)={&(0x7f0000000400)="93c8410e5b1bb40447", &(0x7f0000000440)=""/103, &(0x7f0000000580)="5934503a3d677689e07c6ca249dc2ed0de313da20a02ce8dd119e153c64cf8d6a2183fb5dd94444e319f70f0f7a593fc070ca7b593e4fd4ba330aa3f776b749d8e8c0300cff697e884e96cd8f67e2aee3ac164a64d334708ec6ebe4fb285d408ce57d853f7ff4e6bdc548c9a17fa315b1e8210fb8fac0c432f89771844f6469085e0d42e7507ab423b9416cc7004ce372a7d31340a968f8f5638dc8bb281c37fecb8fb05dd5e1deed75dc6bd26d0a72273a03a9711de01c9bc1bb7a64103491b0268ef6641e25cd3ae50", &(0x7f0000000680)="ce228291842eedb318650a32d77d791b18074e2fdd3cb1b8ed78cdaac546f03c2ed785d31bebef00d69b3a78df76a1ec98ad9cd25c52036ea736cbf3ccbcb1302ac2357d50563330cbaf94ca29408e7ae99d416d5d2eabd08fd0cee0d28341ee1dfafb7ef1b553ecea5ed643ea204d16d948b4609d39149a0a9c6e33ca9e24b49b6fd561fbc233da2a73fed0", 0x3, r0}, 0x38) r7 = inotify_init1(0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000a50000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffc9a, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r8}, 0x10) r9 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000080)={'vxcan1\x00', 0x0}) bind$can_raw(r9, &(0x7f00000005c0)={0x1d, r10}, 0x10) sendmsg$can_raw(r9, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000140)=@can={{0x0, 0x0, 0x0, 0x1}, 0x2, 0x0, 0x0, 0x0, "5b7ba3698f28aaf0"}, 0x10}}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xc8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1}, 0x8002, 0x0, 0xfff, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x3, 0xffffffffffffffff, 0x2) inotify_add_watch(r7, &(0x7f0000000040)='./file1\x00', 0x100) sendmmsg(r1, &(0x7f00000002c0), 0x40000000000009f, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000040), 0x81, r0}, 0x38) r11 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f00000007c0), r11) 1.010673909s ago: executing program 4 (id=81): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/dev_mcast\x00') preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000140)=""/112, 0x70}], 0x1, 0x2, 0x3ff) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/1, 0x1}], 0x1, 0x42, 0x101) r1 = socket(0x15, 0x5, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, 0x0, 0x0) getsockopt(r1, 0x200000000114, 0x2721, &(0x7f0000c35fff)=""/1, &(0x7f0000000000)=0xf002) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) fgetxattr(r2, &(0x7f0000000300)=@known='security.selinux\x00', &(0x7f0000000340)=""/190, 0xbe) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0202000311000000000000000000000005000500000000000a00000000000000fe8000000000000000000000000000bb000000000000000002000100000007000000000b000000000200090000000000000000000000000005000600000000000a00000000000000fe8800000000000000000000000000010000000000000000010018"], 0x88}}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f00000000c0)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r3, @ANYRES32=r1], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000001280)='kmem_cache_free\x00', r4}, 0x18) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000d00850000008600000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r7}, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000680)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r8}, 0x10) r9 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet(r9, &(0x7f0000001340)=[{{&(0x7f0000000a80)={0x2, 0x4e23, @local}, 0x10, 0x0, 0x0, &(0x7f00000015c0)=ANY=[@ANYBLOB='$\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a'], 0x28}}], 0x1, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r6}, 0x10) fsetxattr$trusted_overlay_origin(r6, &(0x7f0000000100), &(0x7f0000000240), 0x2, 0x1) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000000)={0x3, &(0x7f0000000080)=[{0x7, 0x1, 0x1c, 0x40}, {0x83b5, 0x0, 0x7}, {0x0, 0x4}]}) lremovexattr(0x0, 0x0) 884.773809ms ago: executing program 1 (id=82): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000940)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010328bd7000fedbdf251c0000000c00018008000100", @ANYRES32=r3], 0x20}}, 0x4050) (fail_nth: 2) 663.885039ms ago: executing program 1 (id=83): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='attr\x00') getdents(r1, &(0x7f0000000480)=""/4089, 0xff9) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @synproxy={{0xd}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_SYNPROXY_WSCALE={0x5, 0x2, 0x9}, @NFTA_SYNPROXY_FLAGS={0x8, 0x3, 0x1, 0x0, 0x17}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x161042, 0x0) ioctl$PPPIOCNEWUNIT(r3, 0xc004743e, &(0x7f0000000140)) ioctl$PPPIOCSPASS(r3, 0x40107447, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x1, 0x8a, 0xe7c9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0, @void, @value, @void, @value}, 0x48) unshare(0x44040200) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f0000000080)='kmem_cache_free\x00', r4}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000580)=@qipcrtr={0x2a, 0x1, 0x7fff}, 0x80, 0x0}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x14) getdents64(r1, &(0x7f0000000340)=""/38, 0x26) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000001200)={&(0x7f00000004c0)={0x38, 0x1403, 0x1, 0x70bd2d, 0x0, "", [{{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'lo\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x854}, 0x0) 566.61426ms ago: executing program 2 (id=84): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000380)='fscache_access_volume\x00', r0}, 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000940)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010328bd7000fedbdf251c0000000c00018008000100", @ANYRES32=r3], 0x20}}, 0x4050) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000600)='kfree\x00', r7, 0x0, 0xffffffffffffffff}, 0x18) r8 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000003c0), 0x1, 0x0) write$binfmt_elf64(r8, &(0x7f0000000ec0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x2, 0x72, 0x6, 0x5, 0x0, 0x3, 0x7850, 0x236, 0x40, 0x2bf, 0xe, 0x1ff, 0x38, 0x1, 0x3, 0x9, 0x7a}, [{0x2, 0xa0, 0x0, 0x0, 0x0, 0x9, 0xfff, 0xfffffffffffffffa}]}, 0x78) connect$llc(r8, &(0x7f00000003c0)={0x1a, 0x20, 0x1, 0x8, 0x4, 0x3, @multicast}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000580)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) setsockopt$EBT_SO_SET_ENTRIES(r6, 0x0, 0x80, &(0x7f0000000300)=@broute={'broute\x00', 0x20, 0x0, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000040], 0x0, 0x0, &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}]}, 0x108) r9 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000001800), r5) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(r5, &(0x7f0000001900)={0x0, 0x0, &(0x7f00000018c0)={&(0x7f0000001840)={0x14, r9, 0x1, 0x70bd26, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x4010) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r4, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, r9, 0x400, 0x70bd25, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast2}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x40) 388.15718ms ago: executing program 2 (id=85): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffdfc, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a09000000000000000000020000000900020073797a310000000008000440000000000900010073797a3000000000080003400000000114000000110001"], 0x64}}, 0x0) 346.184529ms ago: executing program 3 (id=86): r0 = socket$kcm(0xa, 0x2, 0x3a) sendmsg$kcm(r0, &(0x7f0000000440)={&(0x7f0000000800)=@in6={0xa, 0x0, 0x0, @loopback={0xff00000000000000}}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000780)="80005b020eaa", 0x6}], 0x1, 0x0, 0x0, 0x900}, 0x0) 294.00745ms ago: executing program 3 (id=87): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffdfc, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a09000000000000000000020000000900020073797a310000000008000440000000000900010073797a3000000000080003400000000114000000110001"], 0x64}}, 0x0) 235.53407ms ago: executing program 3 (id=88): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000300)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000440)='kmem_cache_free\x00', r1}, 0x10) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x11000) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="050000000e0000004000000003"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100000220702500000000202020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000280)='rpc_xdr_alignment\x00', r3, 0x0, 0x1}, 0x18) socket$nl_route(0x10, 0x3, 0x0) r6 = socket$kcm(0xa, 0x2, 0x3a) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x44000) sendmsg$kcm(r6, &(0x7f0000000440)={&(0x7f0000000800)=@in6={0xa, 0x0, 0x0, @loopback={0xff00000000000000}}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000780)="80005b020eaa4da2", 0xfdef}], 0x1, 0x0, 0x0, 0x900}, 0x0) 188.72124ms ago: executing program 0 (id=89): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000400)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) syz_open_dev$evdev(&(0x7f0000000000), 0x3, 0x6800) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r2, @ANYBLOB], &(0x7f0000000340)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f00000002c0)=[{0x0}], 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000005c00)={&(0x7f0000000000)=@newtaction={0xa0, 0x30, 0x9, 0x0, 0x0, {}, [{0x8c, 0x1, [@m_bpf={0x88, 0x1, 0x0, 0x0, {{0x8}, {0x60, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x7}, @TCA_ACT_BPF_OPS={0x3c, 0x4, [{}, {}, {0x3, 0x0, 0x0, 0x1000000}, {}, {}, {}, {0x6}]}, @TCA_ACT_BPF_PARMS={0x18}]}, {}, {0xc}, {0xc}}}]}]}, 0xa0}}, 0x0) recvfrom$inet(r0, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x720, 0x0, 0xfffffffffffffd25) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000300)='./file0\x00', 0x21081e, &(0x7f0000000640)={[{@grpquota}, {@nodiscard}, {@delalloc}, {@jqfmt_vfsv0}, {@journal_path={'journal_path', 0x3d, './file1'}}], [{@subj_role={'subj_role', 0x3d, '$:7^^'}}, {@smackfshat={'smackfshat', 0x3d, '\xac-\')\\'}}, {@uid_gt}, {@seclabel}, {@smackfsdef={'smackfsdef', 0x3d, 'bpf\x00'}}, {@dont_hash}, {@pcr={'pcr', 0x3d, 0x2e}}]}, 0x1, 0x50c, &(0x7f0000001000)="$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") 174.20891ms ago: executing program 2 (id=90): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000f1ffffff0000000000100000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) r1 = socket(0x2b, 0x80801, 0x1) getpeername$packet(r1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000180)={0x0, 0x3b, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a58000000160a03020002000000000000020000000900020073797a30000000000900010073797a30000000002c00038008000140000000000800024000000000180003801400010073797a5f74756e00000000000000000014000000110001"], 0x80}}, 0x0) syz_emit_ethernet(0x46, &(0x7f00000002c0)=ANY=[@ANYBLOB="000000000000aaaaaaaaaa2a81004800080045ae00340065000049ff0000000000000000000000000000000200004e2100004e22000000044000000400"/70], 0x0) syz_emit_ethernet(0x32, &(0x7f0000000440)=ANY=[@ANYBLOB="e90c610f2ca20180c20000000800450000240000e0000011907800000000000000000000000000109078a10109cf88f00000"], 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="1004000004000000040000000200000000000000315bf51102006bfff8d70c710600000000000000f5da08ae4b320efcbced55e6a81d65a0cbb210faaac19dda0883f67b2ff610244c04e11be306bcaeea9d61b4b31f2d6ec6ac1f95458477d94e78341f240b999b33464407c55c7ce59d6d96ce95af2858f700d2d1ac9f43cd65f13a1107545d1a5426b283", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r3}, &(0x7f0000000a00), 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='netfs_failure\x00', 0xffffffffffffffff, 0x0, 0xfffffffffffffffa}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000840)={{r4}, 0x0, &(0x7f0000000800)=r5}, 0x20) syz_emit_ethernet(0xbe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0xd, 0xd, &(0x7f0000000880)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYBLOB="bfa41cb6962dbf723c737ada98d90c9c5b04551e9c54942ca71d866e3702ae9bde9e3eff90d683e3145d5cb58899a2369e2524c01fa0fe55340d9fab325a34a3aa2500b50bba308235f1482d2ea34b973140c5fff6085ad1ac06c2028efed59483cda3509cf46b6cc4680a8bd829450d6475eee57bc7db81a22fb374bafbfda1830f507a6e1f8676b3a63362e2c8631232aeb608f6bc0935d9875cda", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) pipe(&(0x7f0000000340)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r7, 0x29, 0x1b, &(0x7f0000000380)={@ipv4={'\x00', '\xff\xff', @multicast1}, 0x8, 0x0, 0x3, 0x0, 0x0, 0xfffe}, 0x20) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r9 = openat$cgroup_devices(r8, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r9, &(0x7f0000000140)=ANY=[@ANYBLOB='b *:4\tw'], 0xa) 164.78538ms ago: executing program 1 (id=91): modify_ldt$write2(0x11, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) socket$nl_route(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x2, 0x800800000003}, 0x1100, 0x5dd8, 0x3, 0x5, 0x0, 0x8, 0xff7b, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000001340)=@newtaction={0x488, 0x30, 0x12f, 0x0, 0x0, {}, [{0x474, 0x1, [@m_police={0x470, 0x1, 0x0, 0x0, {{0xb}, {0x444, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x80, 0x6, 0x0, 0x0, 0x1, 0x0, 0xffff, 0x0, 0x1, 0x10000, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc74, 0x0, 0xffffffff, 0x10, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffb5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, {0x7, 0x0, 0xba6f, 0x0, 0x0, 0x7}}}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa, {0x1}}}}]}]}, 0x488}}, 0x0) 93.90869ms ago: executing program 4 (id=92): syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file1\x00', 0x50, &(0x7f0000000280)={[{@jqfmt_vfsv1}, {@stripe={'stripe', 0x3d, 0x4}}, {@dioread_nolock}, {@mblk_io_submit}, {@nogrpid}, {@nogrpid}]}, 0x1, 0x3ed, &(0x7f0000001240)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x42, 0x0) pwritev2(r1, &(0x7f00000000c0)=[{&(0x7f0000000200)="df", 0xf4240}], 0x1, 0x800001, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = socket(0x400000000010, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r5, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r6 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r7, {0x0, 0x1}, {0xffff, 0x9}, {0x8, 0x9}}, [@qdisc_kind_options=@q_bfifo={{0xa}, {0x8, 0x2, 0xf}}]}, 0x38}}, 0x8040) sendmsg$nl_route_sched(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000400)=@newtfilter={0x3c, 0x2c, 0xd27, 0x30bd29, 0x25dfdbfc, {0x0, 0x0, 0x0, r7, {0x0, 0x8}, {}, {0xf, 0xd}}, [@filter_kind_options=@f_flower={{0xb}, {0xc, 0x2, [@TCA_FLOWER_KEY_ETH_TYPE={0x6, 0x8, 0x8035}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10}, 0x20084084) r8 = memfd_create(&(0x7f0000000340)='y\x105\xfb\xf7u\x83%:r\xc2\xb9x\xa4q\xc1\xea_\x8cZ7\xe7a\xdenJ\xeb\x87\x9b\x11x\x0e\xa1\xcf\x1a\x98S7\xc9\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x04\x879\xa24\xa9am\xde\xb2\xd3\xcbZJoa\xc4\x1acB\xaa\xc1\xfb Q\xd4\xf4\x01\xa52\xe2DG\xd4\xbd{\x9f\xa9\x97\x9b@\xdb\x00b\xe1br\xb6\x008\xe3\x10\xff\xc2\x9d\r2\x9e\x8e\x04sW\x1b\xb7\xb3\xa2\xc9&@\xca\xda\xdc\xe2/\x97X\xac\b\xb0\xc2<\x80E\x1a\xbc\xc7W\xda9VsA\xaf\xc6\xcf\xe1\xa1\xb5M\xa2\x85\xa6y\xc4J\xf1\xf7\xfcD\x95\xe3\xeb\xc7\xbc\x91\xb0\xa8\x9eo\xebF(\x9dL\x01vRk\xaacB\x04\xa7I\v\x86EZ\x96\xd5\x14OD\\\xe8R\xe4\xcd\xec\xcc\xd1\x0fre\xe86\xcd\xeb\xc4$\x98\x06J\xd6dD\x8d_U`ji{\xab\x97\xaf;l\x1f\xaf\xb38U\xcb\xfa\xb3j\x92\f\xe0\x81\xa0\xa2-g\b\x99\x0e\x8d\x8d\x16\xd9w\\\xf0\xce\xb0j\x9d\'\x93\xef\x1d\xa0H\xd9\xbd\xd9\xaf\x12', 0x2) ftruncate(r8, 0xffff) fcntl$addseals(r8, 0x409, 0xf) sendfile(r8, r8, 0x0, 0x27fff) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r9}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='io.stat\x00', 0x7a05, 0x1700) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r10, &(0x7f0000000540), 0x84) mmap$IORING_OFF_SQ_RING(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x12, r10, 0x0) perf_event_open(&(0x7f00000004c0)={0x8, 0x80, 0x0, 0xc, 0x0, 0x0, 0x82, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080), 0x9}, 0x18204, 0x0, 0x3, 0x0, 0x0, 0x5338c7af, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x1e, 0x12, r11, 0x0) r12 = fsmount(r1, 0x1, 0x4) ioctl$AUTOFS_IOC_PROTOVER(r12, 0x80049363, &(0x7f0000000180)) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40305829, &(0x7f0000000080)={0x17c04, r0, 0x10001, 0x1000ffffe, 0x0, 0x800}) 75.10793ms ago: executing program 2 (id=93): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0xe, 0x4, 0x8, 0xb, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='attr\x00') getdents(r1, &(0x7f0000000480)=""/4089, 0xff9) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)={{0x14}, [@NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @synproxy={{0xd}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_SYNPROXY_WSCALE={0x5, 0x2, 0x9}, @NFTA_SYNPROXY_FLAGS={0x8, 0x3, 0x1, 0x0, 0x17}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x80}}, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x161042, 0x0) ioctl$PPPIOCNEWUNIT(r3, 0xc004743e, &(0x7f0000000140)) ioctl$PPPIOCSPASS(r3, 0x40107447, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x1, 0x8a, 0xe7c9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0, @void, @value, @void, @value}, 0x48) unshare(0x44040200) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f0000000080)='kmem_cache_free\x00', r4}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000580)=@qipcrtr={0x2a, 0x1, 0x7fff}, 0x80, 0x0}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x14) getdents64(r1, &(0x7f0000000340)=""/38, 0x26) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000001200)={&(0x7f00000004c0)={0x38, 0x1403, 0x1, 0x70bd2d, 0x0, "", [{{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'lo\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x854}, 0x0) 0s ago: executing program 1 (id=94): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\n\x00'/20, @ANYRES32, @ANYBLOB='\x00'/16, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'/28], 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0xffff0000, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0, 0xffff0000}, 0x48) kernel console output (not intermixed with test programs): [ 21.093514][ T29] audit: type=1400 audit(1741239257.277:81): avc: denied { read } for pid=2982 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Warning: Permanently added '10.128.1.96' (ED25519) to the list of known hosts. [ 26.520411][ T29] audit: type=1400 audit(1741239262.707:82): avc: denied { mounton } for pid=3287 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.521324][ T3287] cgroup: Unknown subsys name 'net' [ 26.543124][ T29] audit: type=1400 audit(1741239262.707:83): avc: denied { mount } for pid=3287 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.570508][ T29] audit: type=1400 audit(1741239262.737:84): avc: denied { unmount } for pid=3287 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.688466][ T3287] cgroup: Unknown subsys name 'cpuset' [ 26.694580][ T3287] cgroup: Unknown subsys name 'rlimit' [ 26.805001][ T29] audit: type=1400 audit(1741239262.987:85): avc: denied { setattr } for pid=3287 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.828344][ T29] audit: type=1400 audit(1741239262.987:86): avc: denied { create } for pid=3287 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.848862][ T29] audit: type=1400 audit(1741239262.987:87): avc: denied { write } for pid=3287 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.869344][ T29] audit: type=1400 audit(1741239262.987:88): avc: denied { read } for pid=3287 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.876349][ T3291] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 26.889658][ T29] audit: type=1400 audit(1741239262.987:89): avc: denied { mounton } for pid=3287 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.923018][ T29] audit: type=1400 audit(1741239262.987:90): avc: denied { mount } for pid=3287 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 26.946306][ T29] audit: type=1400 audit(1741239263.087:91): avc: denied { relabelto } for pid=3291 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.975441][ T3287] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 28.184772][ T3299] chnl_net:caif_netlink_parms(): no params data found [ 28.206975][ T3300] chnl_net:caif_netlink_parms(): no params data found [ 28.244425][ T3305] chnl_net:caif_netlink_parms(): no params data found [ 28.260448][ T3297] chnl_net:caif_netlink_parms(): no params data found [ 28.297962][ T3307] chnl_net:caif_netlink_parms(): no params data found [ 28.323264][ T3299] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.330377][ T3299] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.337495][ T3299] bridge_slave_0: entered allmulticast mode [ 28.343835][ T3299] bridge_slave_0: entered promiscuous mode [ 28.361263][ T3299] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.368387][ T3299] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.375481][ T3299] bridge_slave_1: entered allmulticast mode [ 28.381885][ T3299] bridge_slave_1: entered promiscuous mode [ 28.432052][ T3297] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.439219][ T3297] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.447214][ T3297] bridge_slave_0: entered allmulticast mode [ 28.453590][ T3297] bridge_slave_0: entered promiscuous mode [ 28.459909][ T3300] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.466959][ T3300] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.474224][ T3300] bridge_slave_0: entered allmulticast mode [ 28.480649][ T3300] bridge_slave_0: entered promiscuous mode [ 28.489383][ T3305] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.496440][ T3305] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.503692][ T3305] bridge_slave_0: entered allmulticast mode [ 28.510153][ T3305] bridge_slave_0: entered promiscuous mode [ 28.517536][ T3299] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.526608][ T3305] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.533676][ T3305] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.540767][ T3305] bridge_slave_1: entered allmulticast mode [ 28.547138][ T3305] bridge_slave_1: entered promiscuous mode [ 28.553518][ T3297] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.560665][ T3297] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.567794][ T3297] bridge_slave_1: entered allmulticast mode [ 28.574291][ T3297] bridge_slave_1: entered promiscuous mode [ 28.580496][ T3300] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.587568][ T3300] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.594664][ T3300] bridge_slave_1: entered allmulticast mode [ 28.600977][ T3300] bridge_slave_1: entered promiscuous mode [ 28.610040][ T3299] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.651127][ T3305] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.665787][ T3297] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.684541][ T3307] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.691632][ T3307] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.698747][ T3307] bridge_slave_0: entered allmulticast mode [ 28.704997][ T3307] bridge_slave_0: entered promiscuous mode [ 28.712504][ T3305] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.721694][ T3307] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.728792][ T3307] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.735979][ T3307] bridge_slave_1: entered allmulticast mode [ 28.742567][ T3307] bridge_slave_1: entered promiscuous mode [ 28.749480][ T3299] team0: Port device team_slave_0 added [ 28.756259][ T3297] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.766295][ T3300] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.776476][ T3300] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.795533][ T3299] team0: Port device team_slave_1 added [ 28.834022][ T3305] team0: Port device team_slave_0 added [ 28.840827][ T3307] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.855044][ T3297] team0: Port device team_slave_0 added [ 28.861597][ T3300] team0: Port device team_slave_0 added [ 28.868707][ T3305] team0: Port device team_slave_1 added [ 28.875329][ T3307] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.884718][ T3299] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.891796][ T3299] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.917739][ T3299] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.929348][ T3297] team0: Port device team_slave_1 added [ 28.935672][ T3300] team0: Port device team_slave_1 added [ 28.955533][ T3299] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 28.962588][ T3299] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.988551][ T3299] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.024297][ T3300] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.031303][ T3300] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.057250][ T3300] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.068285][ T3305] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.075218][ T3305] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.101135][ T3305] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.112611][ T3307] team0: Port device team_slave_0 added [ 29.119895][ T3307] team0: Port device team_slave_1 added [ 29.131323][ T3297] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.138305][ T3297] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.164298][ T3297] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.175422][ T3300] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.182527][ T3300] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.208451][ T3300] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.219439][ T3305] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.226467][ T3305] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.252520][ T3305] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.283474][ T3297] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.290468][ T3297] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.316545][ T3297] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.334417][ T3299] hsr_slave_0: entered promiscuous mode [ 29.340559][ T3299] hsr_slave_1: entered promiscuous mode [ 29.346717][ T3307] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.353710][ T3307] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.379745][ T3307] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.393013][ T3307] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.400049][ T3307] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.425982][ T3307] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.451387][ T3300] hsr_slave_0: entered promiscuous mode [ 29.457488][ T3300] hsr_slave_1: entered promiscuous mode [ 29.463295][ T3300] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.470870][ T3300] Cannot create hsr debugfs directory [ 29.491408][ T3305] hsr_slave_0: entered promiscuous mode [ 29.497294][ T3305] hsr_slave_1: entered promiscuous mode [ 29.503200][ T3305] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.511071][ T3305] Cannot create hsr debugfs directory [ 29.561347][ T3297] hsr_slave_0: entered promiscuous mode [ 29.567333][ T3297] hsr_slave_1: entered promiscuous mode [ 29.573200][ T3297] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.580823][ T3297] Cannot create hsr debugfs directory [ 29.607477][ T3307] hsr_slave_0: entered promiscuous mode [ 29.613529][ T3307] hsr_slave_1: entered promiscuous mode [ 29.619502][ T3307] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.627053][ T3307] Cannot create hsr debugfs directory [ 29.787861][ T3299] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 29.796723][ T3299] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 29.809640][ T3299] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 29.820491][ T3299] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 29.836886][ T3300] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 29.850908][ T3300] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 29.874253][ T3300] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 29.888060][ T3305] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 29.899276][ T3305] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 29.908122][ T3300] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 29.922773][ T3305] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 29.931514][ T3305] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 29.958971][ T3297] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 29.968206][ T3297] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 29.983493][ T3297] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 30.001423][ T3297] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 30.016395][ T3299] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.025933][ T3307] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 30.052847][ T3299] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.060956][ T3307] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 30.070198][ T3307] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 30.079754][ T3307] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 30.095293][ T3300] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.109719][ T166] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.116925][ T166] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.127273][ T2079] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.134345][ T2079] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.161953][ T3300] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.176139][ T166] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.183241][ T166] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.205799][ T166] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.213013][ T166] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.257292][ T3305] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.273546][ T3297] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.291313][ T3305] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.303608][ T58] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.310799][ T58] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.321094][ T3297] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.335824][ T3300] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 30.351009][ T166] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.358120][ T166] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.370738][ T166] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.377982][ T166] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.392673][ T3307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.409706][ T3305] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 30.420116][ T3305] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 30.451059][ T166] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.458123][ T166] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.474314][ T3307] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.485366][ T166] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.492490][ T166] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.512064][ T3299] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.527618][ T3305] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.538546][ T166] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.545680][ T166] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.577834][ T3300] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.683563][ T3307] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.704717][ T3305] veth0_vlan: entered promiscuous mode [ 30.719921][ T3300] veth0_vlan: entered promiscuous mode [ 30.730444][ T3305] veth1_vlan: entered promiscuous mode [ 30.736716][ T3299] veth0_vlan: entered promiscuous mode [ 30.746800][ T3300] veth1_vlan: entered promiscuous mode [ 30.761965][ T3299] veth1_vlan: entered promiscuous mode [ 30.774904][ T3297] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.790419][ T3300] veth0_macvtap: entered promiscuous mode [ 30.801060][ T3305] veth0_macvtap: entered promiscuous mode [ 30.810219][ T3300] veth1_macvtap: entered promiscuous mode [ 30.833480][ T3299] veth0_macvtap: entered promiscuous mode [ 30.841808][ T3305] veth1_macvtap: entered promiscuous mode [ 30.857537][ T3305] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.874315][ T3300] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.884824][ T3300] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.895753][ T3300] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.906884][ T3299] veth1_macvtap: entered promiscuous mode [ 30.914605][ T3305] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.924287][ T3300] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 30.934846][ T3300] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.946017][ T3300] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.962949][ T3299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.973506][ T3299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 30.983348][ T3299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 30.993868][ T3299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.004560][ T3299] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.012238][ T3300] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.021001][ T3300] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.029786][ T3300] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.038753][ T3300] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.049569][ T3305] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.058338][ T3305] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.067047][ T3305] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.075854][ T3305] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.091112][ T3297] veth0_vlan: entered promiscuous mode [ 31.102777][ T3299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.113380][ T3299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.123220][ T3299] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.133683][ T3299] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.144642][ T3299] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.153132][ T3299] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.161918][ T3299] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.170698][ T3299] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.179444][ T3299] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.194420][ T3297] veth1_vlan: entered promiscuous mode [ 31.214731][ T3307] veth0_vlan: entered promiscuous mode [ 31.246633][ T3307] veth1_vlan: entered promiscuous mode [ 31.259041][ T3300] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 31.273579][ T3297] veth0_macvtap: entered promiscuous mode [ 31.281577][ T3297] veth1_macvtap: entered promiscuous mode [ 31.311385][ T3297] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.321987][ T3297] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.331839][ T3297] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.342380][ T3297] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.352327][ T3297] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.362889][ T3297] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.377019][ T3297] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.392799][ T3307] veth0_macvtap: entered promiscuous mode [ 31.401148][ T3307] veth1_macvtap: entered promiscuous mode [ 31.411300][ T3307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.421777][ T3307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.431821][ T3307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.442293][ T3307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.452465][ T3307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.463014][ T3307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.472952][ T3307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.483430][ T3307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.498128][ T3307] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.526961][ T3297] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.537711][ T3297] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.547694][ T3297] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.558227][ T3297] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.568043][ T3297] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.577406][ T29] kauditd_printk_skb: 54 callbacks suppressed [ 31.577420][ T29] audit: type=1400 audit(1741239267.707:146): avc: denied { ioctl } for pid=3453 comm="syz.2.8" path="socket:[3731]" dev="sockfs" ino=3731 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 31.578516][ T3297] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.620792][ T3297] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.629494][ T3307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.639983][ T3307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.649805][ T3307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.660379][ T3307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.670208][ T3307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.680755][ T3307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.690581][ T3307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.701033][ T3307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.712637][ T3307] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.725418][ T3457] loop0: detected capacity change from 0 to 2048 [ 31.733449][ T3453] syz.2.8 (3453) used greatest stack depth: 10736 bytes left [ 31.743387][ T3297] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.752207][ T3297] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.761012][ T3297] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.769849][ T3297] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.786341][ T29] audit: type=1400 audit(1741239267.967:147): avc: denied { create } for pid=3458 comm="syz.2.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 31.805806][ T29] audit: type=1400 audit(1741239267.967:148): avc: denied { setopt } for pid=3458 comm="syz.2.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 31.828142][ T3307] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.837043][ T3307] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.845894][ T3307] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.854669][ T3307] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.867252][ T29] audit: type=1400 audit(1741239268.047:149): avc: denied { read } for pid=3464 comm="syz.2.11" dev="nsfs" ino=4026532561 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 31.867851][ T3457] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 31.888363][ T29] audit: type=1400 audit(1741239268.047:150): avc: denied { open } for pid=3464 comm="syz.2.11" path="net:[4026532561]" dev="nsfs" ino=4026532561 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 31.934799][ T29] audit: type=1400 audit(1741239268.047:151): avc: denied { create } for pid=3464 comm="syz.2.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 31.946051][ T3457] EXT4-fs error (device loop0): ext4_find_extent:938: inode #2: comm syz.0.9: pblk 1 bad header/extent: invalid magic - magic 2, entries 0, max 3(0), depth 0(4) [ 31.955221][ T29] audit: type=1400 audit(1741239268.117:152): avc: denied { mount } for pid=3455 comm="syz.0.9" name="/" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 31.996816][ T3470] netlink: 4 bytes leftover after parsing attributes in process `syz.2.11'. [ 32.007285][ T3457] EXT4-fs (loop0): Remounting filesystem read-only [ 32.009034][ T29] audit: type=1400 audit(1741239268.197:153): avc: denied { create } for pid=3455 comm="syz.0.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 32.034577][ T29] audit: type=1400 audit(1741239268.197:154): avc: denied { create } for pid=3455 comm="syz.0.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 32.040142][ T3470] team0 (unregistering): Port device team_slave_0 removed [ 32.054596][ T29] audit: type=1400 audit(1741239268.197:155): avc: denied { view } for pid=3455 comm="syz.0.9" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 32.060346][ T3466] 9pnet_fd: Insufficient options for proto=fd [ 32.088255][ T3470] team0 (unregistering): Port device team_slave_1 removed [ 32.348949][ T3485] capability: warning: `syz.4.5' uses deprecated v2 capabilities in a way that may be insecure [ 32.383548][ T3485] program syz.4.5 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 32.414070][ T3487] syz.1.15 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 32.424872][ C1] hrtimer: interrupt took 37854 ns [ 32.445136][ T3299] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 32.495593][ T3489] netlink: 4 bytes leftover after parsing attributes in process `syz.0.16'. [ 32.647588][ T3491] lo speed is unknown, defaulting to 1000 [ 32.660220][ T3491] lo speed is unknown, defaulting to 1000 [ 32.673919][ T3491] lo speed is unknown, defaulting to 1000 [ 32.688234][ T3491] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 32.699033][ T3495] loop0: detected capacity change from 0 to 512 [ 32.706788][ T3495] journal_path: Lookup failure for './file1' [ 32.712857][ T3495] EXT4-fs: error: could not find journal device path [ 32.719849][ T3491] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 32.750498][ T3491] lo speed is unknown, defaulting to 1000 [ 32.760918][ T3491] lo speed is unknown, defaulting to 1000 [ 32.766966][ T3491] lo speed is unknown, defaulting to 1000 [ 32.774858][ T3491] lo speed is unknown, defaulting to 1000 [ 32.781965][ T3491] lo speed is unknown, defaulting to 1000 [ 32.789431][ T3491] lo speed is unknown, defaulting to 1000 [ 33.050288][ T3500] SELinux: unknown common r [ 33.065578][ T3500] SELinux: failed to load policy [ 33.222652][ T3508] netlink: 4 bytes leftover after parsing attributes in process `syz.4.23'. [ 33.262868][ T3513] hsr_slave_0: left promiscuous mode [ 33.270292][ T3513] hsr_slave_1: left promiscuous mode [ 33.320307][ T3516] hub 1-0:1.0: USB hub found [ 33.325119][ T3516] hub 1-0:1.0: 8 ports detected [ 33.359912][ T3520] netlink: 4 bytes leftover after parsing attributes in process `syz.4.27'. [ 33.401911][ T3524] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 33.411981][ T3524] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 33.492377][ T3530] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(4) [ 33.498912][ T3534] SET target dimension over the limit! [ 33.499046][ T3530] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 33.512049][ T3530] vhci_hcd vhci_hcd.0: Device attached [ 33.548740][ T3536] loop4: detected capacity change from 0 to 128 [ 33.555704][ T3531] vhci_hcd: connection closed [ 33.555838][ T11] vhci_hcd: stop threads [ 33.564845][ T11] vhci_hcd: release socket [ 33.569315][ T11] vhci_hcd: disconnect device [ 33.582837][ T3536] netlink: 'syz.4.34': attribute type 11 has an invalid length. [ 33.632769][ T3539] FAULT_INJECTION: forcing a failure. [ 33.632769][ T3539] name failslab, interval 1, probability 0, space 0, times 1 [ 33.645473][ T3539] CPU: 0 UID: 0 PID: 3539 Comm: syz.4.35 Not tainted 6.14.0-rc5-syzkaller-00023-gbb2281fb05e5 #0 [ 33.645500][ T3539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 33.645513][ T3539] Call Trace: [ 33.645523][ T3539] [ 33.645529][ T3539] dump_stack_lvl+0xf2/0x150 [ 33.645553][ T3539] dump_stack+0x15/0x1a [ 33.645571][ T3539] should_fail_ex+0x24a/0x260 [ 33.645597][ T3539] should_failslab+0x8f/0xb0 [ 33.645621][ T3539] kmem_cache_alloc_noprof+0x52/0x320 [ 33.645639][ T3539] ? vm_area_dup+0x98/0x130 [ 33.645668][ T3539] vm_area_dup+0x98/0x130 [ 33.645687][ T3539] __split_vma+0xf7/0x6a0 [ 33.645709][ T3539] vms_gather_munmap_vmas+0x2a5/0x7a0 [ 33.645743][ T3539] mmap_region+0x464/0x1620 [ 33.645759][ T3539] ? __rcu_read_unlock+0x4e/0x70 [ 33.645797][ T3539] do_mmap+0x98a/0xc30 [ 33.645824][ T3539] vm_mmap_pgoff+0x16d/0x2d0 [ 33.645853][ T3539] ksys_mmap_pgoff+0x286/0x330 [ 33.645891][ T3539] x64_sys_call+0x1940/0x2dc0 [ 33.645915][ T3539] do_syscall_64+0xc9/0x1c0 [ 33.645941][ T3539] ? clear_bhb_loop+0x55/0xb0 [ 33.645964][ T3539] ? clear_bhb_loop+0x55/0xb0 [ 33.645986][ T3539] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 33.646008][ T3539] RIP: 0033:0x7fe23d94d169 [ 33.646023][ T3539] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 33.646037][ T3539] RSP: 002b:00007fe23bfb1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 33.646052][ T3539] RAX: ffffffffffffffda RBX: 00007fe23db65fa0 RCX: 00007fe23d94d169 [ 33.646062][ T3539] RDX: 0000000003000003 RSI: 0000000000003000 RDI: 0000400000000000 [ 33.646071][ T3539] RBP: 00007fe23bfb1090 R08: 0000000000000003 R09: 0000000000000000 [ 33.646092][ T3539] R10: 0000000000000013 R11: 0000000000000246 R12: 0000000000000001 [ 33.646101][ T3539] R13: 0000000000000000 R14: 00007fe23db65fa0 R15: 00007ffde42e4358 [ 33.646115][ T3539] [ 33.908144][ T3543] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 33.929328][ T3543] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 34.242619][ T3551] netlink: 24 bytes leftover after parsing attributes in process `+}[@'. [ 34.266369][ T3553] netlink: 4 bytes leftover after parsing attributes in process `syz.3.40'. [ 34.303422][ T3555] loop0: detected capacity change from 0 to 1024 [ 34.323064][ T3555] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 34.381986][ T3555] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(8) [ 34.388641][ T3555] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 34.396381][ T3555] vhci_hcd vhci_hcd.0: Device attached [ 34.403211][ T3555] SELinux: policydb version 0 does not match my version range 15-34 [ 34.411381][ T3555] SELinux: failed to load policy [ 34.426524][ T3572] loop4: detected capacity change from 0 to 512 [ 34.434159][ T3572] journal_path: Lookup failure for './file1' [ 34.440369][ T3572] EXT4-fs: error: could not find journal device path [ 34.449657][ T3569] vhci_hcd: connection closed [ 34.450353][ T58] vhci_hcd: stop threads [ 34.459337][ T58] vhci_hcd: release socket [ 34.463776][ T58] vhci_hcd: disconnect device [ 34.684301][ T3582] mmap: syz.1.50 (3582) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 34.753896][ T3587] FAULT_INJECTION: forcing a failure. [ 34.753896][ T3587] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 34.767045][ T3587] CPU: 0 UID: 0 PID: 3587 Comm: syz.3.52 Not tainted 6.14.0-rc5-syzkaller-00023-gbb2281fb05e5 #0 [ 34.767073][ T3587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 34.767085][ T3587] Call Trace: [ 34.767091][ T3587] [ 34.767097][ T3587] dump_stack_lvl+0xf2/0x150 [ 34.767122][ T3587] dump_stack+0x15/0x1a [ 34.767216][ T3587] should_fail_ex+0x24a/0x260 [ 34.767250][ T3587] should_fail+0xb/0x10 [ 34.767279][ T3587] should_fail_usercopy+0x1a/0x20 [ 34.767377][ T3587] _copy_from_user+0x1c/0xa0 [ 34.767397][ T3587] memdup_user+0x64/0xc0 [ 34.767499][ T3587] strndup_user+0x68/0xa0 [ 34.767606][ T3587] __se_sys_mount+0x4e/0x2d0 [ 34.767641][ T3587] ? fput+0x1c4/0x200 [ 34.767662][ T3587] ? ksys_write+0x176/0x1b0 [ 34.767690][ T3587] __x64_sys_mount+0x67/0x80 [ 34.767748][ T3587] x64_sys_call+0x2c84/0x2dc0 [ 34.767776][ T3587] do_syscall_64+0xc9/0x1c0 [ 34.767806][ T3587] ? clear_bhb_loop+0x55/0xb0 [ 34.767836][ T3587] ? clear_bhb_loop+0x55/0xb0 [ 34.767931][ T3587] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 34.767999][ T3587] RIP: 0033:0x7fa625c0d169 [ 34.768016][ T3587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 34.768035][ T3587] RSP: 002b:00007fa624277038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 34.768132][ T3587] RAX: ffffffffffffffda RBX: 00007fa625e25fa0 RCX: 00007fa625c0d169 [ 34.768146][ T3587] RDX: 0000400000000080 RSI: 0000400000000000 RDI: 0000000000000000 [ 34.768159][ T3587] RBP: 00007fa624277090 R08: 0000400000000240 R09: 0000000000000000 [ 34.768172][ T3587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 34.768183][ T3587] R13: 0000000000000000 R14: 00007fa625e25fa0 R15: 00007ffe39602ca8 [ 34.768198][ T3587] [ 34.784959][ T3588] netlink: 4 bytes leftover after parsing attributes in process `syz.2.53'. [ 34.832881][ T3592] netlink: 24 bytes leftover after parsing attributes in process `syz.3.55'. [ 34.876609][ T3594] loop3: detected capacity change from 0 to 2048 [ 34.909471][ T3590] FAULT_INJECTION: forcing a failure. [ 34.909471][ T3590] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 34.936970][ T3594] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 34.941692][ T3590] CPU: 1 UID: 0 PID: 3590 Comm: syz.1.54 Not tainted 6.14.0-rc5-syzkaller-00023-gbb2281fb05e5 #0 [ 34.941722][ T3590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 34.941739][ T3590] Call Trace: [ 34.941774][ T3590] [ 34.941784][ T3590] dump_stack_lvl+0xf2/0x150 [ 34.941851][ T3590] dump_stack+0x15/0x1a [ 34.941878][ T3590] should_fail_ex+0x24a/0x260 [ 34.941918][ T3590] should_fail+0xb/0x10 [ 34.941972][ T3590] should_fail_usercopy+0x1a/0x20 [ 34.942013][ T3590] strncpy_from_user+0x25/0x210 [ 34.942043][ T3590] ? __kmalloc_cache_noprof+0x186/0x320 [ 34.942103][ T3590] __se_sys_memfd_create+0x218/0x5a0 [ 34.942138][ T3590] __x64_sys_memfd_create+0x31/0x40 [ 34.942170][ T3590] x64_sys_call+0x2d4c/0x2dc0 [ 34.942203][ T3590] do_syscall_64+0xc9/0x1c0 [ 34.942292][ T3590] ? clear_bhb_loop+0x55/0xb0 [ 34.942326][ T3590] ? clear_bhb_loop+0x55/0xb0 [ 34.942361][ T3590] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 34.942396][ T3590] RIP: 0033:0x7fdd6aabd169 [ 34.942415][ T3590] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 34.942509][ T3590] RSP: 002b:00007fdd69126e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 34.942529][ T3590] RAX: ffffffffffffffda RBX: 000000000000052d RCX: 00007fdd6aabd169 [ 34.942544][ T3590] RDX: 00007fdd69126ef0 RSI: 0000000000000000 RDI: 00007fdd6ab3ec3c [ 34.942559][ T3590] RBP: 0000400000000640 R08: 00007fdd69126bb7 R09: 00007fdd69126e40 [ 34.942575][ T3590] R10: 000000000000000a R11: 0000000000000202 R12: 0000400000000000 [ 34.942590][ T3590] R13: 00007fdd69126ef0 R14: 00007fdd69126eb0 R15: 0000400000000080 [ 34.942613][ T3590] [ 35.182188][ T3594] ext4 filesystem being mounted at /14/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 35.207647][ T3299] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 35.227965][ T3604] 9p: Unknown access argument : -22 [ 35.271289][ T3305] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 35.366211][ T3620] Zero length message leads to an empty skb [ 35.409446][ T3624] FAULT_INJECTION: forcing a failure. [ 35.409446][ T3624] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 35.422580][ T3624] CPU: 1 UID: 0 PID: 3624 Comm: syz.1.65 Not tainted 6.14.0-rc5-syzkaller-00023-gbb2281fb05e5 #0 [ 35.422682][ T3624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 35.422705][ T3624] Call Trace: [ 35.422714][ T3624] [ 35.422722][ T3624] dump_stack_lvl+0xf2/0x150 [ 35.422756][ T3624] dump_stack+0x15/0x1a [ 35.422777][ T3624] should_fail_ex+0x24a/0x260 [ 35.422814][ T3624] should_fail+0xb/0x10 [ 35.422858][ T3624] should_fail_usercopy+0x1a/0x20 [ 35.422898][ T3624] strncpy_from_user+0x25/0x210 [ 35.422954][ T3624] ? kmem_cache_alloc_noprof+0x18e/0x320 [ 35.423014][ T3624] ? getname_flags+0x81/0x3b0 [ 35.423107][ T3624] getname_flags+0xb0/0x3b0 [ 35.423207][ T3624] getname+0x17/0x20 [ 35.423267][ T3624] do_sys_openat2+0x67/0x120 [ 35.423292][ T3624] __x64_sys_openat+0xf3/0x120 [ 35.423318][ T3624] x64_sys_call+0x2b30/0x2dc0 [ 35.423345][ T3624] do_syscall_64+0xc9/0x1c0 [ 35.423456][ T3624] ? clear_bhb_loop+0x55/0xb0 [ 35.423485][ T3624] ? clear_bhb_loop+0x55/0xb0 [ 35.423518][ T3624] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 35.423609][ T3624] RIP: 0033:0x7fdd6aabbad0 [ 35.423625][ T3624] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 35.423646][ T3624] RSP: 002b:00007fdd69126b70 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 35.423681][ T3624] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fdd6aabbad0 [ 35.423696][ T3624] RDX: 0000000000000000 RSI: 00007fdd69126c10 RDI: 00000000ffffff9c [ 35.423716][ T3624] RBP: 00007fdd69126c10 R08: 0000000000000000 R09: 0000000000000000 [ 35.423731][ T3624] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 35.423745][ T3624] R13: 0000000000000000 R14: 00007fdd6acd5fa0 R15: 00007fff3a235898 [ 35.423785][ T3624] [ 35.515317][ T3626] vhci_hcd: default hub control req: 600b v0010 i0005 l0 [ 35.659806][ T3630] netlink: 24 bytes leftover after parsing attributes in process `syz.2.66'. [ 35.689473][ T3629] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 35.758695][ T3639] netlink: 48 bytes leftover after parsing attributes in process `syz.3.71'. [ 35.850794][ T3647] netlink: 'syz.1.74': attribute type 4 has an invalid length. [ 35.902964][ T3651] FAULT_INJECTION: forcing a failure. [ 35.902964][ T3651] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 35.916323][ T3651] CPU: 1 UID: 0 PID: 3651 Comm: syz.3.76 Not tainted 6.14.0-rc5-syzkaller-00023-gbb2281fb05e5 #0 [ 35.916432][ T3651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 35.916446][ T3651] Call Trace: [ 35.916453][ T3651] [ 35.916461][ T3651] dump_stack_lvl+0xf2/0x150 [ 35.916493][ T3651] dump_stack+0x15/0x1a [ 35.916555][ T3651] should_fail_ex+0x24a/0x260 [ 35.916584][ T3651] should_fail+0xb/0x10 [ 35.916611][ T3651] should_fail_usercopy+0x1a/0x20 [ 35.916747][ T3651] _copy_from_iter+0xd5/0xd00 [ 35.916838][ T3651] ? kmalloc_reserve+0x16e/0x190 [ 35.916863][ T3651] ? __build_skb_around+0x196/0x1f0 [ 35.916886][ T3651] ? __alloc_skb+0x21f/0x310 [ 35.916997][ T3651] ? __virt_addr_valid+0x1ed/0x250 [ 35.917027][ T3651] ? __check_object_size+0x364/0x520 [ 35.917080][ T3651] netlink_sendmsg+0x460/0x6e0 [ 35.917115][ T3651] ? __pfx_netlink_sendmsg+0x10/0x10 [ 35.917154][ T3651] __sock_sendmsg+0x140/0x180 [ 35.917239][ T3651] ____sys_sendmsg+0x326/0x4b0 [ 35.917272][ T3651] __sys_sendmsg+0x19d/0x230 [ 35.917316][ T3651] __x64_sys_sendmsg+0x46/0x50 [ 35.917355][ T3651] x64_sys_call+0x2734/0x2dc0 [ 35.917385][ T3651] do_syscall_64+0xc9/0x1c0 [ 35.917495][ T3651] ? clear_bhb_loop+0x55/0xb0 [ 35.917527][ T3651] ? clear_bhb_loop+0x55/0xb0 [ 35.917609][ T3651] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 35.917638][ T3651] RIP: 0033:0x7fa625c0d169 [ 35.917655][ T3651] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 35.917674][ T3651] RSP: 002b:00007fa624277038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 35.917697][ T3651] RAX: ffffffffffffffda RBX: 00007fa625e25fa0 RCX: 00007fa625c0d169 [ 35.917765][ T3651] RDX: 0000000000000000 RSI: 0000400000000000 RDI: 0000000000000003 [ 35.917777][ T3651] RBP: 00007fa624277090 R08: 0000000000000000 R09: 0000000000000000 [ 35.917789][ T3651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 35.917863][ T3651] R13: 0000000000000000 R14: 00007fa625e25fa0 R15: 00007ffe39602ca8 [ 35.917886][ T3651] [ 36.532550][ T3714] FAULT_INJECTION: forcing a failure. [ 36.532550][ T3714] name failslab, interval 1, probability 0, space 0, times 0 [ 36.545442][ T3714] CPU: 1 UID: 0 PID: 3714 Comm: syz.1.82 Not tainted 6.14.0-rc5-syzkaller-00023-gbb2281fb05e5 #0 [ 36.545466][ T3714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 36.545478][ T3714] Call Trace: [ 36.545484][ T3714] [ 36.545500][ T3714] dump_stack_lvl+0xf2/0x150 [ 36.545525][ T3714] dump_stack+0x15/0x1a [ 36.545565][ T3714] should_fail_ex+0x24a/0x260 [ 36.545605][ T3714] should_failslab+0x8f/0xb0 [ 36.545639][ T3714] kmem_cache_alloc_node_noprof+0x59/0x320 [ 36.545666][ T3714] ? __alloc_skb+0x10b/0x310 [ 36.545690][ T3714] __alloc_skb+0x10b/0x310 [ 36.545731][ T3714] netlink_alloc_large_skb+0xad/0xe0 [ 36.545791][ T3714] netlink_sendmsg+0x3b4/0x6e0 [ 36.545826][ T3714] ? __pfx_netlink_sendmsg+0x10/0x10 [ 36.545873][ T3714] __sock_sendmsg+0x140/0x180 [ 36.545973][ T3714] ____sys_sendmsg+0x326/0x4b0 [ 36.546019][ T3714] __sys_sendmsg+0x19d/0x230 [ 36.546062][ T3714] __x64_sys_sendmsg+0x46/0x50 [ 36.546090][ T3714] x64_sys_call+0x2734/0x2dc0 [ 36.546144][ T3714] do_syscall_64+0xc9/0x1c0 [ 36.546178][ T3714] ? clear_bhb_loop+0x55/0xb0 [ 36.546220][ T3714] ? clear_bhb_loop+0x55/0xb0 [ 36.546249][ T3714] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 36.546305][ T3714] RIP: 0033:0x7fdd6aabd169 [ 36.546318][ T3714] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 36.546335][ T3714] RSP: 002b:00007fdd69127038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 36.546363][ T3714] RAX: ffffffffffffffda RBX: 00007fdd6acd5fa0 RCX: 00007fdd6aabd169 [ 36.546375][ T3714] RDX: 0000000000004050 RSI: 00004000000001c0 RDI: 0000000000000003 [ 36.546407][ T3714] RBP: 00007fdd69127090 R08: 0000000000000000 R09: 0000000000000000 [ 36.546420][ T3714] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 36.546432][ T3714] R13: 0000000000000000 R14: 00007fdd6acd5fa0 R15: 00007fff3a235898 [ 36.546491][ T3714] [ 36.747609][ T29] kauditd_printk_skb: 405 callbacks suppressed [ 36.747622][ T29] audit: type=1326 audit(1741239272.937:561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3657 comm="syz.3.78" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fa625c04127 code=0x7ffc0000 [ 36.781158][ T29] audit: type=1326 audit(1741239272.967:562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3657 comm="syz.3.78" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fa625ba9359 code=0x7ffc0000 [ 36.804401][ T29] audit: type=1326 audit(1741239272.967:563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3657 comm="syz.3.78" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fa625c04127 code=0x7ffc0000 [ 36.827544][ T29] audit: type=1326 audit(1741239272.967:564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3657 comm="syz.3.78" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fa625ba9359 code=0x7ffc0000 [ 36.851656][ T29] audit: type=1326 audit(1741239272.967:565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3657 comm="syz.3.78" exe="/root/syz-executor" sig=0 arch=c000003e syscall=299 compat=0 ip=0x7fa625c0d169 code=0x7ffc0000 [ 36.879336][ T29] audit: type=1326 audit(1741239272.997:566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3657 comm="syz.3.78" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fa625c04127 code=0x7ffc0000 [ 36.902764][ T29] audit: type=1326 audit(1741239272.997:567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3657 comm="syz.3.78" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fa625ba9359 code=0x7ffc0000 [ 36.926226][ T29] audit: type=1326 audit(1741239272.997:568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3657 comm="syz.3.78" exe="/root/syz-executor" sig=0 arch=c000003e syscall=299 compat=0 ip=0x7fa625c0d169 code=0x7ffc0000 [ 36.950115][ T29] audit: type=1326 audit(1741239272.997:569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3657 comm="syz.3.78" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fa625c04127 code=0x7ffc0000 [ 36.973223][ T29] audit: type=1326 audit(1741239272.997:570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3657 comm="syz.3.78" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fa625ba9359 code=0x7ffc0000 [ 37.041276][ T3726] lo speed is unknown, defaulting to 1000 [ 37.047079][ T3726] lo speed is unknown, defaulting to 1000 [ 37.067794][ T3736] __nla_validate_parse: 1 callbacks suppressed [ 37.067828][ T3736] netlink: 4 bytes leftover after parsing attributes in process `syz.2.85'. [ 37.083830][ T3726] lo speed is unknown, defaulting to 1000 [ 37.084661][ T3726] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 37.088008][ T3726] lo speed is unknown, defaulting to 1000 [ 37.088338][ T3726] lo speed is unknown, defaulting to 1000 [ 37.088556][ T3726] lo speed is unknown, defaulting to 1000 [ 37.088833][ T3726] lo speed is unknown, defaulting to 1000 [ 37.089155][ T3726] lo speed is unknown, defaulting to 1000 [ 37.089361][ T3726] lo speed is unknown, defaulting to 1000 [ 37.300674][ T3752] loop4: detected capacity change from 0 to 512 [ 37.312006][ T3752] ======================================================= [ 37.312006][ T3752] WARNING: The mand mount option has been deprecated and [ 37.312006][ T3752] and is ignored by this kernel. Remove the mand [ 37.312006][ T3752] option from the mount to silence this warning. [ 37.312006][ T3752] ======================================================= [ 37.354291][ T3752] EXT4-fs: Ignoring removed mblk_io_submit option [ 37.372634][ T3752] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 37.403444][ T3759] loop0: detected capacity change from 0 to 512 [ 37.411454][ T3759] journal_path: Lookup failure for './file1' [ 37.417658][ T3759] EXT4-fs: error: could not find journal device path [ 37.476321][ T3762] lo speed is unknown, defaulting to 1000 [ 37.512009][ T3752] ================================================================== [ 37.520149][ T3752] BUG: KCSAN: data-race in xas_clear_mark / xas_find_marked [ 37.527486][ T3752] [ 37.529821][ T3752] read-write to 0xffff8881067a3fe0 of 8 bytes by task 3763 on cpu 0: [ 37.537891][ T3752] xas_clear_mark+0x90/0x180 [ 37.542505][ T3752] __folio_start_writeback+0x2f1/0x430 [ 37.547990][ T3752] ext4_bio_write_folio+0x591/0x9d0 [ 37.553214][ T3752] mpage_process_page_bufs+0x486/0x5d0 [ 37.558710][ T3752] mpage_prepare_extent_to_map+0x788/0xb80 [ 37.564622][ T3752] ext4_do_writepages+0x6ea/0x2130 [ 37.569769][ T3752] ext4_writepages+0x159/0x2e0 [ 37.574557][ T3752] do_writepages+0x1d8/0x480 [ 37.579174][ T3752] filemap_write_and_wait_range+0x146/0x360 [ 37.585097][ T3752] ext4_punch_hole+0xbf/0x7e0 [ 37.589795][ T3752] ext4_fallocate+0x1f1/0x1170 [ 37.594573][ T3752] vfs_fallocate+0x368/0x3b0 [ 37.599177][ T3752] do_vfs_ioctl+0x1491/0x1590 [ 37.603864][ T3752] __se_sys_ioctl+0x80/0x140 [ 37.608465][ T3752] __x64_sys_ioctl+0x43/0x50 [ 37.613074][ T3752] x64_sys_call+0x1690/0x2dc0 [ 37.617778][ T3752] do_syscall_64+0xc9/0x1c0 [ 37.622314][ T3752] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 37.628229][ T3752] [ 37.630574][ T3752] read to 0xffff8881067a3fe0 of 8 bytes by task 3752 on cpu 1: [ 37.638118][ T3752] xas_find_marked+0x217/0x650 [ 37.642907][ T3752] find_get_entry+0x54/0x390 [ 37.647505][ T3752] filemap_get_folios_tag+0x136/0x210 [ 37.652912][ T3752] mpage_prepare_extent_to_map+0x329/0xb80 [ 37.658727][ T3752] ext4_do_writepages+0x6ea/0x2130 [ 37.663861][ T3752] ext4_writepages+0x159/0x2e0 [ 37.668631][ T3752] do_writepages+0x1d8/0x480 [ 37.673246][ T3752] file_write_and_wait_range+0x168/0x2f0 [ 37.678909][ T3752] generic_buffers_fsync_noflush+0x46/0x120 [ 37.684813][ T3752] ext4_sync_file+0x1ff/0x6c0 [ 37.689506][ T3752] vfs_fsync_range+0x116/0x130 [ 37.694284][ T3752] ext4_buffered_write_iter+0x358/0x3c0 [ 37.699851][ T3752] ext4_file_write_iter+0x383/0xf20 [ 37.705068][ T3752] do_iter_readv_writev+0x403/0x4b0 [ 37.710282][ T3752] vfs_writev+0x2d9/0x880 [ 37.714614][ T3752] __se_sys_pwritev2+0x100/0x1c0 [ 37.719569][ T3752] __x64_sys_pwritev2+0x78/0x90 [ 37.724436][ T3752] x64_sys_call+0x2afe/0x2dc0 [ 37.729125][ T3752] do_syscall_64+0xc9/0x1c0 [ 37.733647][ T3752] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 37.739554][ T3752] [ 37.741878][ T3752] value changed: 0x00003ffffffff800 -> 0x00003fffffffe000 [ 37.748983][ T3752] [ 37.751303][ T3752] Reported by Kernel Concurrency Sanitizer on: [ 37.757453][ T3752] CPU: 1 UID: 0 PID: 3752 Comm: syz.4.92 Not tainted 6.14.0-rc5-syzkaller-00023-gbb2281fb05e5 #0 [ 37.767956][ T3752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 37.778019][ T3752] ================================================================== [ 37.840115][ T3757] siw: device registration error -23 [ 37.867884][ T3752] syz.4.92 (3752) used greatest stack depth: 9400 bytes left [ 37.889632][ T3307] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000.