last executing test programs: 24m33.361301529s ago: executing program 32 (id=2): r0 = socket$inet(0x2, 0x4, 0x0) ptrace(0x10, 0x1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x6, 0x0, 0x0, 0x0, 0x8000000009917, 0x400000000000fffd}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f00009a1000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000fef000/0x4000)=nil) mremap(&(0x7f000040b000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f00004b3000/0x4000)=nil) mremap(&(0x7f0000e3b000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000fe1000/0x4000)=nil) munmap(&(0x7f00003fe000/0xc00000)=nil, 0xc00000) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0xffffffffffffffff}, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x40, 0x0) ioctl$RTC_EPOCH_SET(r3, 0x40187013, 0x7) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x20000023896) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x0, 0x10000028, 0x1, 0x0, 0x0, 0x4000000000000000}, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001940)=@raw={'raw\x00', 0x8, 0x3, 0x260, 0x0, 0xa, 0x148, 0x1160, 0x60, 0x11f8, 0x2a8, 0x2a8, 0x11f8, 0x2a8, 0x3, 0x0, {[{{@ip={@multicast2, @multicast2, 0x0, 0x0, 'bridge0\x00', 'rose0\x00', {}, {}, 0x4}, 0x0, 0xc8, 0x130, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x2, 0x0, 0x4, 0xffffffff, 0x7}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x4, 0x6, 0x3, 0x81, 'snmp_trap\x00', 'syz0\x00', {0x30f6a663}}}}, {{@ip={@empty, @empty, 0x0, 0x0, 'syzkaller0\x00', 'veth0_to_team\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x2c0) 24m6.482904409s ago: executing program 33 (id=410): r0 = socket$inet(0x2, 0x4, 0x0) ptrace(0x10, 0x1) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x6, 0x0, 0x0, 0x0, 0x8000000009917, 0x400000000000fffd}, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mremap(&(0x7f0000a01000/0x4000)=nil, 0x4000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f00009a1000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000fef000/0x4000)=nil) mremap(&(0x7f000040b000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f00004b3000/0x4000)=nil) mremap(&(0x7f0000e3b000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000fe1000/0x4000)=nil) munmap(&(0x7f00003fe000/0xc00000)=nil, 0xc00000) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0xffffffffffffffff}, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20000023896) sched_setattr(0x0, &(0x7f00000000c0)={0x38, 0x0, 0x10000028, 0x1, 0x0, 0x0, 0x4000000000000000}, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000001940)=@raw={'raw\x00', 0x8, 0x3, 0x260, 0x0, 0xa, 0x148, 0x1160, 0x60, 0x11f8, 0x2a8, 0x2a8, 0x11f8, 0x2a8, 0x3, 0x0, {[{{@ip={@multicast2, @multicast2, 0x0, 0x0, 'bridge0\x00', 'rose0\x00', {}, {}, 0x4}, 0x0, 0xc8, 0x130, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x2, 0x0, 0x4, 0xffffffff, 0x7}}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x4, 0x6, 0x3, 0x81, 'snmp_trap\x00', 'syz0\x00', {0x30f6a663}}}}, {{@ip={@empty, @empty, 0x0, 0x0, 'syzkaller0\x00', 'veth0_to_team\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x2c0) 18m23.232036826s ago: executing program 34 (id=3368): r0 = syz_open_dev$loop(&(0x7f0000000100), 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.stat\x00', 0x275a, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f0000000180)={r1, 0x0, {0x2a00, 0x80010000, 0x0, 0x7, 0x1, 0x0, 0x0, 0x0, 0x1c, "fee8a2ab00000000000000070000e60080b8785d96000100000000000000000000000000001d000000000000000000000000000000000000003700", "2809e8dbe108598948224ad54afac11d875397bdb22d0000b420a1a93c5240f45f819e01177d3d458dd4992861ac00", "90be8b1c551265406c7f306003d8a0f4bd00"}}) r2 = syz_open_procfs$pagemap(0x0, &(0x7f0000000000)) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) 18m22.153387602s ago: executing program 35 (id=3377): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x7, 0xf, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {{}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x5, 0x9, 0x0, 0x2, 0x300}, {0x6e}}, [], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 18m10.617908648s ago: executing program 36 (id=3494): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b000000"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x93, &(0x7f00000003c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) futex(0x0, 0x5, 0x1, &(0x7f0000000180)={0x0, 0x3938700}, 0x0, 0x2) 18m9.657035955s ago: executing program 37 (id=3511): syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000080)='./file1\x00', 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="6572726f72733d72656d6f756e54e9d911d4993a8cfaa9fc0f67742d726f2c6572726f72733d636f6e74696e75652c636865636b3d72656c617865642c646f74732c646f74732c6e6f646f74732c6e6f647f0000006e6f646f74732c646f74732c646f74732c6e6f646f74732c6e6f646f74732c646f74732c646973636172642c646f74732c646f74732c747a3d5554432c6572726f72733d636f6e74696e75652c6e6f646f74732c7379735f696d6d757461626c652c71756965742c646f74732c00"], 0xfd, 0x1bf, &(0x7f0000000840)="$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") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000fbe000)={0x0, &(0x7f0000000100)}, 0x10) syz_emit_ethernet(0x2a, 0x0, 0x0) r4 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f00000000c0)=""/200, 0x8}) socket(0x200000000000011, 0x2, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000001040)=@nat={'nat\x00', 0x8, 0x5, 0x6c0, 0x390, 0xf0, 0xffffffff, 0x2a0, 0x390, 0x5f0, 0x5f0, 0xffffffff, 0x5f0, 0x5f0, 0x5, 0x0, {[{{@uncond, 0xb7030000, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x1d, @ipv6=@private1, @ipv6=@private0, @port, @gre_key}}}, {{@uncond, 0x0, 0x168, 0x1b0, 0x0, {}, [@common=@unspec=@conntrack2={{0xc0}, {{@ipv4=@dev, [], @ipv6=@private1, [], @ipv6=@private1, [], @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x1, @ipv4, @ipv6=@local, @icmp_id, @icmp_id}}}, {{@ipv6={@mcast1, @local, [], [], 'wg1\x00', 'virt_wifi0\x00'}, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4, @ipv4=@multicast1, @gre_key, @icmp_id}}}, {{@ipv6={@rand_addr=' \x01\x00', @ipv4={'\x00', '\xff\xff', @empty}, [], [], 'dummy0\x00', 'syzkaller0\x00'}, 0x0, 0x218, 0x260, 0x0, {}, [@common=@inet=@sctp={{0x148}}, @common=@mh={{0x28}, {"0c06"}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @icmp_id, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x726) 18m8.30582635s ago: executing program 38 (id=3533): syz_mount_image$ext4(&(0x7f0000001140)='ext4\x00', &(0x7f00000007c0)='./file1\x00', 0x418484, &(0x7f0000000440), 0x1, 0x775, &(0x7f0000001180)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) pwritev2(r0, &(0x7f0000000500)=[{&(0x7f0000000000)='d', 0x1}], 0x1, 0x0, 0x0, 0x5) 18m7.740974668s ago: executing program 9 (id=3495): r0 = syz_io_uring_setup(0x832, &(0x7f0000000300)={0x0, 0x0, 0x10100, 0xfffffffc}, &(0x7f0000000100)=0x0, &(0x7f0000000080)=0x0) io_uring_register$IORING_REGISTER_PBUF_RING(r0, 0x16, &(0x7f0000000380)={&(0x7f0000001000)={[{0x0}, {0x0}, {0x0}, {0x0}]}, 0x4}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = socket$rds(0x15, 0x5, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_RECVMSG={0xa, 0x20, 0x2, r3, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0, 0x1, 0x1}) io_uring_enter(r0, 0x27e2, 0x0, 0x0, 0x0, 0x0) 18m7.724422598s ago: executing program 9 (id=3535): semget$private(0x0, 0x6, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TCSETS2(0xffffffffffffffff, 0x402c542b, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r1 = socket(0x2a, 0x2, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) sendmsg$nl_route_sched(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@newqdisc={0x78, 0x24, 0xc0b, 0x70bd2a, 0x2001, {0x0, 0x0, 0x0, r2, {0x0, 0x1}, {0xffff, 0xffff}, {0x5, 0xd}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{0xff, 0xec2, 0x5, 0x0, 0x400}, 0x10000, 0x1, 0x7ff, 0x6, 0xe, 0x14, 0x1f, 0x1b, 0x6, 0x2, {0x6, 0x1, 0xa9, 0x8, 0x7743, 0xfd1}}}}]}, 0x78}}, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000004ec0)=@newtfilter={0x24, 0x2c, 0xd27, 0x70bd25, 0x0, {0x0, 0x0, 0x0, r2, {0xe}, {}, {0x8, 0xffff}}}, 0x24}}, 0x4000) r3 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r3, &(0x7f00000002c0), 0x40000000000009f, 0x0) 18m7.700966347s ago: executing program 9 (id=3536): r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f00000000c0)={0x1d, r1}, 0x18) connect$can_j1939(r0, &(0x7f0000000140)={0x1d, r1, 0x0, {0x0, 0x0, 0x4}, 0x2}, 0x18) sendmsg$inet(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) 18m7.634167458s ago: executing program 9 (id=3537): syz_mount_image$iso9660(&(0x7f0000000380), &(0x7f00000003c0)='./file0\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="00cdb7d274a02346417a0be2e319c7e000cda798c6a7e92aae1d71ff4f6701eec69fe35bca5eb0efec69a096e77262e2750001747e47426dfe89bd6f1f5baf556eac6b4e20d9fdb8a918d070d6d2c9f998f1772c44281f45bfc61b6e448002f48046e45df9a98b017d4e1b465dae75b374"], 0x1, 0x35b, &(0x7f0000000000)="$eJzs3FFL81YcB+CToaO4m8HLpm/fm6AwnGw1iVgpXpWa1ri0HW2FeTnQwZhX29X8Yvt4G2mrw+msG84W9zzQntPk1/QUQv7klNMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAISoc5IkaRTKYnD+Xfz3OiejYf+J/bfH++1e88TnhhBVj1Crha3Zpq13f+7+rHraDpuzV5uhVjW1cPPJ558ev1v76Pb9TwzoVfzy681P319fX/287IEsSS8fFONh0W/38rgYD+NWs5nsn3bHcbco8/HFeJL3484ob0+Go3i382WctloHcd64GJ4PeiftMr/dePR1liTN+Kzxbd4ejYeD/bPGuHNalGUx6E0z1e4qc1SdiN8Uk3iSt/tx/MOP11cHiwZZhdLnhLJFoSzJsjTNsrR52Do8SpK1BxuSvwgPEss/aVmuF76Cw7/3+7z+AwAAAG9XNJ1jr+7/16fz8FHoFmWeLHtYAAAAwAua/vK/WTXrVW8rRO7/AQAA4K1ZvMZuYSL6KryfJd5fztrLeWK+zm+jW5R5ozMsj9Pwxd1qv8ePtj6dftgL9VmqvjFrN+4fsVal0sZxGvbCh1niw+5O1ezsPpLMnp08qJIA8NZtL6jHz6n/e2G+pjWuV8U0rNUfqayJygoAq+LuH2z+w86yvyMAcJ8qDQAAAAAAAAAAAAAAq+811v/p/INOtBrDWI3OxyGEFRjG/7Kz7CsTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADz0RwAAAP//5VTRDA==") mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, 0x0, 0x0, 0x100000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='./file0/file0\x00', 0x0, 0x12f451, 0x0) mount$bind(&(0x7f00000000c0)='.\x00', &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0x80700a, 0x0) umount2(&(0x7f0000000100)='./file0/file0\x00', 0xb) 18m7.617974357s ago: executing program 9 (id=3538): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000600)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0xc05c5340, &(0x7f0000000440)) tkill(0x0, 0x7) 18m5.818479501s ago: executing program 39 (id=3549): sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vxcan1\x00'}) sched_setscheduler(0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b0000000000000000000000008000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 18m5.61769886s ago: executing program 9 (id=3554): r0 = syz_io_uring_setup(0x832, &(0x7f0000000300)={0x0, 0x0, 0x10100, 0xfffffffc}, &(0x7f0000000100)=0x0, &(0x7f0000000080)=0x0) io_uring_register$IORING_REGISTER_PBUF_RING(r0, 0x16, &(0x7f0000000380)={&(0x7f0000001000)={[{0x0}, {0x0}, {0x0}, {0x0}]}, 0x4}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = socket$rds(0x15, 0x5, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_RECVMSG={0xa, 0x20, 0x2, r3, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0, 0x1, 0x1}) io_uring_enter(r0, 0x27e2, 0x0, 0x0, 0x0, 0x0) 18m5.5995992s ago: executing program 40 (id=3554): r0 = syz_io_uring_setup(0x832, &(0x7f0000000300)={0x0, 0x0, 0x10100, 0xfffffffc}, &(0x7f0000000100)=0x0, &(0x7f0000000080)=0x0) io_uring_register$IORING_REGISTER_PBUF_RING(r0, 0x16, &(0x7f0000000380)={&(0x7f0000001000)={[{0x0}, {0x0}, {0x0}, {0x0}]}, 0x4}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = socket$rds(0x15, 0x5, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_RECVMSG={0xa, 0x20, 0x2, r3, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0, 0x1, 0x1}) io_uring_enter(r0, 0x27e2, 0x0, 0x0, 0x0, 0x0) 17m42.645697574s ago: executing program 5 (id=3914): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0xe) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) ioctl$PPPIOCSFLAGS1(r1, 0x80047458, 0x0) 17m42.640108944s ago: executing program 5 (id=3916): r0 = socket$kcm(0x29, 0x5, 0x0) write(r0, &(0x7f0000000140)="8cae", 0x2) sendmsg$kcm(r0, 0x0, 0x34040882) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='net/kcm\x00') preadv(r1, &(0x7f0000000740)=[{&(0x7f0000000000)=""/158, 0x9e}], 0x1, 0x0, 0x0) 17m42.616432774s ago: executing program 5 (id=3918): socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0xfefc, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r3, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2400}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)=r1}, 0x20) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x5, 0x0, 0x0, @void, @value, @void, @value}, 0x48) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) socketpair$unix(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={@ifindex, 0x11, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r6 = openat$cgroup_int(r5, 0x0, 0x2, 0x0) write$cgroup_int(r6, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r7}, 0x10) 17m42.255612363s ago: executing program 5 (id=3931): syz_mount_image$iso9660(&(0x7f0000000380), &(0x7f00000003c0)='./file0\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="00cdb7d274a02346417a0be2e319c7e000cda798c6a7e92aae1d71ff4f6701eec69fe35bca5eb0efec69a096e77262e2750001747e47426dfe89bd6f1f5baf556eac6b4e20d9fdb8a918d070d6d2c9f998f1772c44281f45bfc61b6e448002f48046e45df9a98b017d4e1b465dae75b374"], 0x1, 0x35b, &(0x7f0000000000)="$eJzs3FFL81YcB+CToaO4m8HLpm/fm6AwnGw1iVgpXpWa1ri0HW2FeTnQwZhX29X8Yvt4G2mrw+msG84W9zzQntPk1/QUQv7klNMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAISoc5IkaRTKYnD+Xfz3OiejYf+J/bfH++1e88TnhhBVj1Crha3Zpq13f+7+rHraDpuzV5uhVjW1cPPJ558ev1v76Pb9TwzoVfzy681P319fX/287IEsSS8fFONh0W/38rgYD+NWs5nsn3bHcbco8/HFeJL3484ob0+Go3i382WctloHcd64GJ4PeiftMr/dePR1liTN+Kzxbd4ejYeD/bPGuHNalGUx6E0z1e4qc1SdiN8Uk3iSt/tx/MOP11cHiwZZhdLnhLJFoSzJsjTNsrR52Do8SpK1BxuSvwgPEss/aVmuF76Cw7/3+7z+AwAAAG9XNJ1jr+7/16fz8FHoFmWeLHtYAAAAwAua/vK/WTXrVW8rRO7/AQAA4K1ZvMZuYSL6KryfJd5fztrLeWK+zm+jW5R5ozMsj9Pwxd1qv8ePtj6dftgL9VmqvjFrN+4fsVal0sZxGvbCh1niw+5O1ezsPpLMnp08qJIA8NZtL6jHz6n/e2G+pjWuV8U0rNUfqayJygoAq+LuH2z+w86yvyMAcJ8qDQAAAAAAAAAAAAAAq+811v/p/INOtBrDWI3OxyGEFRjG/7Kz7CsTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADz0RwAAAP//5VTRDA==") mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='./file0/file0\x00', 0x0, 0x12f451, 0x0) mount$bind(&(0x7f00000000c0)='.\x00', 0x0, 0x0, 0x80700a, 0x0) umount2(&(0x7f0000000100)='./file0/file0\x00', 0xb) 17m42.131291342s ago: executing program 5 (id=3933): syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000580)='./file1\x00', 0x40, &(0x7f00000005c0), 0x1, 0x54e, &(0x7f00000010c0)="$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") getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc020660b, 0x0) 17m41.893770991s ago: executing program 5 (id=3937): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f0000000200)={[{@noblock_validity}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9}}, {@sysvgroups}, {@norecovery}, {@dioread_nolock}, {@orlov}, {@debug}, {@noauto_da_alloc}, {@nomblk_io_submit}]}, 0x3, 0x570, &(0x7f0000000680)="$eJzs3V1rHFUYAOB3Nkm/tSmUoiIS6IWV2k2T+FFBsF6KFgt6X5dkGmo23ZLdlCYW2l7YG2+kCCIWxB/gvZfFP+CvKGihSAl64U1kNrPtNtnN52q2zvPAtOfMzObM2TPv2Xd2dtkACmsk+6cU8WLcjK+TiMNt2wYj3ziyst/So+uT2ZLE8vInfySR5Ota+yf5/wfzygsR8cuXESdLa9utLyzOVKrVdC6vjzZmr4zWFxZPXZqtTKfT6eXxiYkzb06Mv/P2Wz3r62vn//ru43sfnPnq+NK3Pz04cieJs3Eo39bejx242V4ZiZH8ORmKs6t2HOtBY/0k2e0DYFsG8jgfimwOOBwDedQD/383ImIZKKhE/ENBtfKA1rV9j66DnxkP31+5AFrb/8GV90ZiX/Pa6MBS8tSVUXa9O9yD9rM2fv797p1siQ3eh7jRg/YAWm7eiojTg4Nr578kn/+273TzzeP1rW6jaK8/sJvuZfnP653yn9Lj/Cc65D8HO8Tudmwc/6UHPWimqyz/e7dj/vt46hoeyGvPNXO+oeTipWp6OiKej4gTMbQ3q693P+fM0v3lbtva879sydpv5YL5cTwY3Pv0Y6YqjcpO+tzu4a2Il57kv0msmf/3NXPd1eOfPR/nN9nGsfTuK922bdz/dr3PgJd/jHi14/g/uaOVrH9/crR5Poy2zoq1/rx97Ndu7W+t/72Xjf+B9fs/nLTfr61vvY0f9v2ddtu23fN/T/Jps7wnX3et0mjMjUXsST5au378yWNb9db+Wf9PHF9//ut0/u+PiM822f/bR2933bUfxn9qS+O/9cL9D7/4vlv7mxv/N5qlE/mazcx/mz3AnTx3AAAAAAAA0G9KEXEoklL5cblUKpdXPt9xNA6UqrV64+TF2vzlqWh+V3Y4hkqtO92H2z4PMZZ/HrZVH19Vn4iIIxHxzcD+Zr08WatO7XbnAQAAAAAAAAAAAAAAAAAAoE8c7PL9/8xvA7t9dMC/zk9+Q3FtGP+9+KUnoC95/Yfi6hL/pgUoAIEOxSX+objEPxSX+IfiEv9QXOIfAAAAAAAAAAAAAAAAAAAAAAAAAAAAeur8uXPZsrz06PpkVp+6ujA/U7t6aiqtz5Rn5yfLk7W5K+XpWm26mpYna7Mb/b1qrXZlbDzmr4020npjtL6weGG2Nn+5ceHSbGU6vZAO/Se9AgAAAAAAAAAAAAAAAAAAgGdLfWFxplKtpnMKXQvvxW4fxucv7+ThSedRTto6uGJbTQz2yzAp9LSwyxMTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALT5JwAA//821zOC") r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x103042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x35) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305839, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3fffffff404}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r3, 0x6628) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x0) pwrite64(r4, &(0x7f0000000000)='2', 0x1, 0x4fed0) sendfile(r0, r3, 0x0, 0x100001) 17m41.877941951s ago: executing program 41 (id=3937): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f0000000200)={[{@noblock_validity}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9}}, {@sysvgroups}, {@norecovery}, {@dioread_nolock}, {@orlov}, {@debug}, {@noauto_da_alloc}, {@nomblk_io_submit}]}, 0x3, 0x570, &(0x7f0000000680)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x103042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x35) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305839, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3fffffff404}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r3, 0x6628) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x0) pwrite64(r4, &(0x7f0000000000)='2', 0x1, 0x4fed0) sendfile(r0, r3, 0x0, 0x100001) 9m57.476267317s ago: executing program 8 (id=8772): bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYRES32=0xffffffffffffffff], 0x50) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x80e, &(0x7f0000000380)={[{@jqfmt_vfsold}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x80}}, {@barrier_val={'barrier', 0x3d, 0x3}}, {@stripe={'stripe', 0x3d, 0x4}}, {@auto_da_alloc}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2e}}]}, 0x3, 0x45c, &(0x7f00000009c0)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() read$msr(0xffffffffffffffff, &(0x7f0000000800)=""/112, 0x70) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, 0x0, 0x0) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r5 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000400)=@raw={'raw\x00', 0x3c1, 0x3, 0x380, 0x1c0, 0x12, 0x60a, 0x1c0, 0x202, 0x2b0, 0x2e8, 0x2e8, 0x2b0, 0x2c0, 0x4, 0x0, {[{{@ipv6={@private0, @ipv4={'\x00', '\xff\xff', @private}, [], [], 'veth1_to_bond\x00', 'geneve1\x00'}, 0x0, 0x190, 0x1c0, 0x0, {}, [@common=@unspec=@string={{0xc0}, {0x0, 0x0, 'bm\x00', "000000000000000617ae5119b5135c2aee68d23a465cd431e1ecef50c3234e082555f67222476147864fa03182f5cf11d8c348cbd06dc8de1dcbde7d4e252c3394fed47bf78c70f607b0178fa5ea335019ac07a602061c96baebc989f1f34a214e6726401fe4b124e0f7323a587d2a1fcf07000000eca0a7b66c60c527bac2b5", 0x2}}, @inet=@rpfilter={{0x28}}]}, @common=@unspec=@CONNMARK={0x30}}, {{@uncond, 0x0, 0xa8, 0xf0}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3e0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES16=r0, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) 9m56.426309473s ago: executing program 8 (id=8780): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x5b) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0x0, 0xfffffdb9, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) socketpair(0x10, 0x0, 0x14, &(0x7f0000000400)) r3 = openat$cgroup_type(r2, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_type(r3, &(0x7f0000000280), 0x9) r4 = openat$cgroup_procs(r2, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000500)={@fallback=r0, 0x4, 0x1, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8, 0x0, &(0x7f0000000440), &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r5}, 0x10) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x20001400) r7 = openat$cgroup_ro(r2, 0x0, 0x0, 0x0) write$cgroup_pid(r4, &(0x7f0000000c40), 0x12) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_subtree(r7, &(0x7f0000000300)={[{0x2b, 'io'}, {0x2d, 'cpu'}, {0x2d, 'cpuacct'}, {0x2b, 'rdma'}]}, 0x18) syz_clone(0x24084200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a40)) syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f0000000a40)=ANY=[@ANYBLOB="9feb01001800000000000000ae010000ae010000050000000400000006000084080b00000f000000020000000000008007001be135420000080000000600000005000000ff7f00000f000000010000007bfc00000500000005000000030000000200000004000000010000000600000008000004020000000d00000005000000000000001000000003000000030000000400000001000000ffff00000e00000003000010050000000502000000000000060000000900000002000000030000000e0000000200000000000080070000000300000003000000090000000300000604000000000000"], &(0x7f0000000880)=""/196, 0x1cd, 0xc4, 0xfffffffd, 0x7ff, 0x0, @void, @value}, 0x28) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000000400000004000000020000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r8, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) 9m55.61103194s ago: executing program 8 (id=8782): r0 = syz_io_uring_setup(0x24fa, &(0x7f0000000080)={0x0, 0x4622, 0x10100, 0x3}, &(0x7f0000000100)=0x0, &(0x7f0000000180)=0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r3, 0x0, 0x0}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) 9m55.47204915s ago: executing program 8 (id=8783): syz_mount_image$iso9660(&(0x7f0000000380), &(0x7f00000003c0)='./file0\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="00cdb7d274a02346417a0be2e319c7e000cda798c6a7e92aae1d71ff4f6701eec69fe35bca5eb0efec69a096e77262e2750001747e47426dfe89bd6f1f5baf556eac6b4e20d9fdb8a918d070d6d2c9f998f1772c44281f45bfc61b6e448002f48046e45df9a98b017d4e1b465dae75b374"], 0x1, 0x35b, &(0x7f0000000000)="$eJzs3FFL81YcB+CToaO4m8HLpm/fm6AwnGw1iVgpXpWa1ri0HW2FeTnQwZhX29X8Yvt4G2mrw+msG84W9zzQntPk1/QUQv7klNMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAISoc5IkaRTKYnD+Xfz3OiejYf+J/bfH++1e88TnhhBVj1Crha3Zpq13f+7+rHraDpuzV5uhVjW1cPPJ558ev1v76Pb9TwzoVfzy681P319fX/287IEsSS8fFONh0W/38rgYD+NWs5nsn3bHcbco8/HFeJL3484ob0+Go3i382WctloHcd64GJ4PeiftMr/dePR1liTN+Kzxbd4ejYeD/bPGuHNalGUx6E0z1e4qc1SdiN8Uk3iSt/tx/MOP11cHiwZZhdLnhLJFoSzJsjTNsrR52Do8SpK1BxuSvwgPEss/aVmuF76Cw7/3+7z+AwAAAG9XNJ1jr+7/16fz8FHoFmWeLHtYAAAAwAua/vK/WTXrVW8rRO7/AQAA4K1ZvMZuYSL6KryfJd5fztrLeWK+zm+jW5R5ozMsj9Pwxd1qv8ePtj6dftgL9VmqvjFrN+4fsVal0sZxGvbCh1niw+5O1ezsPpLMnp08qJIA8NZtL6jHz6n/e2G+pjWuV8U0rNUfqayJygoAq+LuH2z+w86yvyMAcJ8qDQAAAAAAAAAAAAAAq+811v/p/INOtBrDWI3OxyGEFRjG/7Kz7CsTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADz0RwAAAP//5VTRDA==") mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='./file0/file0\x00', 0x0, 0x12f451, 0x0) umount2(&(0x7f0000000100)='./file0/file0\x00', 0xb) 9m54.206179275s ago: executing program 8 (id=8788): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x0, 0x0}) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)=ANY=[], 0x48) socket$nl_generic(0x10, 0x3, 0x10) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/power/pm_trace', 0x169282, 0x19c) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in=@rand_addr=0x64010102, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x2000000000000}, 0x0, 0x0, 0x1}, [@tmpl={0x44, 0x5, [{{@in=@empty, 0xfffffffe, 0x3c}, 0x0, @in=@private=0xa010101}]}]}, 0xfc}}, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r4, &(0x7f00000007c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000780)={&(0x7f0000000700)={0x54, 0x0, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x4}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @loopback}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x3}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}]}, 0x54}, 0x1, 0x0, 0x0, 0x40}, 0x8814) connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) 9m53.429286602s ago: executing program 8 (id=8798): r0 = socket$kcm(0x2, 0x200000000000001, 0x106) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xfb84e000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4, 0x0, 0x7fffffffffffffff}, 0x18) syz_open_dev$tty20(0xc, 0x4, 0x1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r5, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) r6 = socket$inet6(0xa, 0x3, 0x7) r7 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'sit0\x00'}) sendmsg$nl_route(r7, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x4}, {0x0, 0x4, 0x0, 0xa78a}, 0xfffffffe, 0x0, 0x1}, {{@in=@private, 0x0, 0x33}, 0x0, @in=@rand_addr=0x64010101, 0x0, 0x3, 0x1, 0x7}}, 0xe8) sendmmsg(r6, &(0x7f0000000480), 0x2e9, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x25, &(0x7f0000000040), 0x4) connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r8 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x204, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xf, 0x11012, r8, 0x0) 9m53.428449462s ago: executing program 42 (id=8798): r0 = socket$kcm(0x2, 0x200000000000001, 0x106) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xfb84e000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4, 0x0, 0x7fffffffffffffff}, 0x18) syz_open_dev$tty20(0xc, 0x4, 0x1) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r5, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, 0x0) r6 = socket$inet6(0xa, 0x3, 0x7) r7 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'sit0\x00'}) sendmsg$nl_route(r7, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r6, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x4}, {0x0, 0x4, 0x0, 0xa78a}, 0xfffffffe, 0x0, 0x1}, {{@in=@private, 0x0, 0x33}, 0x0, @in=@rand_addr=0x64010101, 0x0, 0x3, 0x1, 0x7}}, 0xe8) sendmmsg(r6, &(0x7f0000000480), 0x2e9, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x25, &(0x7f0000000040), 0x4) connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r8 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x204, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xf, 0x11012, r8, 0x0) 9m33.637493479s ago: executing program 7 (id=8911): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f0000000200)={[{@noblock_validity}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9}}, {@sysvgroups}, {@norecovery}, {@dioread_nolock}, {@orlov}, {@debug}, {@noauto_da_alloc}, {@nomblk_io_submit}]}, 0x3, 0x570, &(0x7f0000000680)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x103042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x35) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x12, r2, 0x0) pwrite64(r1, &(0x7f0000000140)='2', 0xfdef, 0xfecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305839, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3fffffff404}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x0) pwrite64(r5, &(0x7f0000000000)='2', 0x1, 0x4fed0) sendfile(r0, r4, 0x0, 0x100001) 9m33.338154948s ago: executing program 7 (id=8923): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) getpid() socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000380), &(0x7f00000003c0)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f00000008c0)={[{@bsdgroups}, {@nodiscard}, {@noblock_validity}, {@grpjquota}, {@grpjquota}, {@noquota}, {@abort}, {@noload}, {@noload}]}, 0x64, 0x50a, &(0x7f0000000200)="$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") 9m33.163270367s ago: executing program 7 (id=8927): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r2}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f00000008c0)={[{@bsdgroups}, {@nodiscard}, {@noblock_validity}, {@grpjquota}, {@grpjquota}, {@noquota}, {@abort}, {@noload}, {@noload}]}, 0x64, 0x50a, &(0x7f0000000200)="$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") 9m32.247929454s ago: executing program 7 (id=8954): syz_mount_image$iso9660(&(0x7f0000000380), &(0x7f00000003c0)='./file0\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="00cdb7d274a02346417a0be2e319c7e000cda798c6a7e92aae1d71ff4f6701eec69fe35bca5eb0efec69a096e77262e2750001747e47426dfe89bd6f1f5baf556eac6b4e20d9fdb8a918d070d6d2c9f998f1772c44281f45bfc61b6e448002f48046e45df9a98b017d4e1b465dae75b374"], 0x1, 0x35b, &(0x7f0000000000)="$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") mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)='./file0/file0\x00', 0x0, 0x12f451, 0x0) mount$bind(&(0x7f00000000c0)='.\x00', 0x0, 0x0, 0x80700a, 0x0) umount2(&(0x7f0000000100)='./file0/file0\x00', 0xb) 9m31.798667942s ago: executing program 7 (id=8959): socket$kcm(0x29, 0x5, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/kcm\x00') preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000000)=""/158, 0x9e}], 0x1, 0x0, 0x0) 9m30.969985289s ago: executing program 7 (id=8967): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000002dc0)=@delchain={0x3dc, 0x65, 0x200, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x0, 0xfff2}, {0x4, 0xa}}, [@filter_kind_options=@f_route={{0xa}, {0x3ac, 0x2, [@TCA_ROUTE4_FROM={0x8, 0x3, 0x40}, @TCA_ROUTE4_ACT={0x3a0, 0x6, [@m_simple={0x21c, 0x1f, 0x0, 0x0, {{0xb}, {0x98, 0x2, 0x0, 0x1, [@TCA_DEF_PARMS={0x18, 0x2, {0x8401, 0x2, 0x1, 0x2, 0x8}}, @TCA_DEF_DATA={0x2d, 0x3, '@-^[\xa5&,.\x00pe\xe9\xb9\xf1Q+=\xdf\xacqd\xb4\xd3\rj6\xb4\xa6fz\x91\xa6\xe9\xdfy\xef\xbcY\xbb[a'}, @TCA_DEF_DATA={0x7, 0x3, 'lo\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x0, 0x403, 0xfffffffffffffffe, 0x4, 0x2}}, @TCA_DEF_DATA={0x7, 0x3, '\xfc}\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x6, 0x1, 0x0, 0x4, 0x8}}, @TCA_DEF_DATA={0xb, 0x3, 'j\xbf!*{$\x00'}]}, {0x159, 0x6, "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"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_vlan={0x60, 0xc, 0x0, 0x0, {{0x9}, {0x34, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x30a}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x4e9}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0xb35}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x715}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x8a7}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x6}]}, {0x4}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1}}}}, @m_mpls={0x84, 0x15, 0x0, 0x0, {{0x9}, {0x4}, {0x55, 0x6, "b785195954bf29eb39a865c5695a7ac46cec065f7db06dbdba2e8cf062693312261bf71915b2d84a074fd931b04b8440933794ba3bc0c3d3302773efdb92a216873b53281af4671231b5fff52cece35cfe"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x1}}}}, @m_mpls={0x9c, 0x9, 0x0, 0x0, {{0x9}, {0x4}, {0x6e, 0x6, "bc1ad3229b696b64631b982f1ae9cf411c2b1e5fdff6242d8695a1ed156c80531bcbd658d1eea2abd881689e410b142d3051cdb54d04700ae8760c4554a295a0dc065e7a467f52ac1406a7c414dea141de52ea6b5ad19c69da24e696a9a9f2d1afa4e45f037f6415a6c3"}, {0xc}, {0xc, 0x8, {0x3, 0x1}}}}]}]}}]}, 0x3dc}, 0x1, 0x0, 0x0, 0x40}, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x365}, {&(0x7f0000000280)=""/85, 0x7c}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000400)=""/106, 0x645}, {&(0x7f0000000980)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x14}, {&(0x7f00000007c0)=""/154, 0x7e}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0x41, 0xb00}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 9m30.528531397s ago: executing program 43 (id=8967): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000002dc0)=@delchain={0x3dc, 0x65, 0x200, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x0, 0xfff2}, {0x4, 0xa}}, [@filter_kind_options=@f_route={{0xa}, {0x3ac, 0x2, [@TCA_ROUTE4_FROM={0x8, 0x3, 0x40}, @TCA_ROUTE4_ACT={0x3a0, 0x6, [@m_simple={0x21c, 0x1f, 0x0, 0x0, {{0xb}, {0x98, 0x2, 0x0, 0x1, [@TCA_DEF_PARMS={0x18, 0x2, {0x8401, 0x2, 0x1, 0x2, 0x8}}, @TCA_DEF_DATA={0x2d, 0x3, '@-^[\xa5&,.\x00pe\xe9\xb9\xf1Q+=\xdf\xacqd\xb4\xd3\rj6\xb4\xa6fz\x91\xa6\xe9\xdfy\xef\xbcY\xbb[a'}, @TCA_DEF_DATA={0x7, 0x3, 'lo\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x0, 0x403, 0xfffffffffffffffe, 0x4, 0x2}}, @TCA_DEF_DATA={0x7, 0x3, '\xfc}\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x6, 0x1, 0x0, 0x4, 0x8}}, @TCA_DEF_DATA={0xb, 0x3, 'j\xbf!*{$\x00'}]}, {0x159, 0x6, "bb56072c27c5e2984fb9b39740c7dea2e6372a168bf1fdb8ecb6019c9f5db834fcaca18620641b7aab2922e19d2f9b062f5ec4be8a5a603fe7236ffd67f60e9e007b34543ac14c27acd7e5a1f78c6de0f9cb58fc8855dae5289e4e856559f64bc5a1c5683263937fdd088e5f34874e0d2d2273a7a09810d9042b32fb69223c74e88c41fda5268c22a3107d32ee49d3a99665178abfde24d27a872b23ece9d09c9560070a6e3cca383ccb4d1a6d7c302ab3ee820e67d26e78f72566a2f9765698d783e6c14d8da6156473bc39143eaba66c1921f94f19f65bc88b127c0eb8ac765b9220105c7c1060a0ddc63f80d90bc3848a4fa52f73aaa4e21a1f0d6078cc5386cdfb2eef199f5261cf64455c3d8b7584e7e01a4e794f882f04307913cd5e00e1ebd8bbb0e6ed906dfc64b4608f285ecdef3d31a8bdcee436f22615785877343e6d37e39f8da9b11c6d72daba3a7fadbbfc2dce2c"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_vlan={0x60, 0xc, 0x0, 0x0, {{0x9}, {0x34, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x30a}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x4e9}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0xb35}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x715}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x8a7}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x6}]}, {0x4}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1}}}}, @m_mpls={0x84, 0x15, 0x0, 0x0, {{0x9}, {0x4}, {0x55, 0x6, "b785195954bf29eb39a865c5695a7ac46cec065f7db06dbdba2e8cf062693312261bf71915b2d84a074fd931b04b8440933794ba3bc0c3d3302773efdb92a216873b53281af4671231b5fff52cece35cfe"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x1}}}}, @m_mpls={0x9c, 0x9, 0x0, 0x0, {{0x9}, {0x4}, {0x6e, 0x6, "bc1ad3229b696b64631b982f1ae9cf411c2b1e5fdff6242d8695a1ed156c80531bcbd658d1eea2abd881689e410b142d3051cdb54d04700ae8760c4554a295a0dc065e7a467f52ac1406a7c414dea141de52ea6b5ad19c69da24e696a9a9f2d1afa4e45f037f6415a6c3"}, {0xc}, {0xc, 0x8, {0x3, 0x1}}}}]}]}}]}, 0x3dc}, 0x1, 0x0, 0x0, 0x40}, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x365}, {&(0x7f0000000280)=""/85, 0x7c}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000400)=""/106, 0x645}, {&(0x7f0000000980)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x14}, {&(0x7f00000007c0)=""/154, 0x7e}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0x41, 0xb00}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 3m27.593001309s ago: executing program 2 (id=12539): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000001c0)='sched_switch\x00', r1}, 0x10) mount(&(0x7f0000000100), &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 3m27.54995798s ago: executing program 2 (id=12540): r0 = creat(&(0x7f00000000c0)='./file0\x00', 0xc9028ba210c11e88) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)={{0x14}, [@NFT_MSG_NEWRULE={0x54, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x28, 0x4, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, @reject={{0xb}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_REJECT_ICMP_CODE={0x5, 0x2, 0x7}, @NFTA_REJECT_TYPE={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x7c}}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r3}, 0x10) dup2(r0, r1) 3m27.463765759s ago: executing program 2 (id=12543): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r2, 0xc0a85320, &(0x7f00000003c0)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0xc0a85320, &(0x7f00000005c0)={{0x80}, 'port0\x00', 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5}) 3m27.396892979s ago: executing program 2 (id=12549): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x3c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffff, 0x5, 0x0, 0xfffffffa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000240), &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, r1) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fsopen(&(0x7f0000000080)='autofs\x00', 0x0) fsconfig$FSCONFIG_SET_FD(r3, 0x5, &(0x7f00000005c0)='fd', 0x0, r2) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[@ANYBLOB="540100001000010000001000ffdbdf250a010100000000000000000000000000000000000000000000000000000000010000000000000000000000a000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"/268], 0x154}}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000096c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000640)=@newtaction={0x64, 0x30, 0x1, 0x0, 0x0, {}, [{0x50, 0x1, [@m_vlan={0x4c, 0x1, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_VLAN_PARMS={0x1c, 0x2, {{0xab7, 0x3, 0xc, 0x4, 0x4}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x64}}, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext3\x00', &(0x7f0000000280)='./file0\x00', 0xc0ed000e, &(0x7f00000002c0)={[{@jqfmt_vfsold}, {@nolazytime}, {@debug}, {@noload}, {@min_batch_time={'min_batch_time', 0x3d, 0xd23b}}, {@commit={'commit', 0x3d, 0x5}}, {@lazytime}, {@acl}]}, 0xfe, 0x47d, &(0x7f0000000dc0)="$eJzs3M1vFOUfAPDv7LalvP3aH+ILCFJFI761tLzIwYMaTThgYqIHjKfaLqSyUENrIoSY6gGPhsS78e4fYDzpxagnE696NyTEcAE9rZndGVi2u6VbdrvQ/XyS2T7PzLP7PN+ZeTovz84G0LfG0pckYltE/BERI7XsnQXGan9uXr8088/1SzNJVCrv/J1Uy924fmkmL5q/b2stU6lk+U1N6r38fsR0uVw6n+UnFs9+NLFw4eJLc2enT5dOl85NHTt2+NDeoaNTR+rfNrzWONO4buz+dH7PruPvXXlr5uSVD375Nm3vtmx5fRydMlZbu0090+nKemx7XToZ6GFDaEsxItLNNVjt/yNRjM23lo3Em5/3tHFAV1UqlUqz43NmqQJsYEn0ugVAb+QH+vT6N5/W6dTjvnDtteoFUH7RM3OzmC8ZiEItsW+wdnnUFWMRcXLp36/TKdq9D7GvW60CADayH9Lznxebnf8V4pFaYih9+V82hjIaEf+PiB0R8VBE7IyIhyOqZR+NiMfarL9xhGT5+U/h6pqDW4X0/O+VbGwrn7J68yKjxSy3vRr/YHJqrlw6mK2TAzG46dRcUppcoY4f3/j9y1bL6s//0imtPz8XzNpxdaDhBt3s9OL0vcRc79pnEbsHmsWfRD6Mk0TErojYvcY65p5vPSB09/hX0IFxpso3Ec/Wtv9SNMSfS1qOT06+fHTqyMRwlEsHJ/K9Yrlff7v8dqv674w/htuKvwPS7b+l6f5/K/7RZDhi4cLFM9Xx2oUmH3Kz4WKyweU/v2h5TdPm/n98e7b/DyXvVmcMZQs+mV5cPD8ZMZScWD5/6van5fm8fBr/gf3N+/+OuL0mHo+IPRGxNyKeyC690rY/GRFPRcT+Fdbxz68//WH78a9wV76D0vhn77b9o377t58onvnp+/bjz6Xb/3A1dSCbs5r/f6tt4L2sOwAAAHhQFKrfgU8K47fShcL4eO07/DtjS6E8v7D4wqn5j8/N1r4rPxqDhfxO10jd/dDJ7N5wnp9qyB/K7ht/VdxczY/PzJdnex089LmtLfp/6q9ir1sHdN0axtFe7UY7gPXneU3oX/o/9KdE/4e+pv9D/2rW/ze3LD3+XVcbA6wrx3/oX6vo/0vr9DwSsM4c/6F/6f/Ql1o+G1+4p0f+JTqWOPFcEvdBM5YlonBfNGPjJwZW/WMWbSQqI7X+n87Z1LTM8t9mAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeBD9FwAA//+r+eEo") getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x80000000}, &(0x7f0000000080)=0x8) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x81105a, 0x0) chroot(&(0x7f0000000300)='./file0/file0\x00') pivot_root(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f00000001c0)='./file0/../file0/../file0\x00') r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000d5e8b898e1000000000000000000000000950000"], &(0x7f0000000200)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='netlink_extack\x00', r6}, 0x10) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000e00)=@newtaction={0x74, 0x30, 0x1, 0x3, 0x0, {}, [{0x60, 0x1, [@m_mpls={0x5c, 0x1, 0x0, 0x0, {{0x9}, {0x30, 0x2, 0x0, 0x1, [@TCA_MPLS_PARMS={0x1c, 0x2, {{0x10001, 0x9, 0x10000000, 0x0, 0x20}, 0x1}}, @TCA_MPLS_PROTO={0x6, 0x4, 0x8848}, @TCA_MPLS_BOS={0x5, 0x8, 0x1}]}, {0x4, 0x4}, {0xc}, {0xc}}}]}]}, 0x74}}, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000000c0)={r5, 0x2}, &(0x7f0000000100)=0x8) 3m27.313189819s ago: executing program 2 (id=12554): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) open(&(0x7f0000000140)='./file0\x00', 0x2a4c0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = dup(r2) write$P9_RLERRORu(r3, &(0x7f0000000540)=ANY=[], 0x53) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB, @ANYRESHEX=r3]) 3m27.085107508s ago: executing program 2 (id=12564): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x101, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x4) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x48005600, 0x0, 0x0, 0x0, 0x0, 0x0) 3m27.084949968s ago: executing program 44 (id=12564): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x101, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x4) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x48005600, 0x0, 0x0, 0x0, 0x0, 0x0) 5.756477701s ago: executing program 4 (id=18341): r0 = msgget(0x0, 0x2c4) msgsnd(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000000000008aad8285d4890e388f467f325b071a13778bd0c50734cd26259064be5c3122ebb7b0731a190bf082f0f686331ad884815c5310e19c1c68fa82f391a3346c9ce99e971514fa759e5a904a06218b00a11794e4ce58e2c6c22bcf6a93c81b5ab07946de7a677af246781deb616315e43576594ffd2aedf3053b33f3e76ab2fe7b7604e18c12629b3ea29d108adc553bf76fa9d2e34fa9870bff5f0ffb926d3bd213f0c3b6841cbc7bce402781abefa6fd4260c8c5382ecc00fadc0e2ca8151830d10f019f63fd61ac039e4b44ddb6656ace1bf8135e9b0821ef9b3906c7bef0accdfbd50db07998b4ebe82f63eb077498caeb23fc136957a1d86b0724eaf5aecd8ba3c4b8d8d726bbdb9d80a27458d738328f00067c9682cf47a4374c92e5332aab9cb594dda278bdcf958eef52afc2363f1fe9f60d5ac1b93a2dd119f32466c48a624a98975dcde59a0ae0ecadf5d08395feeb5135f6915db5473d1749a6f8e70eaf55ddf492fde4342871de611de1c09b77c299ae4727778df2053f1ef4d52b69b28177403770218798623610f8eecf76612004e86b35f810722a80940c0f1196798bf6438605c390edb5498744618fd65e54e5491548ed52e07771dec8aea676657fbd0ab0d819721d609a6b1ae22d9106c28803248f1db363b1bf7c2f8cd530664ad16574891c03175b1a6f2e2ce7ec4f04a7af95f595d89e760edb4e513be3f2a74bf2aed21f1436d913f0b1809f639efa023bc30abfc509dfa6a1aaa7ff2cd2c5aa69e9e2c99bdb009226ad67c9cdd4b46ea063ba817133b525b380b6cb6c93c22714ac00559b57babf21718006d7f153ca7bca37a976fd519384b821440d43807125bf04c9edfcc6707351c00b5f99801ae4285f240ac58c303a923fcc784beadcb3b937aa6784783959f6785687bdc262135ca06aa47b2a056b7c95d76d0e7734ff5d0990885a794b0b94ad26a57a47e3d909483092fa817e64e1f4dad5b4d9bb5f3b5bc10b3e42db87c2fe25ffc563aaaafdb6144d6504cb4d6a9558327293d4ea9f6332bac4ee8e14b826fb7f024a997aed80887c1312ee88ab013fd7af0688c36b10c3d5ff1f21fd824c949cacb8df7abfafccfb2263812909e151af653d5e009d700e5e104dbd5c0715761b24e52345720bd265d5e1c750165934c4a2e164e73817a56aa096a02d281980b78f8fd6916b4ed9c0a27ba5b4cf3f0ba99caa2ca2a2851346f79fc6eb5bf153d30e49fd08a78f4c6e24485855a67b6ca8142d5dbd5ce62fba98b5dee0fdc87feb61410332cb1507c79fcc6c5dc0ba03b9d1555ac0e1413b758467d8fa3b002bd6595fac2a90bbbfd7c672c2f1047cbbd6fb583b75d7ed7d5804d8e29b45a28f52974e870387b3e9"], 0x2000, 0x0) 4.907634038s ago: executing program 4 (id=18355): bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000340)=@newlink={0x40, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0xffff}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gtp={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GTP_RESTART_COUNT={0x5, 0x6, 0x1}, @IFLA_GTP_ROLE={0x8, 0x4, 0x1}]}}}]}, 0x40}}, 0x0) 4.888810598s ago: executing program 4 (id=18356): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) acct(0xfffffffffffffffe) 4.814877178s ago: executing program 4 (id=18357): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="140000001000040000000000000000000000000a20000000000a05000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021940000000c0a01030000000000000000070000000900020073797a31000000000900010073797a30000000006800038064000080080003400000000258000b80200001800a00010071756f7461"], 0x118}}, 0x0) 2.001506418s ago: executing program 3 (id=18416): bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='memory.stat\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x5007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) sendfile(r1, r0, 0x0, 0x17) 1.965366527s ago: executing program 1 (id=18417): socket$kcm(0x21, 0x2, 0x2) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x11, 0x4, 0x4, 0xbf22, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = socket(0x2c, 0x3, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x11, 0x4, 0x4, 0xff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r3, &(0x7f0000000140), &(0x7f0000000080)=@udp6=r2}, 0x20) close_range(r1, 0xffffffffffffffff, 0x0) 1.925120927s ago: executing program 3 (id=18419): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000005ec0)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) sync() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x4d0, 0x0, 0x25, 0x148, 0x340, 0x60, 0x438, 0x2a8, 0x2a8, 0x438, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x44, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'dvmrp1\x00', {0xff}}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@cgroup0={{0x28}, {0x4}}, @common=@unspec=@statistic={{0x38}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x9, 0x8001}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x530) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="090000000700000003000000"], 0x48) close(0x3) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x50, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x40100}}}}}}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x60676}]}, 0x50}}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) recvmmsg$unix(r4, &(0x7f0000005bc0)=[{{&(0x7f0000000380), 0x6e, &(0x7f00000008c0)=[{&(0x7f0000000400)=""/52, 0x34}, {&(0x7f0000001bc0)=""/4096, 0x1000}, {&(0x7f0000000440)=""/194, 0xc2}, {&(0x7f0000000540)=""/14, 0xe}, {&(0x7f0000000580)=""/29, 0x1d}, {&(0x7f00000005c0)=""/99, 0x63}, {&(0x7f0000002bc0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/116, 0x74}, {&(0x7f00000006c0)=""/122, 0x7a}, {&(0x7f0000000740)=""/170, 0xaa}], 0xa, &(0x7f0000000a00)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x50}}, {{&(0x7f0000000a80), 0x6e, &(0x7f0000000980)=[{&(0x7f0000000b00)=""/226, 0xe2}], 0x1}}, {{&(0x7f0000000c40)=@abs, 0x6e, &(0x7f0000001080)=[{&(0x7f0000000cc0)=""/136, 0x88}, {&(0x7f0000000d80)=""/198, 0xc6}, {&(0x7f0000000e80)=""/122, 0x7a}, {&(0x7f0000000f00)=""/156, 0x9c}, {&(0x7f0000000fc0)=""/162, 0xa2}], 0x5}}, {{&(0x7f0000001280), 0x6e, &(0x7f00000013c0)=[{&(0x7f0000003bc0)=""/4096, 0x1000}, {&(0x7f0000001300)=""/152, 0x98}], 0x2, &(0x7f0000001400)=[@rights={{0x10}}], 0x10}}, {{&(0x7f0000001440)=@abs, 0x6e, &(0x7f00000016c0)=[{&(0x7f00000014c0)}, {&(0x7f0000001500)=""/110, 0x6e}, {&(0x7f0000001580)=""/249, 0xf9}, {&(0x7f0000001680)=""/1, 0x1}, {&(0x7f0000004bc0)=""/4096, 0x1000}], 0x5, &(0x7f0000001740)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001780)=@abs, 0x6e, &(0x7f0000001a80)=[{&(0x7f0000001800)=""/91, 0x5b}, {&(0x7f0000001880)=""/126, 0x7e}, {&(0x7f0000001900)=""/210, 0xd2}, {&(0x7f0000001a00)=""/56, 0x38}, {&(0x7f0000001a40)=""/7, 0x7}], 0x5, &(0x7f0000001b00)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}}], 0x6, 0x102, &(0x7f0000005d40)={0x77359400}) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) capset(&(0x7f0000000c00)={0x20080522}, &(0x7f0000000140)={0x0, 0x3, 0x7, 0x0, 0x101, 0x8a}) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) 1.924910467s ago: executing program 1 (id=18420): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x18) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup2(r2, r2) connect$pppl2tp(r3, &(0x7f00000000c0)=@pppol2tp={0xa, 0x1, {0xffff0000, 0xffffffffffffffff, {0x2, 0x0, @remote}, 0x0, 0x0, 0x2}}, 0x26) sendmsg$netlink(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000009940)=ANY=[], 0x290}, {&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x8bc}, {0x0}], 0x3}, 0x0) 1.893406767s ago: executing program 1 (id=18422): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000850}, 0x0) 1.823519527s ago: executing program 1 (id=18424): bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="020000000400000007000000020000000010"], 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x20, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000002000000000070000950000202e0000002000"], &(0x7f0000000240)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) semctl$IPC_RMID(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000040)='f2fs_readpages\x00', r0, 0x0, 0x1}, 0x18) unshare(0x60600) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r1, @ANYBLOB="fb12ab0d0c6962ad8288e9976a73fd534d00"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = syz_open_dev$evdev(0x0, 0x0, 0x0) syz_usb_disconnect(r2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x10) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[], 0x10}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) rseq(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x6}, 0x20, 0x3, 0x0) r3 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x19, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) membarrier(0x10, 0x0) sendmsg$key(r3, &(0x7f0000000180)={0x400000000000000, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="020f000015000000000000000000000005000500000000000a00000000000000000000000000000000000000000000000004000000000000080012000000020000000000020000000600000000000000090000000000000000000000000000000000000000000000ff01000000000000000000000000000105000600000000000a000002ffffffffff0200000000000000000000000000010000000000000000010018"], 0xa8}}, 0x0) socket$packet(0x11, 0x3, 0x300) 1.823109917s ago: executing program 6 (id=18425): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="140000001000040000000000000000000000000a20000000000a05000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021940000000c0a01030000000000000000070000000900020073797a31000000000900010073797a30000000006800038064000080080003400000000258000b80200001800a00010071756f7461000000100002800c0001400000000000000000340001800a00"], 0x118}}, 0x0) 1.794025857s ago: executing program 6 (id=18426): openat$rdma_cm(0xffffff9c, &(0x7f00000006c0), 0x2, 0x0) io_uring_enter(0xffffffffffffffff, 0x2def, 0x0, 0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0xfffd, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x18, 0x0, @wg=@data={0x4, 0xe, 0x9}}}}}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0xb68, 0x6, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 1.406751186s ago: executing program 6 (id=18437): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x20000000000000f4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) mount_setattr(0xffffffffffffff9c, 0x0, 0x5100, &(0x7f0000000080)={0x0, 0x0, 0x20000}, 0x20) 1.386771085s ago: executing program 6 (id=18438): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000005ec0)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) sync() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000580)=@raw={'raw\x00', 0x8, 0x3, 0x4d0, 0x0, 0x25, 0x148, 0x340, 0x60, 0x438, 0x2a8, 0x2a8, 0x438, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x44, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'dvmrp1\x00', {0xff}}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@cgroup0={{0x28}, {0x4}}, @common=@unspec=@statistic={{0x38}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x9, 0x8001}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x530) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="090000000700000003000000"], 0x48) close(0x3) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x50, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @veth={{0x9}, {0x18, 0x2, 0x0, 0x1, @val=@VETH_INFO_PEER={0x14, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x40100}}}}}}, @IFLA_GSO_MAX_SIZE={0x8, 0x29, 0x60676}]}, 0x50}}, 0x0) ftruncate(0xffffffffffffffff, 0x51a9497) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) recvmmsg$unix(r4, &(0x7f0000005bc0)=[{{&(0x7f0000000380), 0x6e, &(0x7f00000008c0)=[{&(0x7f0000000400)=""/52, 0x34}, {&(0x7f0000001bc0)=""/4096, 0x1000}, {&(0x7f0000000440)=""/194, 0xc2}, {&(0x7f0000000540)=""/14, 0xe}, {&(0x7f0000000580)=""/29, 0x1d}, {&(0x7f00000005c0)=""/99, 0x63}, {&(0x7f0000002bc0)=""/4096, 0x1000}, {&(0x7f0000000640)=""/116, 0x74}, {&(0x7f00000006c0)=""/122, 0x7a}, {&(0x7f0000000740)=""/170, 0xaa}], 0xa, &(0x7f0000000a00)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x50}}, {{&(0x7f0000000a80), 0x6e, &(0x7f0000000980)=[{&(0x7f0000000b00)=""/226, 0xe2}], 0x1}}, {{&(0x7f0000000c40)=@abs, 0x6e, &(0x7f0000001080)=[{&(0x7f0000000cc0)=""/136, 0x88}, {&(0x7f0000000d80)=""/198, 0xc6}, {&(0x7f0000000e80)=""/122, 0x7a}, {&(0x7f0000000f00)=""/156, 0x9c}, {&(0x7f0000000fc0)=""/162, 0xa2}], 0x5}}, {{&(0x7f0000001280), 0x6e, &(0x7f00000013c0)=[{&(0x7f0000003bc0)=""/4096, 0x1000}, {&(0x7f0000001300)=""/152, 0x98}], 0x2, &(0x7f0000001400)=[@rights={{0x10}}], 0x10}}, {{&(0x7f0000001440)=@abs, 0x6e, &(0x7f00000016c0)=[{&(0x7f00000014c0)}, {&(0x7f0000001500)=""/110, 0x6e}, {&(0x7f0000001580)=""/249, 0xf9}, {&(0x7f0000001680)=""/1, 0x1}, {&(0x7f0000004bc0)=""/4096, 0x1000}], 0x5, &(0x7f0000001740)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{&(0x7f0000001780)=@abs, 0x6e, &(0x7f0000001a80)=[{&(0x7f0000001800)=""/91, 0x5b}, {&(0x7f0000001880)=""/126, 0x7e}, {&(0x7f0000001900)=""/210, 0xd2}, {&(0x7f0000001a00)=""/56, 0x38}, {&(0x7f0000001a40)=""/7, 0x7}], 0x5, &(0x7f0000001b00)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x60}}], 0x6, 0x102, &(0x7f0000005d40)={0x77359400}) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) capset(&(0x7f0000000c00)={0x20080522}, &(0x7f0000000140)={0x0, 0x3, 0x7, 0x0, 0x101, 0x8a}) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000140)=0x2) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) sync() 1.316322205s ago: executing program 0 (id=18441): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x18) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup2(r2, r2) connect$pppl2tp(r3, &(0x7f00000000c0)=@pppol2tp={0xa, 0x1, {0xffff0000, 0xffffffffffffffff, {0x2, 0x0, @remote}, 0x0, 0x0, 0x2}}, 0x26) sendmsg$netlink(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000009940)=ANY=[], 0x290}, {&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x8bc}, {0x0}], 0x3}, 0x0) 1.298955015s ago: executing program 0 (id=18442): syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000002000000000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='kmem_cache_free\x00', r2}, 0x18) fcntl$setlease(r1, 0x400, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x200000005c832, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_linger(r4, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e27, 0xffffffff, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r4, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980), 0x171}}], 0x400000000000172, 0x4001c00) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="780100003c000701fcffffff00000003047c000004003680600101"], 0x178}, 0x1, 0x0, 0x0, 0x4c040}, 0xc000) syz_genetlink_get_family_id$smc(&(0x7f00000001c0), r5) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061134c0000000000bf20000000000000160005003f1b48013d030100000000009500000000000000bc26000000000000bf67000000000000070600000fff07006702000003000000360600000ee600f0bf052000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a83683d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf5fe7030586"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x57, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x9}, 0x1204c, 0x81, 0x7, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) close(0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 1.050537914s ago: executing program 3 (id=18443): syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000002000000000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='kmem_cache_free\x00', r2}, 0x18) fcntl$setlease(r1, 0x400, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x200000005c832, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_linger(r4, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e27, 0xffffffff, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(r4, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980), 0x171}}], 0x400000000000172, 0x4001c00) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="780100003c000701fcffffff00000003047c000004003680600101"], 0x178}, 0x1, 0x0, 0x0, 0x4c040}, 0xc000) syz_genetlink_get_family_id$smc(&(0x7f00000001c0), r5) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x2, 0x16, &(0x7f0000000180)=ANY=[@ANYBLOB="611230000000000061134c0000000000bf20000000000000160005003f1b48013d030100000000009500000000000000bc26000000000000bf67000000000000070600000fff07006702000003000000360600000ee600f0bf052000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a83683d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf5fe7030586"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x57, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x9}, 0x1204c, 0x81, 0x7, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) close(0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 742.250013ms ago: executing program 0 (id=18444): bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000380)='memory.stat\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x5007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000000000000000000004b84ffec850000006d000000850000002a"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kfree\x00', r3}, 0x10) sendfile(r2, r1, 0x0, 0x17) 708.266953ms ago: executing program 1 (id=18445): bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = socket(0x840000000002, 0x3, 0xff) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="020000000400000008000000010000"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1, 0xffffffffffffffff}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000a40)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='gre0\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000000440)=[{{&(0x7f00000001c0)={0x2, 0x100, @multicast1}, 0x10, &(0x7f0000001980)=[{&(0x7f0000000200)="a9050000000074640000000000003552bde5c064c6", 0x15}, {&(0x7f0000000340)="174640b6d80fb2eedc81ba60ccbb9d", 0xf}], 0x2}}, {{&(0x7f00000004c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000380)="d2a9817993e7a6f7a52d9c0d54e05e177a190273", 0x14}], 0x1}}], 0x2, 0x0) 659.362803ms ago: executing program 1 (id=18446): r0 = socket(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000100)="c10e000018001f06b9409b0dffff110d0207be040205060506100a044300040018000000fac8388827a685a168d9a44604094565360c648dcaaf6c26c291214549932fde4a460c89b6ec0cff3959547f509058ba86c902fc3a10004a320c0400160012000a000000000000000000000807", 0x71, 0x0, 0x0, 0x0) 655.953202ms ago: executing program 4 (id=18361): r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3c, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000, 0x0, 0x0, 0xc, 0x3, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket$inet6(0xa, 0x3, 0x3a) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2, 0x0, 0x2}, 0x18) syz_emit_ethernet(0x66, &(0x7f00000002c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa86dd6002adf700303a00fe8a0000000000000000000000000001ff02000000000000000000000000000102"], 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r3 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) r6 = fsmount(r3, 0x0, 0x6) symlinkat(&(0x7f0000000400)='./file0/../file0\x00', r6, &(0x7f00000003c0)='./file0\x00') readlinkat(r6, &(0x7f00000001c0)='./file0/../file0\x00', &(0x7f00000002c0)=""/198, 0xc6) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) r7 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r7, 0x10e, 0xc, &(0x7f00000001c0)={0x5813}, 0x10) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/rt_acct\x00') r9 = socket(0x18, 0x0, 0x0) connect$pppoe(r9, &(0x7f0000000100)={0x18, 0x0, {0x2, @broadcast, 'vxcan1\x00'}}, 0x1e) socket$nl_generic(0x10, 0x3, 0x10) sendfile(r9, r8, 0x0, 0x8) 631.390572ms ago: executing program 3 (id=18448): bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000380)='memory.stat\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x5007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000000000000000000004b84ffec850000006d000000850000002a0000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kfree\x00', r3}, 0x10) sendfile(r2, r1, 0x0, 0x17) 571.147903ms ago: executing program 0 (id=18449): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) mount_setattr(0xffffffffffffff9c, 0x0, 0x5100, &(0x7f0000000080)={0x0, 0x0, 0x20000}, 0x20) 544.589412ms ago: executing program 3 (id=18450): bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="020000000400000007000000020000000010"], 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x20, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000002000000000070000950000202e0000002000"], &(0x7f0000000240)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = semget(0x3, 0x2, 0x284) semctl$IPC_RMID(r2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000040)='f2fs_readpages\x00', r0, 0x0, 0x1}, 0x18) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r3, @ANYBLOB="fb12ab0d0c6962ad8288e9976a73fd534d00"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r3, 0x0}, 0x20) syz_open_dev$evdev(0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x10) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[], 0x10}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x400008a, 0x0) syz_usb_connect$cdc_ecm(0x0, 0x7d, &(0x7f00000009c0)=ANY=[@ANYBLOB="12010000020000082505a1a440000000010109026b000101050000090400de00020600000b2406000000004000000005240010000d240f010000000000000000000c241b0600f9ff0402f96605152412ef0ba317a88b045e4f01a60000ffcb7e392a0905810310000404fe090579bc000000000e090503020000000000af0dc977656bdce00abc52099611f36ca8c8ad329ae3e4c09f9433ef453546a4215a78022d945b2241ae6ce99ebd6cb77e764711380a56a362b586b4ca2c9cae85dd866bae5f8ff55860dfbd79aa5df3b677d221097e3f2639d8d94e29218b2237677cbdf6d3d72c04153e9033e768e5f22576dadec001ba9b1f92e5f71241e8593895348d80e7af800ed9235b81fd523d663455f428f691ce4c8a1f2975b69659835215218f68951dea19825fe26ea7c909d6d218a880d8272649bf21fb0b12ab103808d4e9d7b99d7a3dd8cf347291edf7b73d507a5ee086eb1243c80b6628074e89d476269534ed970afedad09da0e1dff1c9"], 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='kmem_cache_free\x00', r1, 0x0, 0xffffffffffffffa3}, 0x18) r4 = socket$key(0xf, 0x3, 0x2) pipe(0x0) socket$netlink(0x10, 0x3, 0x12) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) membarrier(0x10, 0x0) membarrier(0x8, 0x0) sendmsg$key(r4, &(0x7f0000000180)={0x400000000000000, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="020f000015000000000000000000000005000500000000000a00000000000000000000000000000000000000000000000004000000000000080012000000020000000000020000000600000000000000090000000000000000000000000000000000000000000000ff01000000000000000000000000000105000600000000000a000002ffffffffff0200000000000000000000000000010000000000000000010018"], 0xa8}}, 0x0) 543.974142ms ago: executing program 0 (id=18451): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x18) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup2(r2, r2) connect$pppl2tp(r3, &(0x7f00000000c0)=@pppol2tp={0xa, 0x1, {0xffff0000, 0xffffffffffffffff, {0x2, 0x0, @remote}, 0x0, 0x0, 0x2}}, 0x26) sendmsg$netlink(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000009940)=ANY=[], 0x290}, {&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x8bc}, {0x0}], 0x3}, 0x0) 517.472332ms ago: executing program 6 (id=18452): syz_mount_image$ext4(&(0x7f0000000180)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0x10, &(0x7f0000000140)={[{@prjquota}]}, 0xee, 0x483, &(0x7f0000000f00)="$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") creat(&(0x7f0000000e00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x83) io_setup(0x5, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000440)='.\x00', 0x12000021) 511.542462ms ago: executing program 0 (id=18453): bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="020000000400000007000000020000000010"], 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x20, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000002000000000070000950000202e0000002000"], &(0x7f0000000240)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = semget(0x3, 0x2, 0x284) semctl$IPC_RMID(r2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000040)='f2fs_readpages\x00', r0, 0x0, 0x1}, 0x18) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r3, @ANYBLOB="fb12ab0d0c6962ad8288e9976a73fd534d00"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r3, 0x0}, 0x20) syz_open_dev$evdev(0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x10) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[], 0x10}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000180), 0x400008a, 0x0) syz_usb_connect$cdc_ecm(0x0, 0x7d, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='kmem_cache_free\x00', r1, 0x0, 0xffffffffffffffa3}, 0x18) r4 = socket$key(0xf, 0x3, 0x2) pipe(0x0) socket$netlink(0x10, 0x3, 0x12) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) membarrier(0x10, 0x0) membarrier(0x8, 0x0) sendmsg$key(r4, &(0x7f0000000180)={0x400000000000000, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="020f000015000000000000000000000005000500000000000a00000000000000000000000000000000000000000000000004000000000000080012000000020000000000020000000600000000000000090000000000000000000000000000000000000000000000ff01000000000000000000000000000105000600000000000a000002ffffffffff0200000000000000000000000000010000000000000000010018"], 0xa8}}, 0x0) 486.846052ms ago: executing program 4 (id=18454): bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="020000000400000007000000020000000010"], 0x48) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = semget(0x3, 0x2, 0x284) semctl$IPC_RMID(r1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000040)='f2fs_readpages\x00', r0, 0x0, 0x1}, 0x18) unshare(0x60600) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r2, @ANYBLOB="fb12ab0d0c6962ad8288e9976a73fd534d00"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = syz_open_dev$evdev(0x0, 0x0, 0x0) syz_usb_disconnect(r3) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x10) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[], 0x10}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) rseq(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x6}, 0x20, 0x3, 0x0) r4 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x19, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) membarrier(0x10, 0x0) sendmsg$key(r4, &(0x7f0000000180)={0x400000000000000, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="020f000015000000000000000000000005000500000000000a00000000000000000000000000000000000000000000000004000000000000080012000000020000000000020000000600000000000000090000000000000000000000000000000000000000000000ff01000000000000000000000000000105000600000000000a000002ffffffffff0200000000000000000000000000010000000000000000010018"], 0xa8}}, 0x0) socket$packet(0x11, 0x3, 0x300) 469.298452ms ago: executing program 6 (id=18455): close(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) getresgid(&(0x7f0000000140), &(0x7f0000000040), &(0x7f0000000240)) socket(0x1e, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00'}, 0x10) socket$inet6(0xa, 0x40000080806, 0x0) r3 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @empty}, 0x1c) 0s ago: executing program 3 (id=18456): bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = socket(0x840000000002, 0x3, 0xff) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="020000000400000008000000010000"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1, 0xffffffffffffffff}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000a40)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='gre0\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000000440)=[{{&(0x7f00000001c0)={0x2, 0x100, @multicast1}, 0x10, &(0x7f0000001980)=[{&(0x7f0000000200)="a9050000000074640000000000003552bde5c064c6", 0x15}, {&(0x7f0000000340)="174640b6d80fb2eedc81ba60ccbb9d", 0xf}], 0x2}}, {{&(0x7f00000004c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000380)="d2a9817993e7a6f7a52d9c0d54e05e177a190273", 0x14}], 0x1}}], 0x2, 0x0) kernel console output (not intermixed with test programs): adm_t pid=18873 comm="syz.6.16847" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f6953405d19 code=0x7ffc0000 [ 1466.214730][ T29] audit: type=1326 audit(1734463226.434:57586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18873 comm="syz.6.16847" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6953405d19 code=0x7ffc0000 [ 1466.238439][ T29] audit: type=1326 audit(1734463226.434:57587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18873 comm="syz.6.16847" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6953405d19 code=0x7ffc0000 [ 1466.262241][ T29] audit: type=1326 audit(1734463226.434:57588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18873 comm="syz.6.16847" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat=0 ip=0x7f6953405d19 code=0x7ffc0000 [ 1466.285887][ T29] audit: type=1326 audit(1734463226.434:57589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18873 comm="syz.6.16847" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6953405d19 code=0x7ffc0000 [ 1466.309593][ T29] audit: type=1326 audit(1734463226.434:57590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18873 comm="syz.6.16847" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6953405d19 code=0x7ffc0000 [ 1466.504195][T18902] netlink: 4 bytes leftover after parsing attributes in process `syz.3.16857'. [ 1466.531143][T18902] veth1: entered promiscuous mode [ 1466.540231][T18902] macvtap1: entered promiscuous mode [ 1466.559904][T18902] veth1: left promiscuous mode [ 1466.990703][T18952] FAULT_INJECTION: forcing a failure. [ 1466.990703][T18952] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1467.003841][T18952] CPU: 0 UID: 0 PID: 18952 Comm: syz.6.16880 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 1467.014714][T18952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 1467.024764][T18952] Call Trace: [ 1467.028039][T18952] [ 1467.030967][T18952] dump_stack_lvl+0xf2/0x150 [ 1467.035677][T18952] dump_stack+0x15/0x1a [ 1467.039844][T18952] should_fail_ex+0x223/0x230 [ 1467.044540][T18952] should_fail+0xb/0x10 [ 1467.048702][T18952] should_fail_usercopy+0x1a/0x20 [ 1467.053749][T18952] _copy_from_user+0x1e/0xb0 [ 1467.058428][T18952] input_event_from_user+0x126/0x1e0 [ 1467.063744][T18952] evdev_write+0x29d/0x440 [ 1467.068177][T18952] ? __pfx_evdev_write+0x10/0x10 [ 1467.073196][T18952] vfs_write+0x281/0x920 [ 1467.077489][T18952] ? putname+0xcf/0xf0 [ 1467.081620][T18952] ? __fget_files+0x17c/0x1c0 [ 1467.086317][T18952] ksys_write+0xe8/0x1b0 [ 1467.090626][T18952] __x64_sys_write+0x42/0x50 [ 1467.095372][T18952] x64_sys_call+0x287e/0x2dc0 [ 1467.100108][T18952] do_syscall_64+0xc9/0x1c0 [ 1467.104611][T18952] ? clear_bhb_loop+0x55/0xb0 [ 1467.109366][T18952] ? clear_bhb_loop+0x55/0xb0 [ 1467.114049][T18952] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1467.120017][T18952] RIP: 0033:0x7f6953405d19 [ 1467.124508][T18952] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1467.144151][T18952] RSP: 002b:00007f6951a77038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1467.152588][T18952] RAX: ffffffffffffffda RBX: 00007f69535f5fa0 RCX: 00007f6953405d19 [ 1467.160567][T18952] RDX: 00000000000012d8 RSI: 0000000020000040 RDI: 0000000000000003 [ 1467.168637][T18952] RBP: 00007f6951a77090 R08: 0000000000000000 R09: 0000000000000000 [ 1467.176606][T18952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1467.184579][T18952] R13: 0000000000000000 R14: 00007f69535f5fa0 R15: 00007ffcd3c47ae8 [ 1467.192602][T18952] [ 1467.196512][T18943] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1467.204929][T18943] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1467.889130][T18987] syz.0.16896 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=1000 [ 1467.900288][T18987] CPU: 1 UID: 0 PID: 18987 Comm: syz.0.16896 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 1467.911169][T18987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 1467.921231][T18987] Call Trace: [ 1467.924512][T18987] [ 1467.927439][T18987] dump_stack_lvl+0xf2/0x150 [ 1467.932085][T18987] dump_stack+0x15/0x1a [ 1467.936254][T18987] dump_header+0x83/0x2d0 [ 1467.940596][T18987] oom_kill_process+0x341/0x4c0 [ 1467.945443][T18987] out_of_memory+0x9af/0xbe0 [ 1467.950092][T18987] ? css_next_descendant_pre+0x11c/0x140 [ 1467.955729][T18987] mem_cgroup_out_of_memory+0x13e/0x190 [ 1467.961301][T18987] try_charge_memcg+0x508/0x7f0 [ 1467.966168][T18987] charge_memcg+0x50/0xc0 [ 1467.970520][T18987] mem_cgroup_swapin_charge_folio+0xd0/0x150 [ 1467.976497][T18987] __read_swap_cache_async+0x236/0x480 [ 1467.982003][T18987] swap_cluster_readahead+0x279/0x3f0 [ 1467.987376][T18987] swapin_readahead+0xe4/0x6f0 [ 1467.992215][T18987] ? __lruvec_stat_mod_folio+0xdb/0x120 [ 1467.997828][T18987] ? swap_cache_get_folio+0x77/0x210 [ 1468.003108][T18987] do_swap_page+0x31b/0x2550 [ 1468.007699][T18987] ? __rcu_read_lock+0x36/0x50 [ 1468.012538][T18987] ? __pfx_default_wake_function+0x10/0x10 [ 1468.018337][T18987] handle_mm_fault+0x8e4/0x2ac0 [ 1468.023347][T18987] exc_page_fault+0x3b9/0x650 [ 1468.028021][T18987] asm_exc_page_fault+0x26/0x30 [ 1468.032928][T18987] RIP: 0033:0x7f8952cecb1c [ 1468.037329][T18987] Code: 66 0f 1f 44 00 00 69 3d 96 8b e4 00 e8 03 00 00 48 8d 1d 97 94 31 00 e8 62 91 12 00 eb 0c 48 81 c3 e0 00 00 00 48 39 eb 74 24 <80> 7b 20 00 74 ee 8b 43 0c 85 c0 74 e7 48 89 df 48 81 c3 e0 00 00 [ 1468.056926][T18987] RSP: 002b:00007ffcdbf7e980 EFLAGS: 00010206 [ 1468.062983][T18987] RAX: 0000000000000000 RBX: 00007f8953005fa0 RCX: 0000000000000000 [ 1468.070942][T18987] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000055558ce96808 [ 1468.078931][T18987] RBP: 00007f8953007ba0 R08: 0000000000000000 R09: 7fffffffffffffff [ 1468.086924][T18987] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000166809 [ 1468.094899][T18987] R13: 00007ffcdbf7ea80 R14: 0000000000000032 R15: ffffffffffffffff [ 1468.102887][T18987] [ 1468.106153][T18987] memory: usage 307200kB, limit 307200kB, failcnt 3078 [ 1468.113281][T18987] memory+swap: usage 307548kB, limit 9007199254740988kB, failcnt 0 [ 1468.121173][T18987] kmem: usage 307188kB, limit 9007199254740988kB, failcnt 0 [ 1468.128473][T18987] Memory cgroup stats for /syz0: [ 1468.129104][T18987] cache 0 [ 1468.137060][T18987] rss 0 [ 1468.139814][T18987] shmem 0 [ 1468.142776][T18987] mapped_file 0 [ 1468.146228][T18987] dirty 0 [ 1468.149153][T18987] writeback 8192 [ 1468.152749][T18987] workingset_refault_anon 2835 [ 1468.157573][T18987] workingset_refault_file 329 [ 1468.162240][T18987] swap 360448 [ 1468.165553][T18987] swapcached 8192 [ 1468.169256][T18987] pgpgin 1821903 [ 1468.172836][T18987] pgpgout 1821901 [ 1468.176520][T18987] pgfault 2148158 [ 1468.180141][T18987] pgmajfault 408 [ 1468.183755][T18987] inactive_anon 8192 [ 1468.187633][T18987] active_anon 0 [ 1468.191179][T18987] inactive_file 0 [ 1468.194840][T18987] active_file 0 [ 1468.198288][T18987] unevictable 0 [ 1468.201734][T18987] hierarchical_memory_limit 314572800 [ 1468.207166][T18987] hierarchical_memsw_limit 9223372036854771712 [ 1468.207518][T18998] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1468.213400][T18987] total_cache 0 [ 1468.213410][T18987] total_rss 0 [ 1468.213416][T18987] total_shmem 0 [ 1468.213423][T18987] total_mapped_file 0 [ 1468.213431][T18987] total_dirty 0 [ 1468.213438][T18987] total_writeback 8192 [ 1468.213446][T18987] total_workingset_refault_anon 2835 [ 1468.224546][T18998] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1468.225218][T18987] total_workingset_refault_file 329 [ 1468.261720][T18987] total_swap 360448 [ 1468.265542][T18987] total_swapcached 8192 [ 1468.269695][T18987] total_pgpgin 1821932 [ 1468.273803][T18987] total_pgpgout 1821930 [ 1468.277958][T18987] total_pgfault 2148197 [ 1468.282169][T18987] total_pgmajfault 408 [ 1468.286265][T18987] total_inactive_anon 8192 [ 1468.290712][T18987] total_active_anon 0 [ 1468.294700][T18987] total_inactive_file 0 [ 1468.298880][T18987] total_active_file 0 [ 1468.302872][T18987] total_unevictable 0 [ 1468.306854][T18987] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz.0.16896,pid=18987,uid=0 [ 1468.321666][T18987] Memory cgroup out of memory: Killed process 18987 (syz.0.16896) total-vm:93312kB, anon-rss:784kB, file-rss:22216kB, shmem-rss:0kB, UID:0 pgtables:120kB oom_score_adj:1000 [ 1468.404298][T19012] netlink: 4 bytes leftover after parsing attributes in process `syz.4.16907'. [ 1468.869757][T19040] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1468.878545][T19040] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1469.418229][T19103] xfrm0 speed is unknown, defaulting to 1000 [ 1469.426302][T19103] lo speed is unknown, defaulting to 1000 [ 1469.543249][T19120] netlink: 4 bytes leftover after parsing attributes in process `syz.4.16948'. [ 1469.618603][T19128] xfrm0 speed is unknown, defaulting to 1000 [ 1469.632549][T19128] lo speed is unknown, defaulting to 1000 [ 1470.418253][T19186] netlink: 4 bytes leftover after parsing attributes in process `syz.3.16973'. [ 1470.514996][T19177] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1470.528395][T19177] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1470.610783][T19207] netlink: 4 bytes leftover after parsing attributes in process `syz.6.16980'. [ 1470.632142][T19207] veth1: entered promiscuous mode [ 1470.637521][T19207] macvtap1: entered promiscuous mode [ 1470.645138][T19207] veth1: left promiscuous mode [ 1471.077679][ T29] kauditd_printk_skb: 1094 callbacks suppressed [ 1471.077722][ T29] audit: type=1400 audit(1734463231.484:58685): avc: denied { create } for pid=19246 comm="syz.3.16995" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1471.115631][ T29] audit: type=1400 audit(1734463231.524:58686): avc: denied { ioctl } for pid=19246 comm="syz.3.16995" path="socket:[186393]" dev="sockfs" ino=186393 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1471.173255][ T29] audit: type=1400 audit(1734463231.524:58687): avc: denied { create } for pid=19248 comm="syz.3.16996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1471.193272][ T29] audit: type=1400 audit(1734463231.524:58688): avc: denied { ioctl } for pid=19248 comm="syz.3.16996" path="socket:[187430]" dev="sockfs" ino=187430 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1471.218763][ T29] audit: type=1400 audit(1734463231.524:58689): avc: denied { prog_run } for pid=19248 comm="syz.3.16996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1471.238027][ T29] audit: type=1400 audit(1734463231.554:58690): avc: denied { execmem } for pid=19248 comm="syz.3.16996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1471.238052][ T29] audit: type=1326 audit(1734463231.564:58691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19250 comm="syz.0.16997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8952e15d19 code=0x7ffc0000 [ 1471.238078][ T29] audit: type=1326 audit(1734463231.564:58692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19250 comm="syz.0.16997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8952e15d19 code=0x7ffc0000 [ 1471.238127][ T29] audit: type=1326 audit(1734463231.564:58693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19250 comm="syz.0.16997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8952e15d19 code=0x7ffc0000 [ 1471.238157][ T29] audit: type=1326 audit(1734463231.564:58694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19250 comm="syz.0.16997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8952e15d19 code=0x7ffc0000 [ 1471.518340][T19264] xfrm0 speed is unknown, defaulting to 1000 [ 1471.560867][T19264] lo speed is unknown, defaulting to 1000 [ 1471.571055][T19278] netlink: 40 bytes leftover after parsing attributes in process `syz.3.16996'. [ 1471.580169][T19278] netlink: 40 bytes leftover after parsing attributes in process `syz.3.16996'. [ 1471.927358][T19297] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1471.936626][T19320] netlink: 4 bytes leftover after parsing attributes in process `syz.1.17024'. [ 1471.946522][T19297] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1472.232571][T19349] netlink: 4 bytes leftover after parsing attributes in process `syz.3.17037'. [ 1472.275518][T19351] xfrm0 speed is unknown, defaulting to 1000 [ 1472.282175][T19351] lo speed is unknown, defaulting to 1000 [ 1472.283067][T19336] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1472.297374][T19336] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1472.387981][T19365] netlink: 4 bytes leftover after parsing attributes in process `syz.3.17043'. [ 1472.467473][T19377] netlink: 4 bytes leftover after parsing attributes in process `syz.6.17048'. [ 1472.542725][T19387] xfrm0 speed is unknown, defaulting to 1000 [ 1472.549022][T19387] lo speed is unknown, defaulting to 1000 [ 1472.699618][T19383] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1472.708163][T19383] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1473.411602][T19491] FAULT_INJECTION: forcing a failure. [ 1473.411602][T19491] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1473.424765][T19491] CPU: 0 UID: 0 PID: 19491 Comm: syz.6.17098 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 1473.435617][T19491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 1473.445671][T19491] Call Trace: [ 1473.448954][T19491] [ 1473.451878][T19491] dump_stack_lvl+0xf2/0x150 [ 1473.456479][T19491] dump_stack+0x15/0x1a [ 1473.460732][T19491] should_fail_ex+0x223/0x230 [ 1473.465562][T19491] should_fail+0xb/0x10 [ 1473.469710][T19491] should_fail_usercopy+0x1a/0x20 [ 1473.474770][T19491] _copy_from_user+0x1e/0xb0 [ 1473.479360][T19491] io_register_files_update+0x5a/0x100 [ 1473.484851][T19491] __se_sys_io_uring_register+0xaf3/0x21d0 [ 1473.490656][T19491] ? get_pid_task+0x8e/0xc0 [ 1473.495217][T19491] ? proc_fail_nth_write+0x12a/0x150 [ 1473.500577][T19491] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1473.506206][T19491] ? vfs_write+0x596/0x920 [ 1473.510669][T19491] ? __fget_files+0x17c/0x1c0 [ 1473.515342][T19491] ? fput+0x1c4/0x200 [ 1473.519406][T19491] ? ksys_write+0x176/0x1b0 [ 1473.523920][T19491] __x64_sys_io_uring_register+0x55/0x70 [ 1473.529543][T19491] x64_sys_call+0x2c52/0x2dc0 [ 1473.534209][T19491] do_syscall_64+0xc9/0x1c0 [ 1473.538705][T19491] ? clear_bhb_loop+0x55/0xb0 [ 1473.543413][T19491] ? clear_bhb_loop+0x55/0xb0 [ 1473.548126][T19491] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1473.554021][T19491] RIP: 0033:0x7f6953405d19 [ 1473.558468][T19491] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1473.578084][T19491] RSP: 002b:00007f6951a77038 EFLAGS: 00000246 ORIG_RAX: 00000000000001ab [ 1473.586485][T19491] RAX: ffffffffffffffda RBX: 00007f69535f5fa0 RCX: 00007f6953405d19 [ 1473.594517][T19491] RDX: 0000000020001480 RSI: 0000000000000006 RDI: 0000000000000005 [ 1473.602475][T19491] RBP: 00007f6951a77090 R08: 0000000000000000 R09: 0000000000000000 [ 1473.610431][T19491] R10: 0000000000000020 R11: 0000000000000246 R12: 0000000000000001 [ 1473.618392][T19491] R13: 0000000000000000 R14: 00007f69535f5fa0 R15: 00007ffcd3c47ae8 [ 1473.626368][T19491] [ 1473.745907][T19508] SELinux: syz.4.17105 (19508) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 1474.362202][T19566] FAULT_INJECTION: forcing a failure. [ 1474.362202][T19566] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1474.375353][T19566] CPU: 1 UID: 0 PID: 19566 Comm: syz.1.17130 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 1474.386196][T19566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 1474.396242][T19566] Call Trace: [ 1474.399576][T19566] [ 1474.402507][T19566] dump_stack_lvl+0xf2/0x150 [ 1474.407116][T19566] dump_stack+0x15/0x1a [ 1474.411330][T19566] should_fail_ex+0x223/0x230 [ 1474.416014][T19566] should_fail+0xb/0x10 [ 1474.420191][T19566] should_fail_usercopy+0x1a/0x20 [ 1474.425219][T19566] _copy_from_user+0x1e/0xb0 [ 1474.429837][T19566] do_ipv6_setsockopt+0x1ef/0x2250 [ 1474.435031][T19566] ? _parse_integer+0x27/0x30 [ 1474.439705][T19566] ? kstrtouint+0x77/0xc0 [ 1474.444079][T19566] ? avc_has_perm_noaudit+0x1cc/0x210 [ 1474.449454][T19566] ? selinux_netlbl_socket_setsockopt+0xe5/0x2d0 [ 1474.455778][T19566] ipv6_setsockopt+0x57/0x130 [ 1474.460493][T19566] tcp_setsockopt+0x93/0xb0 [ 1474.464995][T19566] sock_common_setsockopt+0x64/0x80 [ 1474.470188][T19566] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 1474.476085][T19566] __sys_setsockopt+0x187/0x200 [ 1474.480963][T19566] __x64_sys_setsockopt+0x66/0x80 [ 1474.485978][T19566] x64_sys_call+0x282e/0x2dc0 [ 1474.490650][T19566] do_syscall_64+0xc9/0x1c0 [ 1474.495146][T19566] ? clear_bhb_loop+0x55/0xb0 [ 1474.499811][T19566] ? clear_bhb_loop+0x55/0xb0 [ 1474.504533][T19566] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1474.510428][T19566] RIP: 0033:0x7fbe356a5d19 [ 1474.514855][T19566] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1474.534509][T19566] RSP: 002b:00007fbe33d11038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1474.542982][T19566] RAX: ffffffffffffffda RBX: 00007fbe35895fa0 RCX: 00007fbe356a5d19 [ 1474.550941][T19566] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000008 [ 1474.558916][T19566] RBP: 00007fbe33d11090 R08: 0000000000000510 R09: 0000000000000000 [ 1474.566876][T19566] R10: 0000000020000700 R11: 0000000000000246 R12: 0000000000000001 [ 1474.574980][T19566] R13: 0000000000000000 R14: 00007fbe35895fa0 R15: 00007fff864a7718 [ 1474.582955][T19566] [ 1474.640954][T19572] __nla_validate_parse: 3 callbacks suppressed [ 1474.640967][T19572] netlink: 4 bytes leftover after parsing attributes in process `syz.6.17132'. [ 1474.720581][T19583] netlink: 4 bytes leftover after parsing attributes in process `syz.6.17137'. [ 1474.835224][T19589] FAULT_INJECTION: forcing a failure. [ 1474.835224][T19589] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1474.848447][T19589] CPU: 1 UID: 0 PID: 19589 Comm: syz.4.17139 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 1474.859359][T19589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 1474.869485][T19589] Call Trace: [ 1474.872759][T19589] [ 1474.875687][T19589] dump_stack_lvl+0xf2/0x150 [ 1474.880294][T19589] dump_stack+0x15/0x1a [ 1474.884463][T19589] should_fail_ex+0x223/0x230 [ 1474.889195][T19589] should_fail+0xb/0x10 [ 1474.893354][T19589] should_fail_usercopy+0x1a/0x20 [ 1474.898419][T19589] copy_fpstate_to_sigframe+0x640/0x7e0 [ 1474.903976][T19589] ? copy_fpstate_to_sigframe+0xea/0x7e0 [ 1474.909612][T19589] ? dequeue_signal+0x364/0x370 [ 1474.914523][T19589] ? fpu__alloc_mathframe+0x95/0xd0 [ 1474.919848][T19589] get_sigframe+0x2f3/0x430 [ 1474.924348][T19589] x64_setup_rt_frame+0xad/0x590 [ 1474.929322][T19589] arch_do_signal_or_restart+0x287/0x4b0 [ 1474.934956][T19589] syscall_exit_to_user_mode+0x62/0x120 [ 1474.940527][T19589] do_syscall_64+0xd6/0x1c0 [ 1474.945018][T19589] ? clear_bhb_loop+0x55/0xb0 [ 1474.949688][T19589] ? clear_bhb_loop+0x55/0xb0 [ 1474.954359][T19589] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1474.960283][T19589] RIP: 0033:0x7f4a88f15d17 [ 1474.964687][T19589] Code: ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 <0f> 05 48 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 [ 1474.984287][T19589] RSP: 002b:00007f4a87587038 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 1474.992720][T19589] RAX: 0000000000000113 RBX: 00007f4a89105fa0 RCX: 00007f4a88f15d19 [ 1475.000680][T19589] RDX: 0000000000000007 RSI: 0000000000000000 RDI: 0000000000000004 [ 1475.008664][T19589] RBP: 00007f4a87587090 R08: 0000000000000f39 R09: 0000000000000000 [ 1475.016728][T19589] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1475.024685][T19589] R13: 0000000000000000 R14: 00007f4a89105fa0 R15: 00007ffdd15f9ab8 [ 1475.032651][T19589] [ 1475.371449][T19616] netlink: 4 bytes leftover after parsing attributes in process `syz.4.17151'. [ 1475.386858][T19616] veth0: entered promiscuous mode [ 1475.391998][T19616] macvtap1: entered promiscuous mode [ 1475.399276][T19616] veth0: left promiscuous mode [ 1475.768929][T19667] netlink: 4 bytes leftover after parsing attributes in process `syz.6.17168'. [ 1475.776252][T19669] netlink: 12 bytes leftover after parsing attributes in process `syz.4.17170'. [ 1475.936924][T19698] netlink: 4 bytes leftover after parsing attributes in process `syz.3.17182'. [ 1476.024071][T19714] ÿÿÿÿÿÿ: renamed from vlan1 (while UP) [ 1476.098600][ T29] kauditd_printk_skb: 1016 callbacks suppressed [ 1476.098613][ T29] audit: type=1400 audit(1734463236.504:59711): avc: denied { write } for pid=19711 comm="syz.3.17188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1476.141247][ T29] audit: type=1400 audit(1734463236.544:59712): avc: denied { create } for pid=19732 comm="syz.6.17196" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1476.162778][ T29] audit: type=1400 audit(1734463236.544:59713): avc: denied { map } for pid=19732 comm="syz.6.17196" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=188376 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1476.187346][ T29] audit: type=1400 audit(1734463236.544:59714): avc: denied { read write } for pid=19732 comm="syz.6.17196" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=188376 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1476.212538][ T29] audit: type=1400 audit(1734463236.544:59715): avc: denied { sqpoll } for pid=19732 comm="syz.6.17196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1476.232028][ T29] audit: type=1400 audit(1734463236.544:59716): avc: denied { bind } for pid=19732 comm="syz.6.17196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 1476.251659][ T29] audit: type=1400 audit(1734463236.544:59717): avc: denied { name_bind } for pid=19732 comm="syz.6.17196" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=dccp_socket permissive=1 [ 1476.272842][ T29] audit: type=1400 audit(1734463236.544:59718): avc: denied { node_bind } for pid=19732 comm="syz.6.17196" saddr=::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=dccp_socket permissive=1 [ 1476.295117][ T29] audit: type=1400 audit(1734463236.544:59719): avc: denied { listen } for pid=19732 comm="syz.6.17196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 1476.314932][ T29] audit: type=1326 audit(1734463236.574:59720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19722 comm="syz.4.17194" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a88f15d19 code=0x7ffc0000 [ 1476.380934][T19748] netlink: 4 bytes leftover after parsing attributes in process `syz.4.17201'. [ 1476.698322][T19771] netlink: 4 bytes leftover after parsing attributes in process `syz.4.17209'. [ 1476.929819][T19792] netlink: 4 bytes leftover after parsing attributes in process `syz.4.17219'. [ 1477.008009][T19806] netlink: 4 bytes leftover after parsing attributes in process `syz.1.17226'. [ 1477.300991][T19851] Cannot find add_set index 0 as target [ 1477.309370][T19821] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1477.319666][T19821] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1477.790754][T19893] FAULT_INJECTION: forcing a failure. [ 1477.790754][T19893] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1477.803887][T19893] CPU: 0 UID: 0 PID: 19893 Comm: syz.1.17263 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 1477.814733][T19893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 1477.824777][T19893] Call Trace: [ 1477.828109][T19893] [ 1477.831025][T19893] dump_stack_lvl+0xf2/0x150 [ 1477.835628][T19893] dump_stack+0x15/0x1a [ 1477.839861][T19893] should_fail_ex+0x223/0x230 [ 1477.844609][T19893] should_fail+0xb/0x10 [ 1477.848752][T19893] should_fail_usercopy+0x1a/0x20 [ 1477.853770][T19893] _copy_from_user+0x1e/0xb0 [ 1477.858354][T19893] copy_msghdr_from_user+0x54/0x2a0 [ 1477.863547][T19893] ? __fget_files+0x17c/0x1c0 [ 1477.868225][T19893] __sys_sendmsg+0x13e/0x230 [ 1477.872849][T19893] __x64_sys_sendmsg+0x46/0x50 [ 1477.877604][T19893] x64_sys_call+0x2734/0x2dc0 [ 1477.882350][T19893] do_syscall_64+0xc9/0x1c0 [ 1477.886888][T19893] ? clear_bhb_loop+0x55/0xb0 [ 1477.891555][T19893] ? clear_bhb_loop+0x55/0xb0 [ 1477.896285][T19893] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1477.902178][T19893] RIP: 0033:0x7fbe356a5d19 [ 1477.906626][T19893] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1477.926225][T19893] RSP: 002b:00007fbe33d11038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1477.934669][T19893] RAX: ffffffffffffffda RBX: 00007fbe35895fa0 RCX: 00007fbe356a5d19 [ 1477.942667][T19893] RDX: 0000000000008000 RSI: 0000000020000400 RDI: 0000000000000004 [ 1477.950626][T19893] RBP: 00007fbe33d11090 R08: 0000000000000000 R09: 0000000000000000 [ 1477.958592][T19893] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1477.966552][T19893] R13: 0000000000000000 R14: 00007fbe35895fa0 R15: 00007fff864a7718 [ 1477.974521][T19893] [ 1478.010712][T19898] IPv6: sit1: Disabled Multicast RS [ 1478.019072][T19898] sit1: entered allmulticast mode [ 1478.206160][T19920] x_tables: unsorted underflow at hook 1 [ 1478.277921][T19906] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1478.286338][T19906] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1478.395586][T19940] syzkaller0: entered promiscuous mode [ 1478.401087][T19940] syzkaller0: entered allmulticast mode [ 1478.471612][T19925] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1478.480177][T19925] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1478.812488][T20004] FAULT_INJECTION: forcing a failure. [ 1478.812488][T20004] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1478.825696][T20004] CPU: 0 UID: 0 PID: 20004 Comm: syz.4.17312 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 1478.836640][T20004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 1478.846674][T20004] Call Trace: [ 1478.849937][T20004] [ 1478.852855][T20004] dump_stack_lvl+0xf2/0x150 [ 1478.857538][T20004] dump_stack+0x15/0x1a [ 1478.861681][T20004] should_fail_ex+0x223/0x230 [ 1478.866341][T20004] should_fail+0xb/0x10 [ 1478.870651][T20004] should_fail_usercopy+0x1a/0x20 [ 1478.875713][T20004] _copy_from_user+0x1e/0xb0 [ 1478.880287][T20004] copy_msghdr_from_user+0x54/0x2a0 [ 1478.885545][T20004] ? __fget_files+0x17c/0x1c0 [ 1478.890212][T20004] __sys_sendmmsg+0x1e8/0x4b0 [ 1478.894879][T20004] __x64_sys_sendmmsg+0x57/0x70 [ 1478.899762][T20004] x64_sys_call+0x29aa/0x2dc0 [ 1478.904467][T20004] do_syscall_64+0xc9/0x1c0 [ 1478.908951][T20004] ? clear_bhb_loop+0x55/0xb0 [ 1478.913618][T20004] ? clear_bhb_loop+0x55/0xb0 [ 1478.918304][T20004] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1478.924213][T20004] RIP: 0033:0x7f4a88f15d19 [ 1478.928658][T20004] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1478.948319][T20004] RSP: 002b:00007f4a87587038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1478.956779][T20004] RAX: ffffffffffffffda RBX: 00007f4a89105fa0 RCX: 00007f4a88f15d19 [ 1478.964782][T20004] RDX: 0000000000000001 RSI: 0000000020002900 RDI: 0000000000000004 [ 1478.972739][T20004] RBP: 00007f4a87587090 R08: 0000000000000000 R09: 0000000000000000 [ 1478.980701][T20004] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1478.988651][T20004] R13: 0000000000000000 R14: 00007f4a89105fa0 R15: 00007ffdd15f9ab8 [ 1478.996605][T20004] [ 1479.316055][T20041] xfrm0 speed is unknown, defaulting to 1000 [ 1479.322939][T20041] lo speed is unknown, defaulting to 1000 [ 1479.874282][T20055] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1479.882896][T20055] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1480.098438][T20084] __nla_validate_parse: 8 callbacks suppressed [ 1480.098450][T20084] netlink: 4 bytes leftover after parsing attributes in process `syz.0.17346'. [ 1480.306521][T20121] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1539 sclass=netlink_route_socket pid=20121 comm=syz.0.17363 [ 1480.475966][T20144] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1539 sclass=netlink_route_socket pid=20144 comm=syz.3.17374 [ 1480.824217][T20167] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1480.834926][T20167] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1480.857566][T20171] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1480.866720][T20171] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1481.117550][ T29] kauditd_printk_skb: 1144 callbacks suppressed [ 1481.117565][ T29] audit: type=1400 audit(1734463241.524:60865): avc: denied { mounton } for pid=20214 comm="syz.6.17402" path="/syzcgroup/unified/syz6" dev="cgroup2" ino=284 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 1481.176031][ T29] audit: type=1400 audit(1734463241.584:60866): avc: denied { create } for pid=20216 comm="syz.6.17403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1481.200555][T20217] Cannot find add_set index 0 as target [ 1481.220620][ T29] audit: type=1400 audit(1734463241.624:60867): avc: denied { create } for pid=20218 comm="syz.6.17404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 1481.240574][ T29] audit: type=1400 audit(1734463241.634:60868): avc: denied { create } for pid=20218 comm="syz.6.17404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1481.268104][ T29] audit: type=1400 audit(1734463241.674:60869): avc: denied { ioctl } for pid=20220 comm="syz.6.17405" path="socket:[190336]" dev="sockfs" ino=190336 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1481.337373][ T29] audit: type=1400 audit(1734463241.744:60870): avc: denied { read } for pid=20224 comm="syz.6.17407" dev="nsfs" ino=4026533841 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1481.358825][ T29] audit: type=1400 audit(1734463241.744:60871): avc: denied { open } for pid=20224 comm="syz.6.17407" path="net:[4026533841]" dev="nsfs" ino=4026533841 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1481.382407][ T29] audit: type=1400 audit(1734463241.744:60872): avc: denied { create } for pid=20224 comm="syz.6.17407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 1481.402712][ T29] audit: type=1400 audit(1734463241.794:60873): avc: denied { create } for pid=20224 comm="syz.6.17407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1481.422557][ T29] audit: type=1400 audit(1734463241.794:60874): avc: denied { map_create } for pid=20224 comm="syz.6.17407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1481.553188][T20243] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1539 sclass=netlink_route_socket pid=20243 comm=syz.6.17414 [ 1482.038581][T20299] netlink: 4 bytes leftover after parsing attributes in process `syz.3.17438'. [ 1482.120377][T20304] Cannot find add_set index 0 as target [ 1482.158348][T20306] netlink: 4 bytes leftover after parsing attributes in process `syz.6.17441'. [ 1482.371959][T20327] netlink: 4 bytes leftover after parsing attributes in process `syz.3.17451'. [ 1482.400243][T20329] Cannot find add_set index 0 as target [ 1482.582024][T20342] syzkaller0: entered promiscuous mode [ 1482.587716][T20342] syzkaller0: entered allmulticast mode [ 1482.623361][T20352] netlink: 4 bytes leftover after parsing attributes in process `syz.1.17462'. [ 1482.666483][T20359] netlink: 4 bytes leftover after parsing attributes in process `syz.6.17464'. [ 1482.694273][T20364] netlink: 4 bytes leftover after parsing attributes in process `syz.6.17466'. [ 1482.806458][T20385] netlink: 4 bytes leftover after parsing attributes in process `syz.0.17475'. [ 1482.841881][T20388] netlink: 4 bytes leftover after parsing attributes in process `syz.0.17476'. [ 1482.923904][T20392] syzkaller0: entered promiscuous mode [ 1482.929426][T20392] syzkaller0: entered allmulticast mode [ 1483.174302][T20412] netlink: 4 bytes leftover after parsing attributes in process `syz.0.17487'. [ 1483.533532][T20444] batadv0: entered promiscuous mode [ 1483.538795][T20444] macvtap1: entered promiscuous mode [ 1483.545041][T20444] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1483.555513][T20444] batadv0: left promiscuous mode [ 1483.944413][T20493] xfrm0 speed is unknown, defaulting to 1000 [ 1483.951012][T20493] lo speed is unknown, defaulting to 1000 [ 1484.022477][T20493] chnl_net:caif_netlink_parms(): no params data found [ 1484.056287][T20493] bridge0: port 1(bridge_slave_0) entered blocking state [ 1484.063440][T20493] bridge0: port 1(bridge_slave_0) entered disabled state [ 1484.070630][T20493] bridge_slave_0: entered allmulticast mode [ 1484.077181][T20493] bridge_slave_0: entered promiscuous mode [ 1484.084176][T20493] bridge0: port 2(bridge_slave_1) entered blocking state [ 1484.091251][T20493] bridge0: port 2(bridge_slave_1) entered disabled state [ 1484.098555][T20493] bridge_slave_1: entered allmulticast mode [ 1484.105096][T20493] bridge_slave_1: entered promiscuous mode [ 1484.118915][T14887] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1484.137088][T20493] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1484.148021][T20493] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1484.168106][T14887] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1484.180249][T20493] team0: Port device team_slave_0 added [ 1484.187437][T20493] team0: Port device team_slave_1 added [ 1484.195335][T14887] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1484.215464][T20493] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1484.222473][T20493] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1484.248406][T20493] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1484.259825][T20493] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1484.266833][T20493] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1484.292815][T20493] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1484.307063][T14887] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1484.334948][T20493] hsr_slave_0: entered promiscuous mode [ 1484.341194][T20493] hsr_slave_1: entered promiscuous mode [ 1484.347256][T20493] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1484.354857][T20493] Cannot create hsr debugfs directory [ 1484.388249][T14887] bridge_slave_1: left allmulticast mode [ 1484.393927][T14887] bridge_slave_1: left promiscuous mode [ 1484.399513][T14887] bridge0: port 2(bridge_slave_1) entered disabled state [ 1484.407423][T14887] bridge_slave_0: left allmulticast mode [ 1484.413193][T14887] bridge_slave_0: left promiscuous mode [ 1484.418951][T14887] bridge0: port 1(bridge_slave_0) entered disabled state [ 1484.515090][T14887] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1484.525090][T14887] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1484.538754][T14887] bond0 (unregistering): Released all slaves [ 1484.668087][T14887] hsr_slave_0: left promiscuous mode [ 1484.678467][T14887] hsr_slave_1: left promiscuous mode [ 1484.690521][T14887] veth1_macvtap: left promiscuous mode [ 1484.696087][T14887] veth0_macvtap: left promiscuous mode [ 1484.701673][T14887] veth1_vlan: left promiscuous mode [ 1484.707019][T14887] veth0_vlan: left promiscuous mode [ 1484.805650][T14887] team0 (unregistering): Port device team_slave_1 removed [ 1484.815596][T14887] team0 (unregistering): Port device team_slave_0 removed [ 1485.118271][T20493] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1485.127155][T20493] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1485.140979][T20493] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1485.149444][T20493] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1485.186287][T20493] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1485.198747][T20493] 8021q: adding VLAN 0 to HW filter on device team0 [ 1485.208152][ T56] bridge0: port 1(bridge_slave_0) entered blocking state [ 1485.215247][ T56] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1485.226449][T15981] bridge0: port 2(bridge_slave_1) entered blocking state [ 1485.233511][T15981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1485.300621][T20493] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1485.366050][T20493] veth0_vlan: entered promiscuous mode [ 1485.373854][T20493] veth1_vlan: entered promiscuous mode [ 1485.389986][T20493] veth0_macvtap: entered promiscuous mode [ 1485.397413][T20493] veth1_macvtap: entered promiscuous mode [ 1485.407735][T20493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1485.418279][T20493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1485.428139][T20493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1485.438605][T20493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1485.448442][T20493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1485.458869][T20493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1485.468679][T20493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1485.479108][T20493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1485.488906][T20493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1485.499326][T20493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1485.509138][T20493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1485.519648][T20493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1485.529507][T20493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1485.540053][T20493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1485.549985][T20493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1485.560426][T20493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1485.570258][T20493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1485.580711][T20493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1485.590610][T20493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1485.601054][T20493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1485.611025][T20493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1485.621468][T20493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1485.631339][T20493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1485.641824][T20493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1485.653403][T20493] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1485.671853][T20493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1485.682558][T20493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1485.692489][T20493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1485.703200][T20493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1485.713167][T20493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1485.723642][T20493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1485.733542][T20493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1485.743971][T20493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1485.753832][T20493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1485.764317][T20493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1485.774180][T20493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1485.784595][T20493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1485.794403][T20493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1485.804855][T20493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1485.814656][T20493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1485.825117][T20493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1485.834920][T20493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1485.845425][T20493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1485.855353][T20493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1485.865774][T20493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1485.875616][T20493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1485.886040][T20493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1485.895856][T20493] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1485.906265][T20493] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1485.917206][T20493] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1485.926329][T20493] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1485.935158][T20493] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1485.943907][T20493] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1485.952714][T20493] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1486.021211][T20585] syzkaller0: entered promiscuous mode [ 1486.026831][T20585] syzkaller0: entered allmulticast mode [ 1486.082937][T20594] __nla_validate_parse: 1 callbacks suppressed [ 1486.082950][T20594] netlink: 4 bytes leftover after parsing attributes in process `syz.0.17518'. [ 1486.119317][T20594] batadv0: entered promiscuous mode [ 1486.124932][ T29] kauditd_printk_skb: 1433 callbacks suppressed [ 1486.124945][ T29] audit: type=1326 audit(1734463246.524:62308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20588 comm="syz.1.17546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbe356a5d19 code=0x7ffc0000 [ 1486.154859][ T29] audit: type=1326 audit(1734463246.524:62309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20588 comm="syz.1.17546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbe356a5d19 code=0x7ffc0000 [ 1486.163101][T20594] macvtap1: entered promiscuous mode [ 1486.180705][ T29] audit: type=1326 audit(1734463246.534:62310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20588 comm="syz.1.17546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=61 compat=0 ip=0x7fbe356a5d19 code=0x7ffc0000 [ 1486.202631][T20594] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1486.207548][ T29] audit: type=1326 audit(1734463246.564:62311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20588 comm="syz.1.17546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fbe3569cce7 code=0x7ffc0000 [ 1486.237966][ T29] audit: type=1326 audit(1734463246.564:62312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20588 comm="syz.1.17546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fbe35641f29 code=0x7ffc0000 [ 1486.261725][ T29] audit: type=1326 audit(1734463246.564:62313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20588 comm="syz.1.17546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=72 compat=0 ip=0x7fbe356a5d19 code=0x7ffc0000 [ 1486.285457][ T29] audit: type=1326 audit(1734463246.594:62314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20588 comm="syz.1.17546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fbe3569cce7 code=0x7ffc0000 [ 1486.309129][ T29] audit: type=1326 audit(1734463246.594:62315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20588 comm="syz.1.17546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fbe35641f29 code=0x7ffc0000 [ 1486.332906][ T29] audit: type=1326 audit(1734463246.594:62316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20588 comm="syz.1.17546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=72 compat=0 ip=0x7fbe356a5d19 code=0x7ffc0000 [ 1486.356587][ T29] audit: type=1326 audit(1734463246.594:62317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20588 comm="syz.1.17546" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fbe3569cce7 code=0x7ffc0000 [ 1486.380295][T20604] netlink: 4 bytes leftover after parsing attributes in process `syz.6.17549'. [ 1486.381470][T20594] batadv0: left promiscuous mode [ 1486.428821][T20595] xfrm0 speed is unknown, defaulting to 1000 [ 1486.435241][T20595] lo speed is unknown, defaulting to 1000 [ 1486.676904][T20632] Cannot find add_set index 0 as target [ 1486.810289][T20620] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1486.818871][T20620] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1486.905720][T20655] FAULT_INJECTION: forcing a failure. [ 1486.905720][T20655] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1486.918816][T20655] CPU: 0 UID: 0 PID: 20655 Comm: syz.1.17572 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 1486.929696][T20655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 1486.939775][T20655] Call Trace: [ 1486.943040][T20655] [ 1486.946007][T20655] dump_stack_lvl+0xf2/0x150 [ 1486.950619][T20655] dump_stack+0x15/0x1a [ 1486.954888][T20655] should_fail_ex+0x223/0x230 [ 1486.959558][T20655] should_fail+0xb/0x10 [ 1486.963705][T20655] should_fail_usercopy+0x1a/0x20 [ 1486.968789][T20655] _copy_from_user+0x1e/0xb0 [ 1486.973389][T20655] copy_msghdr_from_user+0x54/0x2a0 [ 1486.978583][T20655] ? __fget_files+0x17c/0x1c0 [ 1486.983261][T20655] __sys_sendmsg+0x13e/0x230 [ 1486.987861][T20655] __x64_sys_sendmsg+0x46/0x50 [ 1486.992679][T20655] x64_sys_call+0x2734/0x2dc0 [ 1486.997451][T20655] do_syscall_64+0xc9/0x1c0 [ 1487.001942][T20655] ? clear_bhb_loop+0x55/0xb0 [ 1487.006622][T20655] ? clear_bhb_loop+0x55/0xb0 [ 1487.011288][T20655] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1487.017270][T20655] RIP: 0033:0x7fbe356a5d19 [ 1487.021718][T20655] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1487.041390][T20655] RSP: 002b:00007fbe33d11038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1487.049843][T20655] RAX: ffffffffffffffda RBX: 00007fbe35895fa0 RCX: 00007fbe356a5d19 [ 1487.057802][T20655] RDX: 0000000000000080 RSI: 00000000200002c0 RDI: 0000000000000003 [ 1487.065906][T20655] RBP: 00007fbe33d11090 R08: 0000000000000000 R09: 0000000000000000 [ 1487.073864][T20655] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1487.081873][T20655] R13: 0000000000000000 R14: 00007fbe35895fa0 R15: 00007fff864a7718 [ 1487.089888][T20655] [ 1487.330182][T20695] netlink: 4 bytes leftover after parsing attributes in process `syz.6.17588'. [ 1487.581731][T20718] Cannot find add_set index 0 as target [ 1487.769908][T20714] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1487.780296][T20714] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1487.828552][T20749] FAULT_INJECTION: forcing a failure. [ 1487.828552][T20749] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1487.841680][T20749] CPU: 0 UID: 0 PID: 20749 Comm: syz.6.17613 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 1487.852565][T20749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 1487.862658][T20749] Call Trace: [ 1487.865932][T20749] [ 1487.868857][T20749] dump_stack_lvl+0xf2/0x150 [ 1487.873472][T20749] dump_stack+0x15/0x1a [ 1487.877654][T20749] should_fail_ex+0x223/0x230 [ 1487.882351][T20749] should_fail+0xb/0x10 [ 1487.886494][T20749] should_fail_usercopy+0x1a/0x20 [ 1487.891603][T20749] _copy_from_user+0x1e/0xb0 [ 1487.896302][T20749] copy_msghdr_from_user+0x54/0x2a0 [ 1487.901495][T20749] ? __fget_files+0x17c/0x1c0 [ 1487.906208][T20749] __sys_sendmsg+0x13e/0x230 [ 1487.910868][T20749] __x64_sys_sendmsg+0x46/0x50 [ 1487.915616][T20749] x64_sys_call+0x2734/0x2dc0 [ 1487.920295][T20749] do_syscall_64+0xc9/0x1c0 [ 1487.924780][T20749] ? clear_bhb_loop+0x55/0xb0 [ 1487.929439][T20749] ? clear_bhb_loop+0x55/0xb0 [ 1487.934105][T20749] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1487.940009][T20749] RIP: 0033:0x7f6953405d19 [ 1487.944409][T20749] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1487.964058][T20749] RSP: 002b:00007f6951a77038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1487.972470][T20749] RAX: ffffffffffffffda RBX: 00007f69535f5fa0 RCX: 00007f6953405d19 [ 1487.980502][T20749] RDX: 0000000000000080 RSI: 00000000200002c0 RDI: 0000000000000003 [ 1487.988489][T20749] RBP: 00007f6951a77090 R08: 0000000000000000 R09: 0000000000000000 [ 1487.996527][T20749] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1488.004492][T20749] R13: 0000000000000000 R14: 00007f69535f5fa0 R15: 00007ffcd3c47ae8 [ 1488.012471][T20749] [ 1488.084129][T20761] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1539 sclass=netlink_route_socket pid=20761 comm=syz.0.17619 [ 1488.175920][T20772] netlink: 2048 bytes leftover after parsing attributes in process `syz.6.17622'. [ 1488.185289][T20772] netlink: 4 bytes leftover after parsing attributes in process `syz.6.17622'. [ 1488.195226][T20772] netlink: 24 bytes leftover after parsing attributes in process `syz.6.17622'. [ 1488.360874][T20785] netlink: 36 bytes leftover after parsing attributes in process `syz.4.17626'. [ 1488.473281][T20781] xfrm0 speed is unknown, defaulting to 1000 [ 1488.479602][T20781] lo speed is unknown, defaulting to 1000 [ 1488.733708][T20798] netlink: 4 bytes leftover after parsing attributes in process `syz.4.17631'. [ 1488.749158][T20798] batadv0: entered promiscuous mode [ 1488.754539][T20798] macvtap1: entered promiscuous mode [ 1488.760556][T20798] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1488.769180][T20798] batadv0: left promiscuous mode [ 1488.989811][T20808] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1539 sclass=netlink_route_socket pid=20808 comm=syz.1.17636 [ 1489.004495][T20806] netlink: 4 bytes leftover after parsing attributes in process `syz.6.17635'. [ 1489.049182][T20806] batadv0: entered promiscuous mode [ 1489.054885][T20806] macvtap1: entered promiscuous mode [ 1489.061509][T20806] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1489.074180][T20806] batadv0: left promiscuous mode [ 1489.139638][T20827] FAULT_INJECTION: forcing a failure. [ 1489.139638][T20827] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1489.152870][T20827] CPU: 0 UID: 0 PID: 20827 Comm: syz.0.17645 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 1489.163771][T20827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 1489.173867][T20827] Call Trace: [ 1489.177136][T20827] [ 1489.180056][T20827] dump_stack_lvl+0xf2/0x150 [ 1489.184648][T20827] dump_stack+0x15/0x1a [ 1489.188894][T20827] should_fail_ex+0x223/0x230 [ 1489.193626][T20827] should_fail+0xb/0x10 [ 1489.197773][T20827] should_fail_usercopy+0x1a/0x20 [ 1489.202814][T20827] _copy_to_user+0x20/0xa0 [ 1489.207262][T20827] simple_read_from_buffer+0xa0/0x110 [ 1489.212634][T20827] proc_fail_nth_read+0xf9/0x140 [ 1489.217625][T20827] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1489.223169][T20827] vfs_read+0x1a2/0x700 [ 1489.227338][T20827] ? __rcu_read_unlock+0x4e/0x70 [ 1489.232317][T20827] ? __fget_files+0x17c/0x1c0 [ 1489.237006][T20827] ksys_read+0xe8/0x1b0 [ 1489.241244][T20827] __x64_sys_read+0x42/0x50 [ 1489.245785][T20827] x64_sys_call+0x2874/0x2dc0 [ 1489.250451][T20827] do_syscall_64+0xc9/0x1c0 [ 1489.255025][T20827] ? clear_bhb_loop+0x55/0xb0 [ 1489.259694][T20827] ? clear_bhb_loop+0x55/0xb0 [ 1489.264416][T20827] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1489.270310][T20827] RIP: 0033:0x7f6bf73b472c [ 1489.274719][T20827] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1489.294368][T20827] RSP: 002b:00007f6bf5a21030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1489.302943][T20827] RAX: ffffffffffffffda RBX: 00007f6bf75a5fa0 RCX: 00007f6bf73b472c [ 1489.310907][T20827] RDX: 000000000000000f RSI: 00007f6bf5a210a0 RDI: 0000000000000003 [ 1489.318989][T20827] RBP: 00007f6bf5a21090 R08: 0000000000000000 R09: 0000000000000000 [ 1489.326951][T20827] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1489.334959][T20827] R13: 0000000000000000 R14: 00007f6bf75a5fa0 R15: 00007ffcb8ada618 [ 1489.342926][T20827] [ 1489.350751][T20829] netlink: 4 bytes leftover after parsing attributes in process `syz.4.17646'. [ 1489.462352][T20848] dccp_close: ABORT with 32 bytes unread [ 1489.637791][T20868] 9pnet_fd: Insufficient options for proto=fd [ 1490.357222][T20891] FAULT_INJECTION: forcing a failure. [ 1490.357222][T20891] name failslab, interval 1, probability 0, space 0, times 0 [ 1490.369974][T20891] CPU: 0 UID: 0 PID: 20891 Comm: syz.6.17670 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 1490.380846][T20891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 1490.390905][T20891] Call Trace: [ 1490.394179][T20891] [ 1490.397109][T20891] dump_stack_lvl+0xf2/0x150 [ 1490.401774][T20891] dump_stack+0x15/0x1a [ 1490.405990][T20891] should_fail_ex+0x223/0x230 [ 1490.410686][T20891] should_failslab+0x8f/0xb0 [ 1490.415307][T20891] kmem_cache_alloc_noprof+0x52/0x320 [ 1490.420700][T20891] ? getname_flags+0x81/0x3b0 [ 1490.425384][T20891] getname_flags+0x81/0x3b0 [ 1490.430020][T20891] user_path_at+0x26/0x120 [ 1490.434472][T20891] __se_sys_mount+0x248/0x2d0 [ 1490.439216][T20891] ? fput+0x1c4/0x200 [ 1490.443209][T20891] __x64_sys_mount+0x67/0x80 [ 1490.447818][T20891] x64_sys_call+0x2c84/0x2dc0 [ 1490.452476][T20891] do_syscall_64+0xc9/0x1c0 [ 1490.456964][T20891] ? clear_bhb_loop+0x55/0xb0 [ 1490.461628][T20891] ? clear_bhb_loop+0x55/0xb0 [ 1490.466408][T20891] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1490.472360][T20891] RIP: 0033:0x7f6953405d19 [ 1490.476760][T20891] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1490.496356][T20891] RSP: 002b:00007f6951a77038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1490.504825][T20891] RAX: ffffffffffffffda RBX: 00007f69535f5fa0 RCX: 00007f6953405d19 [ 1490.512800][T20891] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000000 [ 1490.520764][T20891] RBP: 00007f6951a77090 R08: 0000000000000000 R09: 0000000000000000 [ 1490.528719][T20891] R10: 0000000001230023 R11: 0000000000000246 R12: 0000000000000001 [ 1490.536755][T20891] R13: 0000000000000000 R14: 00007f69535f5fa0 R15: 00007ffcd3c47ae8 [ 1490.544722][T20891] [ 1491.138253][ T29] kauditd_printk_skb: 1881 callbacks suppressed [ 1491.138268][ T29] audit: type=1400 audit(1734463251.544:64199): avc: denied { execmem } for pid=20923 comm="syz.6.17683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1491.204484][ T29] audit: type=1326 audit(1734463251.614:64200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20914 comm="syz.6.17679" exe="/root/syz-executor" sig=0 arch=c000003e syscall=60 compat=0 ip=0x7f6953405d19 code=0x7ffc0000 [ 1491.257393][ T29] audit: type=1400 audit(1734463251.664:64201): avc: denied { read } for pid=20928 comm="syz.4.17685" dev="nsfs" ino=4026533838 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1491.295019][T20916] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1491.297125][ T29] audit: type=1400 audit(1734463251.664:64202): avc: denied { open } for pid=20928 comm="syz.4.17685" path="net:[4026533838]" dev="nsfs" ino=4026533838 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1491.309008][T20916] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1491.326863][ T29] audit: type=1400 audit(1734463251.664:64203): avc: denied { create } for pid=20928 comm="syz.4.17685" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 1491.354974][ T29] audit: type=1400 audit(1734463251.694:64204): avc: denied { create } for pid=20933 comm="syz.1.17687" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1491.374859][ T29] audit: type=1400 audit(1734463251.704:64205): avc: denied { read write } for pid=20915 comm="syz.3.17680" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1491.398800][ T29] audit: type=1400 audit(1734463251.704:64206): avc: denied { open } for pid=20915 comm="syz.3.17680" path="/dev/raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1491.422502][ T29] audit: type=1400 audit(1734463251.704:64207): avc: denied { ioctl } for pid=20915 comm="syz.3.17680" path="/dev/raw-gadget" dev="devtmpfs" ino=142 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1491.448430][ T29] audit: type=1400 audit(1734463251.714:64208): avc: denied { ioctl } for pid=20933 comm="syz.1.17687" path="socket:[193901]" dev="sockfs" ino=193901 ioctlcmd=0x9402 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1491.595184][T20947] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1539 sclass=netlink_route_socket pid=20947 comm=syz.0.17691 [ 1491.630311][T20951] FAULT_INJECTION: forcing a failure. [ 1491.630311][T20951] name failslab, interval 1, probability 0, space 0, times 0 [ 1491.643053][T20951] CPU: 0 UID: 0 PID: 20951 Comm: syz.4.17693 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 1491.653891][T20951] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 1491.663942][T20951] Call Trace: [ 1491.667203][T20951] [ 1491.670153][T20951] dump_stack_lvl+0xf2/0x150 [ 1491.674764][T20951] dump_stack+0x15/0x1a [ 1491.678922][T20951] should_fail_ex+0x223/0x230 [ 1491.683590][T20951] ? __se_sys_mount+0xf7/0x2d0 [ 1491.688345][T20951] should_failslab+0x8f/0xb0 [ 1491.692940][T20951] __kmalloc_cache_noprof+0x4e/0x320 [ 1491.698232][T20951] __se_sys_mount+0xf7/0x2d0 [ 1491.702821][T20951] ? fput+0x1c4/0x200 [ 1491.706805][T20951] ? ksys_write+0x176/0x1b0 [ 1491.711324][T20951] __x64_sys_mount+0x67/0x80 [ 1491.715913][T20951] x64_sys_call+0x2c84/0x2dc0 [ 1491.720576][T20951] do_syscall_64+0xc9/0x1c0 [ 1491.725062][T20951] ? clear_bhb_loop+0x55/0xb0 [ 1491.729730][T20951] ? clear_bhb_loop+0x55/0xb0 [ 1491.734397][T20951] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1491.740313][T20951] RIP: 0033:0x7f4a88f15d19 [ 1491.744711][T20951] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1491.764306][T20951] RSP: 002b:00007f4a87587038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1491.772825][T20951] RAX: ffffffffffffffda RBX: 00007f4a89105fa0 RCX: 00007f4a88f15d19 [ 1491.780795][T20951] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000000 [ 1491.788780][T20951] RBP: 00007f4a87587090 R08: 0000000020000680 R09: 0000000000000000 [ 1491.796746][T20951] R10: 0000000001230023 R11: 0000000000000246 R12: 0000000000000001 [ 1491.804704][T20951] R13: 0000000000000000 R14: 00007f4a89105fa0 R15: 00007ffdd15f9ab8 [ 1491.812681][T20951] [ 1492.842402][T21005] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1492.853359][T21005] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1492.992263][T21031] dummy0: entered promiscuous mode [ 1493.005970][T21031] macvtap1: entered promiscuous mode [ 1493.023666][T21031] dummy0: left promiscuous mode [ 1493.270880][T21040] Cannot find add_set index 0 as target [ 1493.324435][T21048] FAULT_INJECTION: forcing a failure. [ 1493.324435][T21048] name failslab, interval 1, probability 0, space 0, times 0 [ 1493.337124][T21048] CPU: 0 UID: 0 PID: 21048 Comm: syz.4.17730 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 1493.348031][T21048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 1493.358069][T21048] Call Trace: [ 1493.361331][T21048] [ 1493.364256][T21048] dump_stack_lvl+0xf2/0x150 [ 1493.368839][T21048] dump_stack+0x15/0x1a [ 1493.373010][T21048] should_fail_ex+0x223/0x230 [ 1493.377696][T21048] ? alloc_pipe_info+0xb0/0x360 [ 1493.382675][T21048] should_failslab+0x8f/0xb0 [ 1493.387390][T21048] __kmalloc_cache_noprof+0x4e/0x320 [ 1493.392702][T21048] alloc_pipe_info+0xb0/0x360 [ 1493.397515][T21048] splice_direct_to_actor+0x60f/0x670 [ 1493.402927][T21048] ? __pfx_direct_splice_actor+0x10/0x10 [ 1493.408641][T21048] ? 0xffffffff81000000 [ 1493.412777][T21048] ? selinux_file_permission+0x22a/0x360 [ 1493.418422][T21048] ? __rcu_read_unlock+0x4e/0x70 [ 1493.423382][T21048] ? avc_policy_seqno+0x15/0x20 [ 1493.428264][T21048] ? selinux_file_permission+0x22a/0x360 [ 1493.433887][T21048] do_splice_direct+0xd7/0x150 [ 1493.438648][T21048] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 1493.444532][T21048] do_sendfile+0x398/0x660 [ 1493.448993][T21048] __x64_sys_sendfile64+0x110/0x150 [ 1493.454219][T21048] x64_sys_call+0xfbd/0x2dc0 [ 1493.458802][T21048] do_syscall_64+0xc9/0x1c0 [ 1493.463364][T21048] ? clear_bhb_loop+0x55/0xb0 [ 1493.468039][T21048] ? clear_bhb_loop+0x55/0xb0 [ 1493.472825][T21048] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1493.478764][T21048] RIP: 0033:0x7f4a88f15d19 [ 1493.483220][T21048] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1493.502936][T21048] RSP: 002b:00007f4a87587038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1493.511336][T21048] RAX: ffffffffffffffda RBX: 00007f4a89105fa0 RCX: 00007f4a88f15d19 [ 1493.519379][T21048] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000003 [ 1493.527341][T21048] RBP: 00007f4a87587090 R08: 0000000000000000 R09: 0000000000000000 [ 1493.535302][T21048] R10: 0000000000100001 R11: 0000000000000246 R12: 0000000000000001 [ 1493.543320][T21048] R13: 0000000000000000 R14: 00007f4a89105fa0 R15: 00007ffdd15f9ab8 [ 1493.551288][T21048] [ 1493.718622][T21055] syzkaller0: entered promiscuous mode [ 1493.724253][T21055] syzkaller0: entered allmulticast mode [ 1493.779304][T21082] FAULT_INJECTION: forcing a failure. [ 1493.779304][T21082] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1493.792543][T21082] CPU: 1 UID: 0 PID: 21082 Comm: syz.6.17744 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 1493.803397][T21082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 1493.813497][T21082] Call Trace: [ 1493.816828][T21082] [ 1493.819780][T21082] dump_stack_lvl+0xf2/0x150 [ 1493.824381][T21082] dump_stack+0x15/0x1a [ 1493.828538][T21082] should_fail_ex+0x223/0x230 [ 1493.833289][T21082] should_fail+0xb/0x10 [ 1493.837460][T21082] should_fail_usercopy+0x1a/0x20 [ 1493.842560][T21082] _copy_from_user+0x1e/0xb0 [ 1493.847217][T21082] copy_msghdr_from_user+0x54/0x2a0 [ 1493.852414][T21082] ? __fget_files+0x17c/0x1c0 [ 1493.857148][T21082] __sys_sendmsg+0x13e/0x230 [ 1493.861739][T21082] __x64_sys_sendmsg+0x46/0x50 [ 1493.866534][T21082] x64_sys_call+0x2734/0x2dc0 [ 1493.871266][T21082] do_syscall_64+0xc9/0x1c0 [ 1493.875762][T21082] ? clear_bhb_loop+0x55/0xb0 [ 1493.880477][T21082] ? clear_bhb_loop+0x55/0xb0 [ 1493.885200][T21082] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1493.891094][T21082] RIP: 0033:0x7f6953405d19 [ 1493.895501][T21082] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1493.915101][T21082] RSP: 002b:00007f6951a77038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1493.923511][T21082] RAX: ffffffffffffffda RBX: 00007f69535f5fa0 RCX: 00007f6953405d19 [ 1493.931508][T21082] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 1493.939508][T21082] RBP: 00007f6951a77090 R08: 0000000000000000 R09: 0000000000000000 [ 1493.947544][T21082] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1493.955504][T21082] R13: 0000000000000000 R14: 00007f69535f5fa0 R15: 00007ffcd3c47ae8 [ 1493.963571][T21082] [ 1494.060341][T21096] __nla_validate_parse: 2 callbacks suppressed [ 1494.060356][T21096] netlink: 96 bytes leftover after parsing attributes in process `syz.3.17750'. [ 1494.104306][T21094] netlink: 4 bytes leftover after parsing attributes in process `syz.4.17749'. [ 1494.198003][T21113] syzkaller0: entered promiscuous mode [ 1494.202185][T21088] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1494.203529][T21113] syzkaller0: entered allmulticast mode [ 1494.215085][T21088] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1495.009090][T15961] tipc: Subscription rejected, illegal request [ 1495.180571][T21175] netlink: 4 bytes leftover after parsing attributes in process `syz.3.17778'. [ 1495.194065][T21175] bond_slave_0: entered promiscuous mode [ 1495.199718][T21175] bond_slave_1: entered promiscuous mode [ 1495.206896][T21175] macvtap1: entered promiscuous mode [ 1495.212247][T21175] bond0: entered promiscuous mode [ 1495.218534][T21175] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1495.236556][T21175] bond0: left promiscuous mode [ 1495.241567][T21175] bond_slave_0: left promiscuous mode [ 1495.246985][T21175] bond_slave_1: left promiscuous mode [ 1495.434610][T21181] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1495.445296][T21181] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1496.143597][ T29] kauditd_printk_skb: 697 callbacks suppressed [ 1496.143611][ T29] audit: type=1326 audit(1734463256.554:64906): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21201 comm="syz.1.17790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbe356a5d19 code=0x7ffc0000 [ 1496.223169][T21202] netlink: 20 bytes leftover after parsing attributes in process `syz.1.17790'. [ 1496.292239][ T29] audit: type=1400 audit(1734463256.584:64907): avc: denied { write } for pid=21203 comm="syz.0.17791" path="socket:[194374]" dev="sockfs" ino=194374 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 1496.316171][ T29] audit: type=1326 audit(1734463256.584:64908): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21201 comm="syz.1.17790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7fbe356a5d19 code=0x7ffc0000 [ 1496.339932][ T29] audit: type=1326 audit(1734463256.594:64909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21201 comm="syz.1.17790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbe356a5d19 code=0x7ffc0000 [ 1496.363629][ T29] audit: type=1326 audit(1734463256.594:64910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21201 comm="syz.1.17790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbe356a5d19 code=0x7ffc0000 [ 1496.387340][ T29] audit: type=1326 audit(1734463256.594:64911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21201 comm="syz.1.17790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fbe356a5d19 code=0x7ffc0000 [ 1496.411113][ T29] audit: type=1326 audit(1734463256.604:64912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21201 comm="syz.1.17790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbe356a5d19 code=0x7ffc0000 [ 1496.434806][ T29] audit: type=1326 audit(1734463256.604:64913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21201 comm="syz.1.17790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbe356a5d19 code=0x7ffc0000 [ 1496.458462][ T29] audit: type=1326 audit(1734463256.604:64914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21201 comm="syz.1.17790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fbe356a5d19 code=0x7ffc0000 [ 1496.482130][ T29] audit: type=1326 audit(1734463256.614:64915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21201 comm="syz.1.17790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbe356a5d19 code=0x7ffc0000 [ 1497.253706][T21236] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1539 sclass=netlink_route_socket pid=21236 comm=syz.0.17804 [ 1497.256356][T21225] block device autoloading is deprecated and will be removed. [ 1497.341178][T21249] netlink: 4 bytes leftover after parsing attributes in process `syz.3.17810'. [ 1497.394288][T21253] netlink: 4 bytes leftover after parsing attributes in process `syz.6.17812'. [ 1497.447887][T21264] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1539 sclass=netlink_route_socket pid=21264 comm=syz.6.17817 [ 1497.977676][T21284] netlink: 4 bytes leftover after parsing attributes in process `syz.1.17824'. [ 1498.096128][T21295] Cannot find add_set index 0 as target [ 1498.142450][T21303] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 1498.286594][T21309] netlink: 4 bytes leftover after parsing attributes in process `syz.3.17835'. [ 1498.330862][T21317] netem: change failed [ 1498.408183][T21327] Cannot find add_set index 0 as target [ 1498.451019][T21333] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 1498.458909][T21333] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 1498.530267][T21341] team_slave_0: entered promiscuous mode [ 1498.535934][T21341] team_slave_1: entered promiscuous mode [ 1498.541683][T21341] macvtap1: entered promiscuous mode [ 1498.547048][T21341] team0: entered promiscuous mode [ 1498.553163][T21341] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1498.561415][T21341] team0: Device macvtap1 is already an upper device of the team interface [ 1498.574787][T21341] team0: left promiscuous mode [ 1498.579710][T21341] team_slave_0: left promiscuous mode [ 1498.585124][T21341] team_slave_1: left promiscuous mode [ 1498.847565][T21345] xfrm0 speed is unknown, defaulting to 1000 [ 1498.853812][T21345] lo speed is unknown, defaulting to 1000 [ 1499.076072][T21355] netlink: 108 bytes leftover after parsing attributes in process `syz.6.17854'. [ 1499.085246][T21355] netlink: 108 bytes leftover after parsing attributes in process `syz.6.17854'. [ 1499.094458][T21355] netlink: 108 bytes leftover after parsing attributes in process `syz.6.17854'. [ 1499.118979][T21355] netlink: 108 bytes leftover after parsing attributes in process `syz.6.17854'. [ 1499.128177][T21355] netlink: 108 bytes leftover after parsing attributes in process `syz.6.17854'. [ 1499.137898][T21355] netlink: 108 bytes leftover after parsing attributes in process `syz.6.17854'. [ 1499.167743][T21355] netlink: 108 bytes leftover after parsing attributes in process `syz.6.17854'. [ 1499.176954][T21355] netlink: 108 bytes leftover after parsing attributes in process `syz.6.17854'. [ 1499.186125][T21355] netlink: 108 bytes leftover after parsing attributes in process `syz.6.17854'. [ 1499.442702][T21385] netlink: 'syz.4.17865': attribute type 1 has an invalid length. [ 1499.578504][T21401] FAULT_INJECTION: forcing a failure. [ 1499.578504][T21401] name failslab, interval 1, probability 0, space 0, times 0 [ 1499.591255][T21401] CPU: 1 UID: 0 PID: 21401 Comm: syz.4.17872 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 1499.602098][T21401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 1499.612196][T21401] Call Trace: [ 1499.615488][T21401] [ 1499.618419][T21401] dump_stack_lvl+0xf2/0x150 [ 1499.623044][T21401] dump_stack+0x15/0x1a [ 1499.627239][T21401] should_fail_ex+0x223/0x230 [ 1499.631966][T21401] should_failslab+0x8f/0xb0 [ 1499.636645][T21401] kmem_cache_alloc_noprof+0x52/0x320 [ 1499.636670][T21401] ? getname_flags+0x81/0x3b0 [ 1499.636690][T21401] ? fput+0x1c4/0x200 [ 1499.636770][T21401] getname_flags+0x81/0x3b0 [ 1499.636791][T21401] __x64_sys_symlinkat+0x43/0x70 [ 1499.636823][T21401] x64_sys_call+0x269e/0x2dc0 [ 1499.636844][T21401] do_syscall_64+0xc9/0x1c0 [ 1499.669610][T21401] ? clear_bhb_loop+0x55/0xb0 [ 1499.674296][T21401] ? clear_bhb_loop+0x55/0xb0 [ 1499.679034][T21401] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1499.684934][T21401] RIP: 0033:0x7f4a88f15d19 [ 1499.689338][T21401] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1499.708935][T21401] RSP: 002b:00007f4a87587038 EFLAGS: 00000246 ORIG_RAX: 000000000000010a [ 1499.717404][T21401] RAX: ffffffffffffffda RBX: 00007f4a89105fa0 RCX: 00007f4a88f15d19 [ 1499.725364][T21401] RDX: 0000000020000000 RSI: ffffffffffffff9c RDI: 0000000000000000 [ 1499.733371][T21401] RBP: 00007f4a87587090 R08: 0000000000000000 R09: 0000000000000000 [ 1499.741361][T21401] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1499.749324][T21401] R13: 0000000000000000 R14: 00007f4a89105fa0 R15: 00007ffdd15f9ab8 [ 1499.757293][T21401] [ 1500.319315][T21474] netdevsim netdevsim1 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 1500.328157][T21474] netdevsim netdevsim1 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 1500.337058][T21474] netdevsim netdevsim1 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 1500.345835][T21474] netdevsim netdevsim1 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 1500.358999][T21476] netlink: 36 bytes leftover after parsing attributes in process `syz.3.17902'. [ 1500.657768][T21524] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 1500.665670][T21524] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 1501.175640][ T29] kauditd_printk_skb: 1095 callbacks suppressed [ 1501.175656][ T29] audit: type=1326 audit(1734463261.584:66011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21574 comm="syz.1.17945" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbe356a5d19 code=0x7ffc0000 [ 1501.230311][ T29] audit: type=1326 audit(1734463261.584:66012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21574 comm="syz.1.17945" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbe356a5d19 code=0x7ffc0000 [ 1501.245198][T21577] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 1501.254120][ T29] audit: type=1326 audit(1734463261.584:66013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21574 comm="syz.1.17945" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fbe356a5d19 code=0x7ffc0000 [ 1501.261907][T21577] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 1501.285530][ T29] audit: type=1326 audit(1734463261.584:66014): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21574 comm="syz.1.17945" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbe356a5d19 code=0x7ffc0000 [ 1501.285553][ T29] audit: type=1326 audit(1734463261.584:66015): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21574 comm="syz.1.17945" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fbe356a5d19 code=0x7ffc0000 [ 1501.285575][ T29] audit: type=1326 audit(1734463261.584:66016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21574 comm="syz.1.17945" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbe356a5d19 code=0x7ffc0000 [ 1501.364512][ T29] audit: type=1326 audit(1734463261.584:66017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21574 comm="syz.1.17945" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbe356a5d19 code=0x7ffc0000 [ 1501.383055][T21581] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1501.388204][ T29] audit: type=1326 audit(1734463261.584:66018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21574 comm="syz.1.17945" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fbe356a5d19 code=0x7ffc0000 [ 1501.399550][T21581] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1501.420068][ T29] audit: type=1326 audit(1734463261.584:66019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21574 comm="syz.1.17945" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbe356a5d19 code=0x7ffc0000 [ 1501.451525][ T29] audit: type=1326 audit(1734463261.584:66020): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21574 comm="syz.1.17945" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbe356a5d19 code=0x7ffc0000 [ 1501.639158][T21614] netdevsim netdevsim3 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 1501.648075][T21614] netdevsim netdevsim3 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 1501.656998][T21614] netdevsim netdevsim3 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 1501.665904][T21614] netdevsim netdevsim3 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 1501.782100][T21631] team_slave_0: entered promiscuous mode [ 1501.787856][T21631] team_slave_1: entered promiscuous mode [ 1501.793802][T21631] macvtap1: entered promiscuous mode [ 1501.799250][T21631] team0: entered promiscuous mode [ 1501.805632][T21631] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1501.816254][T21631] team0: Device macvtap1 is already an upper device of the team interface [ 1501.826556][T21631] team0: left promiscuous mode [ 1501.831500][T21631] team_slave_0: left promiscuous mode [ 1501.837018][T21631] team_slave_1: left promiscuous mode [ 1501.847233][T21648] FAULT_INJECTION: forcing a failure. [ 1501.847233][T21648] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1501.860360][T21648] CPU: 1 UID: 0 PID: 21648 Comm: syz.0.17973 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 1501.871265][T21648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 1501.881382][T21648] Call Trace: [ 1501.884653][T21648] [ 1501.887586][T21648] dump_stack_lvl+0xf2/0x150 [ 1501.892287][T21648] dump_stack+0x15/0x1a [ 1501.896543][T21648] should_fail_ex+0x223/0x230 [ 1501.901215][T21648] should_fail+0xb/0x10 [ 1501.905424][T21648] should_fail_usercopy+0x1a/0x20 [ 1501.910448][T21648] _copy_from_user+0x1e/0xb0 [ 1501.915042][T21648] copy_msghdr_from_user+0x54/0x2a0 [ 1501.920238][T21648] ? __fget_files+0x17c/0x1c0 [ 1501.924914][T21648] __sys_sendmsg+0x13e/0x230 [ 1501.929583][T21648] __x64_sys_sendmsg+0x46/0x50 [ 1501.934543][T21648] x64_sys_call+0x2734/0x2dc0 [ 1501.939263][T21648] do_syscall_64+0xc9/0x1c0 [ 1501.943818][T21648] ? clear_bhb_loop+0x55/0xb0 [ 1501.948486][T21648] ? clear_bhb_loop+0x55/0xb0 [ 1501.953154][T21648] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1501.959048][T21648] RIP: 0033:0x7f6bf73b5d19 [ 1501.963451][T21648] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1501.983055][T21648] RSP: 002b:00007f6bf5a21038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1501.991526][T21648] RAX: ffffffffffffffda RBX: 00007f6bf75a5fa0 RCX: 00007f6bf73b5d19 [ 1501.999488][T21648] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000006 [ 1502.007448][T21648] RBP: 00007f6bf5a21090 R08: 0000000000000000 R09: 0000000000000000 [ 1502.015409][T21648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1502.023392][T21648] R13: 0000000000000000 R14: 00007f6bf75a5fa0 R15: 00007ffcb8ada618 [ 1502.031379][T21648] [ 1502.048743][T21652] netdevsim netdevsim4 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 1502.057525][T21652] netdevsim netdevsim4 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 1502.066259][T21652] netdevsim netdevsim4 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 1502.074982][T21652] netdevsim netdevsim4 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 1502.365804][T21705] sctp: [Deprecated]: syz.4.17996 (pid 21705) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1502.365804][T21705] Use struct sctp_sack_info instead [ 1502.607012][T21730] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 1502.615050][T21730] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 1503.081889][T21795] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 1503.089802][T21795] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 1503.128336][T21801] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 1503.136219][T21801] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 1503.296932][T21819] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 1503.304795][T21819] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 1503.826806][T21850] netlink: 'syz.6.18056': attribute type 1 has an invalid length. [ 1503.967215][T21856] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 1503.975115][T21856] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 1504.090100][T21864] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1504.099011][T21864] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1504.137873][T21867] dummy0: entered promiscuous mode [ 1504.143156][T21867] macvtap1: entered promiscuous mode [ 1504.150127][T21867] dummy0: left promiscuous mode [ 1504.656681][T21930] dummy0: entered promiscuous mode [ 1504.662060][T21930] macvtap1: entered promiscuous mode [ 1504.670093][T21930] dummy0: left promiscuous mode [ 1504.764369][T21948] __nla_validate_parse: 60 callbacks suppressed [ 1504.764383][T21948] netlink: 36 bytes leftover after parsing attributes in process `syz.1.18102'. [ 1504.779738][T21948] netlink: 36 bytes leftover after parsing attributes in process `syz.1.18102'. [ 1504.789196][T21948] netlink: 36 bytes leftover after parsing attributes in process `syz.1.18102'. [ 1504.814970][T21948] netlink: 36 bytes leftover after parsing attributes in process `syz.1.18102'. [ 1504.824197][T21948] netlink: 36 bytes leftover after parsing attributes in process `syz.1.18102'. [ 1504.833414][T21948] netlink: 36 bytes leftover after parsing attributes in process `syz.1.18102'. [ 1504.858745][T21948] netlink: 36 bytes leftover after parsing attributes in process `syz.1.18102'. [ 1504.867873][T21948] netlink: 36 bytes leftover after parsing attributes in process `syz.1.18102'. [ 1504.876960][T21948] netlink: 36 bytes leftover after parsing attributes in process `syz.1.18102'. [ 1504.962208][T21971] netlink: 36 bytes leftover after parsing attributes in process `syz.3.18111'. [ 1504.981058][T21975] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21975 comm=syz.1.18112 [ 1504.994206][T21975] netlink: 'syz.1.18112': attribute type 4 has an invalid length. [ 1505.002888][T21975] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21975 comm=syz.1.18112 [ 1505.834016][T22061] team_slave_0: entered promiscuous mode [ 1505.839706][T22061] team_slave_1: entered promiscuous mode [ 1505.850155][T22061] macvtap1: entered promiscuous mode [ 1505.855612][T22061] team0: entered promiscuous mode [ 1505.863274][T22061] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1505.872421][T22061] team0: Device macvtap1 is already an upper device of the team interface [ 1505.883024][T22061] team0: left promiscuous mode [ 1505.888004][T22061] team_slave_0: left promiscuous mode [ 1505.893476][T22061] team_slave_1: left promiscuous mode [ 1506.005273][T22087] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22087 comm=syz.6.18158 [ 1506.020807][T22087] netlink: 'syz.6.18158': attribute type 4 has an invalid length. [ 1506.179402][T22114] netlink: 'syz.3.18170': attribute type 4 has an invalid length. [ 1506.193926][ T29] kauditd_printk_skb: 1703 callbacks suppressed [ 1506.193967][ T29] audit: type=1326 audit(1734463266.604:67724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22117 comm="syz.4.18172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a88f15d19 code=0x7ffc0000 [ 1506.270823][ T29] audit: type=1326 audit(1734463266.604:67725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22117 comm="syz.4.18172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f4a88f15d19 code=0x7ffc0000 [ 1506.294370][ T29] audit: type=1326 audit(1734463266.604:67726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22117 comm="syz.4.18172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a88f15d19 code=0x7ffc0000 [ 1506.318080][ T29] audit: type=1400 audit(1734463266.604:67727): avc: denied { read write } for pid=22118 comm="syz.0.18173" name="rdma_cm" dev="devtmpfs" ino=250 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1506.341660][ T29] audit: type=1400 audit(1734463266.604:67728): avc: denied { open } for pid=22118 comm="syz.0.18173" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=250 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1506.366074][ T29] audit: type=1400 audit(1734463266.604:67729): avc: denied { execmem } for pid=22118 comm="syz.0.18173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1506.385547][ T29] audit: type=1326 audit(1734463266.604:67730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22117 comm="syz.4.18172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f4a88f15d19 code=0x7ffc0000 [ 1506.409339][ T29] audit: type=1326 audit(1734463266.604:67731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22117 comm="syz.4.18172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a88f15d19 code=0x7ffc0000 [ 1506.433034][ T29] audit: type=1326 audit(1734463266.644:67732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22117 comm="syz.4.18172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat=0 ip=0x7f4a88f15d19 code=0x7ffc0000 [ 1506.456883][ T29] audit: type=1326 audit(1734463266.644:67733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22117 comm="syz.4.18172" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a88f15d19 code=0x7ffc0000 [ 1506.736590][T22168] netlink: 'syz.1.18194': attribute type 1 has an invalid length. [ 1507.168191][T22236] syzkaller0: entered promiscuous mode [ 1507.173866][T22236] syzkaller0: entered allmulticast mode [ 1507.359565][T22262] bond_slave_0: entered promiscuous mode [ 1507.365272][T22262] bond_slave_1: entered promiscuous mode [ 1507.371226][T22262] macvtap1: entered promiscuous mode [ 1507.376598][T22262] bond0: entered promiscuous mode [ 1507.383006][T22262] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1507.391791][T22262] bond0: left promiscuous mode [ 1507.396975][T22262] bond_slave_0: left promiscuous mode [ 1507.402343][T22262] bond_slave_1: left promiscuous mode [ 1507.499415][T22272] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 1507.507395][T22272] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 1507.621746][T22290] bond_slave_0: entered promiscuous mode [ 1507.627510][T22290] bond_slave_1: entered promiscuous mode [ 1507.636298][T22290] macvtap1: entered promiscuous mode [ 1507.641610][T22290] bond0: entered promiscuous mode [ 1507.647867][T22290] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1507.658450][T22290] bond0: left promiscuous mode [ 1507.663553][T22290] bond_slave_0: left promiscuous mode [ 1507.668941][T22290] bond_slave_1: left promiscuous mode [ 1507.831963][T22313] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 1507.839889][T22313] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 1508.023054][T22342] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 1508.031028][T22342] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 1508.345202][T22375] syzkaller0: entered promiscuous mode [ 1508.350766][T22375] syzkaller0: entered allmulticast mode [ 1508.709957][T22398] netlink: 'syz.3.18290': attribute type 1 has an invalid length. [ 1508.836106][T22400] syzkaller0: entered promiscuous mode [ 1508.841736][T22400] syzkaller0: entered allmulticast mode [ 1508.855488][T22402] team_slave_0: entered promiscuous mode [ 1508.861133][T22402] team_slave_1: entered promiscuous mode [ 1508.867055][T22402] macvtap1: entered promiscuous mode [ 1508.872337][T22402] team0: entered promiscuous mode [ 1508.878149][T22402] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1508.886031][T22402] team0: Device macvtap1 is already an upper device of the team interface [ 1508.895429][T22402] team0: left promiscuous mode [ 1508.900366][T22402] team_slave_0: left promiscuous mode [ 1508.905826][T22402] team_slave_1: left promiscuous mode [ 1509.149440][T22428] netlink: 'syz.0.18303': attribute type 1 has an invalid length. [ 1509.250087][T22436] syzkaller0: entered promiscuous mode [ 1509.255621][T22436] syzkaller0: entered allmulticast mode [ 1509.491853][T22454] team_slave_0: entered promiscuous mode [ 1509.497601][T22454] team_slave_1: entered promiscuous mode [ 1509.517243][T22454] macvtap1: entered promiscuous mode [ 1509.522641][T22454] team0: entered promiscuous mode [ 1509.533791][T22454] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1509.542200][T22454] team0: Device macvtap1 is already an upper device of the team interface [ 1509.554766][T22454] team0: left promiscuous mode [ 1509.559786][T22454] team_slave_0: left promiscuous mode [ 1509.565189][T22454] team_slave_1: left promiscuous mode [ 1509.718829][T22469] netlink: 'syz.6.18318': attribute type 1 has an invalid length. [ 1509.783720][T22473] ip6gretap0: entered promiscuous mode [ 1509.799773][T22473] macvtap1: entered promiscuous mode [ 1509.808463][T22473] ip6gretap0: left promiscuous mode [ 1509.824158][T22475] team_slave_0: entered promiscuous mode [ 1509.829831][T22475] team_slave_1: entered promiscuous mode [ 1509.838250][T22475] macvtap1: entered promiscuous mode [ 1509.843662][T22475] team0: entered promiscuous mode [ 1509.849826][T22475] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1509.861032][T22475] team0: Device macvtap1 is already an upper device of the team interface [ 1509.872666][T22475] team0: left promiscuous mode [ 1509.877590][T22475] team_slave_0: left promiscuous mode [ 1509.882991][T22475] team_slave_1: left promiscuous mode [ 1510.125451][T22497] __nla_validate_parse: 21 callbacks suppressed [ 1510.125467][T22497] netlink: 16 bytes leftover after parsing attributes in process `syz.6.18333'. [ 1510.140982][T22497] netlink: 16 bytes leftover after parsing attributes in process `syz.6.18333'. [ 1510.150056][T22497] netlink: 16 bytes leftover after parsing attributes in process `syz.6.18333'. [ 1510.199641][T22500] syz.6.18334[22500] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1510.199754][T22500] syz.6.18334[22500] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1510.216523][T22500] syz.6.18334[22500] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1510.302514][T22507] ip6gretap0: entered promiscuous mode [ 1510.308317][T22507] macvtap1: entered promiscuous mode [ 1510.318082][T22507] ip6gretap0: left promiscuous mode [ 1510.362204][T22521] netlink: 16 bytes leftover after parsing attributes in process `syz.6.18345'. [ 1510.371247][T22521] netlink: 16 bytes leftover after parsing attributes in process `syz.6.18345'. [ 1510.380345][T22521] netlink: 16 bytes leftover after parsing attributes in process `syz.6.18345'. [ 1510.687382][T20493] syz-executor invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 1510.698417][T20493] CPU: 1 UID: 0 PID: 20493 Comm: syz-executor Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 1510.709358][T20493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 1510.719409][T20493] Call Trace: [ 1510.722686][T20493] [ 1510.725618][T20493] dump_stack_lvl+0xf2/0x150 [ 1510.730225][T20493] dump_stack+0x15/0x1a [ 1510.734467][T20493] dump_header+0x83/0x2d0 [ 1510.738822][T20493] oom_kill_process+0x341/0x4c0 [ 1510.743676][T20493] out_of_memory+0x9af/0xbe0 [ 1510.748321][T20493] ? css_next_descendant_pre+0x11c/0x140 [ 1510.753953][T20493] mem_cgroup_out_of_memory+0x13e/0x190 [ 1510.759544][T20493] try_charge_memcg+0x508/0x7f0 [ 1510.764397][T20493] charge_memcg+0x50/0xc0 [ 1510.768800][T20493] mem_cgroup_swapin_charge_folio+0xd0/0x150 [ 1510.774920][T20493] __read_swap_cache_async+0x236/0x480 [ 1510.780373][T20493] swap_cluster_readahead+0x279/0x3f0 [ 1510.785775][T20493] swapin_readahead+0xe4/0x6f0 [ 1510.790560][T20493] ? swap_cache_get_folio+0x77/0x210 [ 1510.795887][T20493] do_swap_page+0x31b/0x2550 [ 1510.800468][T20493] ? hrtimer_try_to_cancel+0x106/0x1d0 [ 1510.805964][T20493] ? __rcu_read_lock+0x36/0x50 [ 1510.810723][T20493] ? __pfx_default_wake_function+0x10/0x10 [ 1510.816523][T20493] handle_mm_fault+0x8e4/0x2ac0 [ 1510.821371][T20493] exc_page_fault+0x3b9/0x650 [ 1510.826143][T20493] asm_exc_page_fault+0x26/0x30 [ 1510.830993][T20493] RIP: 0033:0x7f6bf73e8585 [ 1510.835397][T20493] Code: 00 00 00 00 00 83 ff 03 74 7b 83 ff 02 b8 fa ff ff ff 49 89 ca 0f 44 f8 80 3d be 3f 19 00 00 74 14 b8 e6 00 00 00 0f 05 f7 d8 66 2e 0f 1f 84 00 00 00 00 00 48 83 ec 28 48 89 54 24 10 89 74 [ 1510.855025][T20493] RSP: 002b:00007ffcb8ada968 EFLAGS: 00010246 [ 1510.861137][T20493] RAX: 0000000000000000 RBX: 00000000000001af RCX: 00007f6bf73e8583 [ 1510.869099][T20493] RDX: 00007ffcb8ada980 RSI: 0000000000000000 RDI: 0000000000000000 [ 1510.877126][T20493] RBP: 00007ffcb8ada9dc R08: 000000002695a295 R09: 7fffffffffffffff [ 1510.885135][T20493] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000032 [ 1510.893094][T20493] R13: 0000000000170c03 R14: 00007ffcb8adaa30 R15: 0000000000000bb8 [ 1510.901059][T20493] [ 1510.904152][T20493] memory: usage 307200kB, limit 307200kB, failcnt 5715 [ 1510.911152][T20493] memory+swap: usage 307536kB, limit 9007199254740988kB, failcnt 0 [ 1510.919067][T20493] kmem: usage 307192kB, limit 9007199254740988kB, failcnt 0 [ 1510.926366][T20493] Memory cgroup stats for /syz0: [ 1510.926837][T20493] cache 0 [ 1510.934816][T20493] rss 0 [ 1510.937649][T20493] shmem 0 [ 1510.940617][T20493] mapped_file 0 [ 1510.944090][T20493] dirty 0 [ 1510.947026][T20493] writeback 0 [ 1510.950312][T20493] workingset_refault_anon 2855 [ 1510.955156][T20493] workingset_refault_file 2888 [ 1510.959910][T20493] swap 348160 [ 1510.963223][T20493] swapcached 4096 [ 1510.966922][T20493] pgpgin 1871827 [ 1510.970463][T20493] pgpgout 1871826 [ 1510.974144][T20493] pgfault 2198458 [ 1510.977809][T20493] pgmajfault 420 [ 1510.981349][T20493] inactive_anon 0 [ 1510.984990][T20493] active_anon 4096 [ 1510.988699][T20493] inactive_file 0 [ 1510.992317][T20493] active_file 0 [ 1510.995805][T20493] unevictable 0 [ 1510.999256][T20493] hierarchical_memory_limit 314572800 [ 1511.004641][T20493] hierarchical_memsw_limit 9223372036854771712 [ 1511.010845][T20493] total_cache 0 [ 1511.014436][T20493] total_rss 0 [ 1511.017710][T20493] total_shmem 0 [ 1511.021234][T20493] total_mapped_file 0 [ 1511.025217][T20493] total_dirty 0 [ 1511.028718][T20493] total_writeback 0 [ 1511.032553][T20493] total_workingset_refault_anon 2855 [ 1511.037930][T20493] total_workingset_refault_file 2888 [ 1511.043229][T20493] total_swap 348160 [ 1511.047028][T20493] total_swapcached 4096 [ 1511.051173][T20493] total_pgpgin 1871856 [ 1511.055272][T20493] total_pgpgout 1871855 [ 1511.059480][T20493] total_pgfault 2198497 [ 1511.063652][T20493] total_pgmajfault 420 [ 1511.067753][T20493] total_inactive_anon 0 [ 1511.071899][T20493] total_active_anon 4096 [ 1511.076146][T20493] total_inactive_file 0 [ 1511.080292][T20493] total_active_file 0 [ 1511.084308][T20493] total_unevictable 0 [ 1511.088276][T20493] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz.0.18346,pid=22522,uid=0 [ 1511.103089][T20493] Memory cgroup out of memory: Killed process 22522 (syz.0.18346) total-vm:93384kB, anon-rss:788kB, file-rss:22344kB, shmem-rss:0kB, UID:0 pgtables:120kB oom_score_adj:1000 [ 1511.162311][T22542] team_slave_0: entered promiscuous mode [ 1511.168058][T22542] team_slave_1: entered promiscuous mode [ 1511.176667][T22542] macvtap1: entered promiscuous mode [ 1511.179017][T22548] netlink: 16 bytes leftover after parsing attributes in process `syz.4.18357'. [ 1511.181957][T22542] team0: entered promiscuous mode [ 1511.183121][T22542] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1511.191054][T22548] netlink: 16 bytes leftover after parsing attributes in process `syz.4.18357'. [ 1511.201588][T22542] team0: Device macvtap1 is already an upper device of the team interface [ 1511.202935][T22548] netlink: 16 bytes leftover after parsing attributes in process `syz.4.18357'. [ 1511.235877][T22542] team0: left promiscuous mode [ 1511.240826][T22542] team_slave_0: left promiscuous mode [ 1511.246226][T22542] team_slave_1: left promiscuous mode [ 1511.301356][ T29] kauditd_printk_skb: 1531 callbacks suppressed [ 1511.301367][ T29] audit: type=1400 audit(1734463271.704:69262): avc: denied { execmem } for pid=22555 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1511.380264][ T29] audit: type=1400 audit(1734463271.734:69263): avc: denied { mounton } for pid=22558 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1511.413608][ T29] audit: type=1326 audit(1734463271.824:69264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22565 comm="syz.6.18365" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6953405d19 code=0x7ffc0000 [ 1511.431321][T22561] syzkaller0: entered promiscuous mode [ 1511.437330][ T29] audit: type=1326 audit(1734463271.824:69265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22565 comm="syz.6.18365" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6953405d19 code=0x7ffc0000 [ 1511.442760][T22561] syzkaller0: entered allmulticast mode [ 1511.473764][ T29] audit: type=1326 audit(1734463271.824:69266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22565 comm="syz.6.18365" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f6953405d19 code=0x7ffc0000 [ 1511.497300][ T29] audit: type=1326 audit(1734463271.824:69267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22565 comm="syz.6.18365" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6953405d19 code=0x7ffc0000 [ 1511.520938][ T29] audit: type=1326 audit(1734463271.824:69268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22565 comm="syz.6.18365" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f6953405d19 code=0x7ffc0000 [ 1511.544605][ T29] audit: type=1326 audit(1734463271.824:69269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22565 comm="syz.6.18365" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6953405d19 code=0x7ffc0000 [ 1511.568216][ T29] audit: type=1326 audit(1734463271.824:69270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22565 comm="syz.6.18365" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat=0 ip=0x7f6953405d19 code=0x7ffc0000 [ 1511.591876][ T29] audit: type=1326 audit(1734463271.824:69271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22565 comm="syz.6.18365" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6953405d19 code=0x7ffc0000 [ 1511.675442][T22577] syz.0.18367[22577] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1511.675533][T22577] syz.0.18367[22577] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1511.689997][T22577] syz.0.18367[22577] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1511.709679][T22558] xfrm0 speed is unknown, defaulting to 1000 [ 1511.763211][T22558] lo speed is unknown, defaulting to 1000 [ 1511.788855][T15957] netdevsim netdevsim4 netdevsim3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1511.799200][T15957] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1511.872637][T15957] netdevsim netdevsim4 netdevsim2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1511.883022][T15957] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1512.075483][T15957] netdevsim netdevsim4 netdevsim1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1512.085804][T15957] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1512.106432][T22558] chnl_net:caif_netlink_parms(): no params data found [ 1512.220843][T15957] netdevsim netdevsim4 netdevsim0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1512.231198][T15957] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1512.306235][T22558] bridge0: port 1(bridge_slave_0) entered blocking state [ 1512.313337][T22558] bridge0: port 1(bridge_slave_0) entered disabled state [ 1512.320744][T22558] bridge_slave_0: entered allmulticast mode [ 1512.327194][T22558] bridge_slave_0: entered promiscuous mode [ 1512.337826][T22558] bridge0: port 2(bridge_slave_1) entered blocking state [ 1512.344917][T22558] bridge0: port 2(bridge_slave_1) entered disabled state [ 1512.361506][T22619] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 1512.362400][T22558] bridge_slave_1: entered allmulticast mode [ 1512.369456][T22619] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 1512.386949][T22558] bridge_slave_1: entered promiscuous mode [ 1512.388377][T22579] syz.3.18368 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 1512.403597][T22579] CPU: 0 UID: 0 PID: 22579 Comm: syz.3.18368 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 1512.414587][T22579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 1512.424643][T22579] Call Trace: [ 1512.427918][T22579] [ 1512.430970][T22579] dump_stack_lvl+0xf2/0x150 [ 1512.435573][T22579] dump_stack+0x15/0x1a [ 1512.439789][T22579] dump_header+0x83/0x2d0 [ 1512.444127][T22579] oom_kill_process+0x341/0x4c0 [ 1512.449011][T22579] out_of_memory+0x9af/0xbe0 [ 1512.453604][T22579] ? css_next_descendant_pre+0x11c/0x140 [ 1512.459301][T22579] mem_cgroup_out_of_memory+0x13e/0x190 [ 1512.464922][T22579] try_charge_memcg+0x508/0x7f0 [ 1512.469930][T22579] charge_memcg+0x50/0xc0 [ 1512.474264][T22579] mem_cgroup_swapin_charge_folio+0xd0/0x150 [ 1512.480252][T22579] __read_swap_cache_async+0x236/0x480 [ 1512.485720][T22579] swap_cluster_readahead+0x279/0x3f0 [ 1512.491172][T22579] swapin_readahead+0xe4/0x6f0 [ 1512.495999][T22579] ? __lruvec_stat_mod_folio+0xdb/0x120 [ 1512.501663][T22579] ? swap_cache_get_folio+0x77/0x210 [ 1512.507076][T22579] do_swap_page+0x31b/0x2550 [ 1512.511784][T22579] ? __rcu_read_lock+0x36/0x50 [ 1512.516566][T22579] ? __pfx_default_wake_function+0x10/0x10 [ 1512.522418][T22579] handle_mm_fault+0x8e4/0x2ac0 [ 1512.527282][T22579] exc_page_fault+0x3b9/0x650 [ 1512.531968][T22579] asm_exc_page_fault+0x26/0x30 [ 1512.536832][T22579] RIP: 0033:0x7f5ef1b0cb1c [ 1512.541250][T22579] Code: 66 0f 1f 44 00 00 69 3d 96 8b e4 00 e8 03 00 00 48 8d 1d 97 94 31 00 e8 62 91 12 00 eb 0c 48 81 c3 e0 00 00 00 48 39 eb 74 24 <80> 7b 20 00 74 ee 8b 43 0c 85 c0 74 e7 48 89 df 48 81 c3 e0 00 00 [ 1512.560902][T22579] RSP: 002b:00007fffefcff070 EFLAGS: 00010202 [ 1512.566957][T22579] RAX: 0000000000000000 RBX: 00007f5ef1e25fa0 RCX: 0000000000000000 [ 1512.574919][T22579] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000055557770d808 [ 1512.582880][T22579] RBP: 00007f5ef1e27ba0 R08: 0000000000000000 R09: 7fffffffffffffff [ 1512.590841][T22579] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000171430 [ 1512.598874][T22579] R13: 00007fffefcff170 R14: 0000000000000032 R15: ffffffffffffffff [ 1512.606847][T22579] [ 1512.610416][T22579] memory: usage 307200kB, limit 307200kB, failcnt 474 [ 1512.617701][T22579] memory+swap: usage 307576kB, limit 9007199254740988kB, failcnt 0 [ 1512.625615][T22579] kmem: usage 307188kB, limit 9007199254740988kB, failcnt 0 [ 1512.632915][T22579] Memory cgroup stats for /syz3: [ 1512.633163][T22579] cache 0 [ 1512.641146][T22579] rss 0 [ 1512.643955][T22579] shmem 0 [ 1512.646880][T22579] mapped_file 0 [ 1512.650325][T22579] dirty 0 [ 1512.653268][T22579] writeback 12288 [ 1512.656889][T22579] workingset_refault_anon 78 [ 1512.661470][T22579] workingset_refault_file 1 [ 1512.666053][T22579] swap 385024 [ 1512.669335][T22579] swapcached 12288 [ 1512.673061][T22579] pgpgin 1396714 [ 1512.676652][T22579] pgpgout 1396711 [ 1512.680273][T22579] pgfault 1615620 [ 1512.683966][T22579] pgmajfault 32 [ 1512.687426][T22579] inactive_anon 12288 [ 1512.691418][T22579] active_anon 0 [ 1512.694889][T22579] inactive_file 0 [ 1512.698517][T22579] active_file 0 [ 1512.702012][T22579] unevictable 0 [ 1512.705482][T22579] hierarchical_memory_limit 314572800 [ 1512.710898][T22579] hierarchical_memsw_limit 9223372036854771712 [ 1512.717088][T22579] total_cache 0 [ 1512.717096][T22579] total_rss 0 [ 1512.717104][T22579] total_shmem 0 [ 1512.727334][T22579] total_mapped_file 0 [ 1512.731304][T22579] total_dirty 0 [ 1512.734791][T22579] total_writeback 12288 [ 1512.738938][T22579] total_workingset_refault_anon 78 [ 1512.744059][T22579] total_workingset_refault_file 1 [ 1512.749102][T22579] total_swap 385024 [ 1512.753012][T22579] total_swapcached 12288 [ 1512.757250][T22579] total_pgpgin 1396714 [ 1512.761304][T22579] total_pgpgout 1396711 [ 1512.765467][T22579] total_pgfault 1615620 [ 1512.769714][T22579] total_pgmajfault 32 [ 1512.773747][T22579] total_inactive_anon 12288 [ 1512.778242][T22579] total_active_anon 0 [ 1512.782209][T22579] total_inactive_file 0 [ 1512.786391][T22579] total_active_file 0 [ 1512.790437][T22579] total_unevictable 0 [ 1512.794437][T22579] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz3,task_memcg=/syz3,task=syz.3.17042,pid=19363,uid=0 [ 1512.809311][T22579] Memory cgroup out of memory: Killed process 19363 (syz.3.17042) total-vm:93384kB, anon-rss:828kB, file-rss:20736kB, shmem-rss:0kB, UID:0 pgtables:104kB oom_score_adj:1000 [ 1512.840200][T22627] syz_tun: entered promiscuous mode [ 1512.848584][T22627] macvtap1: entered promiscuous mode [ 1512.859841][T22627] syz_tun: left promiscuous mode [ 1512.887719][T22558] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1512.900419][T15957] bridge_slave_1: left allmulticast mode [ 1512.906103][T15957] bridge_slave_1: left promiscuous mode [ 1512.911785][T15957] bridge0: port 2(bridge_slave_1) entered disabled state [ 1512.920855][T15957] bridge_slave_0: left allmulticast mode [ 1512.926577][T15957] bridge_slave_0: left promiscuous mode [ 1512.932207][T15957] bridge0: port 1(bridge_slave_0) entered disabled state [ 1513.105063][T15957] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1513.121691][T15957] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1513.135324][T15957] bond0 (unregistering): Released all slaves [ 1513.148651][T22558] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1513.208136][T22558] team0: Port device team_slave_0 added [ 1513.225732][T22558] team0: Port device team_slave_1 added [ 1513.267028][T15957] hsr_slave_0: left promiscuous mode [ 1513.281433][T15957] hsr_slave_1: left promiscuous mode [ 1513.287370][T15957] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1513.294851][T15957] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1513.304591][T15957] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1513.312047][T15957] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1513.327591][T15957] veth1_macvtap: left promiscuous mode [ 1513.333111][T15957] veth0_macvtap: left promiscuous mode [ 1513.338595][T15957] veth1_vlan: left promiscuous mode [ 1513.343923][T15957] veth0_vlan: left promiscuous mode [ 1513.466863][T15957] team0 (unregistering): Port device team_slave_1 removed [ 1513.476865][T15957] team0 (unregistering): Port device team_slave_0 removed [ 1513.508781][T22558] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1513.515812][T22558] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1513.541830][T22558] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1513.565420][T22668] team_slave_0: entered promiscuous mode [ 1513.571095][T22668] team_slave_1: entered promiscuous mode [ 1513.577013][T22668] macvtap1: entered promiscuous mode [ 1513.582335][T22668] team0: entered promiscuous mode [ 1513.588694][T22668] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1513.597073][T22668] team0: Device macvtap1 is already an upper device of the team interface [ 1513.606053][T22668] team0: left promiscuous mode [ 1513.611086][T22668] team_slave_0: left promiscuous mode [ 1513.616473][T22668] team_slave_1: left promiscuous mode [ 1513.627757][T22558] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1513.634741][T22558] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1513.660721][T22558] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1513.697932][T22558] hsr_slave_0: entered promiscuous mode [ 1513.704511][T22558] hsr_slave_1: entered promiscuous mode [ 1513.710942][T22558] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1513.718570][T22558] Cannot create hsr debugfs directory [ 1513.727134][T22678] batadv0: entered promiscuous mode [ 1513.732448][T22678] macvtap1: entered promiscuous mode [ 1513.738649][T22678] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 1513.746932][T22678] batadv0: left promiscuous mode [ 1513.910505][T22688] syzkaller0: entered promiscuous mode [ 1513.916118][T22688] syzkaller0: entered allmulticast mode [ 1514.020197][T22692] netlink: 48 bytes leftover after parsing attributes in process `syz.3.18414'. [ 1514.105430][T22694] syzkaller0: entered promiscuous mode [ 1514.110916][T22694] syzkaller0: entered allmulticast mode [ 1514.177052][T22558] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 1514.185862][T22558] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 1514.194715][T22558] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1514.203291][T22558] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 1514.295771][T22558] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1514.329768][T22558] 8021q: adding VLAN 0 to HW filter on device team0 [ 1514.341625][T15961] bridge0: port 1(bridge_slave_0) entered blocking state [ 1514.348693][T15961] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1514.363522][T15961] bridge0: port 2(bridge_slave_1) entered blocking state [ 1514.370592][T15961] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1514.391612][T22558] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1514.402135][T22558] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1514.479110][T22558] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1514.703393][T22558] veth0_vlan: entered promiscuous mode [ 1514.712374][T22558] veth1_vlan: entered promiscuous mode [ 1514.736979][T22558] veth0_macvtap: entered promiscuous mode [ 1514.745486][T22558] veth1_macvtap: entered promiscuous mode [ 1514.761291][T22558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1514.771838][T22558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1514.781713][T22558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1514.792155][T22558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1514.801993][T22558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1514.812491][T22558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1514.822329][T22558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1514.832766][T22558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1514.836048][T22767] netlink: 'syz.0.18442': attribute type 1 has an invalid length. [ 1514.842619][T22558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1514.842637][T22558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1514.842647][T22558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1514.842715][T22558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1514.891086][T22558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1514.901539][T22558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1514.911392][T22558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1514.921834][T22558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1514.931655][T22558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1514.942075][T22558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1514.951923][T22558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1514.962359][T22558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1514.972313][T22558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1514.982760][T22558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1514.992713][T22558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1515.003150][T22558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1515.016373][T22558] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1515.032788][T22558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1515.043359][T22558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1515.053275][T22558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1515.063729][T22558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1515.073635][T22558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1515.077714][T22769] netlink: 'syz.3.18443': attribute type 1 has an invalid length. [ 1515.084108][T22558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1515.084123][T22558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1515.112388][T22558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1515.122364][T22558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1515.133082][T22558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1515.142996][T22558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1515.153425][T22558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1515.163230][T22558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1515.173639][T22558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1515.183582][T22558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1515.193997][T22558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1515.203799][T22558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1515.214235][T22558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1515.224040][T22558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1515.234453][T22558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1515.244421][T22558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1515.254835][T22558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1515.264720][T22558] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 1515.275229][T22558] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1515.286846][T22558] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1515.296614][T22558] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1515.305443][T22558] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1515.314226][T22558] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1515.322931][T22558] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1515.351254][T22774] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 1515.359226][T22774] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 1515.557757][T22801] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1515.586184][T22801] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1515.587435][T22784] xfrm0 speed is unknown, defaulting to 1000 [ 1515.600220][T22784] lo speed is unknown, defaulting to 1000 [ 1515.662997][T15957] netdevsim netdevsim1 netdevsim3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1515.673274][T15957] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1515.699068][T22784] chnl_net:caif_netlink_parms(): no params data found [ 1515.729511][T15957] netdevsim netdevsim1 netdevsim2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1515.739833][T15957] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1515.756106][T22784] bridge0: port 1(bridge_slave_0) entered blocking state [ 1515.763275][T22784] bridge0: port 1(bridge_slave_0) entered disabled state [ 1515.770586][T22784] bridge_slave_0: entered allmulticast mode [ 1515.777411][T22784] bridge_slave_0: entered promiscuous mode [ 1515.784199][T22784] bridge0: port 2(bridge_slave_1) entered blocking state [ 1515.791269][T22784] bridge0: port 2(bridge_slave_1) entered disabled state [ 1515.798480][T22784] bridge_slave_1: entered allmulticast mode [ 1515.805140][T22784] bridge_slave_1: entered promiscuous mode [ 1515.815020][T15957] netdevsim netdevsim1 netdevsim1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1515.825325][T15957] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1515.847554][T22784] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1515.858649][T22784] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1515.870316][T15957] netdevsim netdevsim1 netdevsim0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1515.880626][T15957] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1515.901576][T22784] team0: Port device team_slave_0 added [ 1515.908486][T22784] team0: Port device team_slave_1 added [ 1515.924840][T22784] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1515.931856][T22784] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1515.957816][T22784] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1515.969411][T22784] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1515.976409][T22784] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1516.002481][T22784] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1516.039486][T22784] hsr_slave_0: entered promiscuous mode [ 1516.046164][T22784] hsr_slave_1: entered promiscuous mode [ 1516.051475][T22815] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 1516.059570][T22815] SELinux: failure in selinux_parse_skb(), unable to parse packet [ 1516.059583][T22784] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1516.059648][T22815] ================================================================== [ 1516.067457][T22784] Cannot create hsr debugfs directory [ 1516.074913][T22815] BUG: KCSAN: data-race in _prb_read_valid / prb_reserve [ 1516.074943][T22815] [ 1516.097643][T22815] write to 0xffffffff86725248 of 8 bytes by task 22784 on cpu 1: [ 1516.105336][T22815] prb_reserve+0x740/0xb60 [ 1516.109734][T22815] vprintk_store+0x558/0x870 [ 1516.114309][T22815] vprintk_emit+0x15e/0x680 [ 1516.118806][T22815] vprintk_default+0x26/0x30 [ 1516.123403][T22815] vprintk+0x75/0x80 [ 1516.127290][T22815] _printk+0x7a/0xa0 [ 1516.131163][T22815] start_creating+0x207/0x230 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1516.135827][T22815] debugfs_create_dir+0x21/0x2b0 [ 1516.140760][T22815] hsr_debugfs_init+0x36/0xe0 [ 1516.145429][T22815] hsr_dev_finalize+0x609/0x640 [ 1516.150297][T22815] hsr_newlink+0x535/0x5e0 [ 1516.154715][T22815] rtnl_newlink_create+0x1b7/0x5d0 [ 1516.159839][T22815] rtnl_newlink+0xe20/0x1200 [ 1516.164431][T22815] rtnetlink_rcv_msg+0x651/0x710 [ 1516.169367][T22815] netlink_rcv_skb+0x12c/0x230 [ 1516.174131][T22815] rtnetlink_rcv+0x1c/0x30 [ 1516.178547][T22815] netlink_unicast+0x599/0x670 [ 1516.183310][T22815] netlink_sendmsg+0x5cc/0x6e0 [ 1516.188090][T22815] __sock_sendmsg+0x140/0x180 [ 1516.192779][T22815] __sys_sendto+0x1a8/0x230 [ 1516.197287][T22815] __x64_sys_sendto+0x78/0x90 [ 1516.201962][T22815] x64_sys_call+0x29fa/0x2dc0 [ 1516.206642][T22815] do_syscall_64+0xc9/0x1c0 [ 1516.211153][T22815] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1516.217063][T22815] [ 1516.219387][T22815] read to 0xffffffff86725248 of 8 bytes by task 22815 on cpu 0: [ 1516.227018][T22815] _prb_read_valid+0x1ec/0xba0 [ 1516.231791][T22815] prb_final_commit+0x144/0x1f0 [ 1516.236646][T22815] vprintk_store+0x75d/0x870 [ 1516.241246][T22815] vprintk_emit+0x15e/0x680 [ 1516.245759][T22815] vprintk_default+0x26/0x30 [ 1516.250352][T22815] vprintk+0x75/0x80 [ 1516.254243][T22815] _printk+0x7a/0xa0 [ 1516.258140][T22815] selinux_parse_skb+0x97d/0xda0 [ 1516.263094][T22815] selinux_ip_postroute+0x804/0xb90 [ 1516.268310][T22815] nf_hook_slow+0x86/0x1b0 [ 1516.272732][T22815] ip_mc_output+0x306/0x350 [ 1516.277238][T22815] NF_HOOK+0xd4/0x180 [ 1516.281236][T22815] raw_send_hdrinc+0x84f/0xa70 [ 1516.286013][T22815] raw_sendmsg+0xc59/0xe50 [ 1516.290441][T22815] inet_sendmsg+0xc5/0xd0 [ 1516.294780][T22815] __sock_sendmsg+0x102/0x180 [ 1516.299461][T22815] ____sys_sendmsg+0x312/0x410 [ 1516.304227][T22815] __sys_sendmmsg+0x227/0x4b0 [ 1516.308905][T22815] __x64_sys_sendmmsg+0x57/0x70 [ 1516.313761][T22815] x64_sys_call+0x29aa/0x2dc0 [ 1516.318446][T22815] do_syscall_64+0xc9/0x1c0 [ 1516.322957][T22815] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1516.328869][T22815] [ 1516.331187][T22815] value changed: 0x0000000000003a63 -> 0x0000000000005a63 [ 1516.338292][T22815] [ 1516.340611][T22815] Reported by Kernel Concurrency Sanitizer on: [ 1516.346765][T22815] CPU: 0 UID: 0 PID: 22815 Comm: syz.3.18456 Not tainted 6.13.0-rc3-syzkaller-00026-g59dbb9d81adf #0 [ 1516.357621][T22815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 1516.367676][T22815] ================================================================== [ 1516.375769][ T29] kauditd_printk_skb: 352 callbacks suppressed [ 1516.375781][ T29] audit: type=1400 audit(1734463276.544:69624): avc: denied { write } for pid=3285 comm="syz-executor" path="pipe:[1641]" dev="pipefs" ino=1641 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 1516.382008][ T29] audit: type=1400 audit(1734463276.554:69625): avc: denied { recv } for pid=15951 comm="kworker/u8:32" saddr=10.128.0.163 src=39508 daddr=10.128.0.237 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 1516.498454][T15957] bridge_slave_1: left allmulticast mode [ 1516.504156][T15957] bridge_slave_1: left promiscuous mode [ 1516.509867][T15957] bridge0: port 2(bridge_slave_1) entered disabled state [ 1516.518062][T15957] bridge_slave_0: left allmulticast mode [ 1516.523741][T15957] bridge_slave_0: left promiscuous mode [ 1516.529332][T15957] bridge0: port 1(bridge_slave_0) entered disabled state [ 1516.604080][T15957] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1516.613886][T15957] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1516.623886][T15957] bond0 (unregistering): Released all slaves [ 1516.679723][T15957] hsr_slave_0: left promiscuous mode [ 1516.685565][T15957] hsr_slave_1: left promiscuous mode [ 1516.693701][T15957] veth1_macvtap: left promiscuous mode [ 1516.699222][T15957] veth0_macvtap: left promiscuous mode [ 1516.704963][T15957] veth1_vlan: left promiscuous mode [ 1516.710208][T15957] veth0_vlan: left promiscuous mode [ 1516.779698][T15957] team0 (unregistering): Port device team_slave_1 removed [ 1516.789634][T15957] team0 (unregistering): Port device team_slave_0 removed [ 1517.196709][T16065] netdevsim netdevsim3 netdevsim3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1517.207054][T16065] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1517.284664][T16065] netdevsim netdevsim3 netdevsim2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1517.295093][T16065] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1517.344606][T16065] netdevsim netdevsim3 netdevsim1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1517.354916][T16065] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1517.404591][T16065] netdevsim netdevsim3 netdevsim0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1517.414895][T16065] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1517.455191][T16065] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1517.504778][T16065] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1517.565180][T16065] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1517.605768][T16065] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1517.664544][T16065] bridge_slave_1: left allmulticast mode [ 1517.670169][T16065] bridge_slave_1: left promiscuous mode [ 1517.675789][T16065] bridge0: port 2(bridge_slave_1) entered disabled state [ 1517.683909][T16065] bridge_slave_0: left allmulticast mode [ 1517.689539][T16065] bridge_slave_0: left promiscuous mode [ 1517.695452][T16065] bridge0: port 1(bridge_slave_0) entered disabled state [ 1517.703790][T16065] bridge_slave_1: left allmulticast mode [ 1517.709423][T16065] bridge_slave_1: left promiscuous mode [ 1517.715047][T16065] bridge0: port 2(bridge_slave_1) entered disabled state [ 1517.722846][T16065] bridge_slave_0: left allmulticast mode [ 1517.728481][T16065] bridge_slave_0: left promiscuous mode [ 1517.734150][T16065] bridge0: port 1(bridge_slave_0) entered disabled state [ 1517.741863][T16065] bridge_slave_1: left allmulticast mode [ 1517.747570][T16065] bridge_slave_1: left promiscuous mode [ 1517.753270][T16065] bridge0: port 2(bridge_slave_1) entered disabled state [ 1517.761017][T16065] bridge_slave_0: left allmulticast mode [ 1517.766693][T16065] bridge_slave_0: left promiscuous mode [ 1517.772308][T16065] bridge0: port 1(bridge_slave_0) entered disabled state [ 1517.985314][T16065] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1517.995177][T16065] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1518.004679][T16065] bond0 (unregistering): Released all slaves [ 1518.015150][T16065] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1518.024976][T16065] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1518.034368][T16065] bond0 (unregistering): Released all slaves [ 1518.042685][T16065] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1518.052569][T16065] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1518.062040][T16065] bond0 (unregistering): Released all slaves [ 1518.134684][T16065] hsr_slave_0: left promiscuous mode [ 1518.140348][T16065] hsr_slave_1: left promiscuous mode [ 1518.146040][T16065] hsr_slave_0: left promiscuous mode [ 1518.151624][T16065] hsr_slave_1: left promiscuous mode [ 1518.157705][T16065] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1518.165626][T16065] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1518.175343][T16065] hsr_slave_0: left promiscuous mode [ 1518.180999][T16065] hsr_slave_1: left promiscuous mode [ 1518.186774][T16065] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1518.194278][T16065] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1518.201831][T16065] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1518.209377][T16065] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1518.221728][T16065] veth1_macvtap: left promiscuous mode [ 1518.227268][T16065] veth0_macvtap: left promiscuous mode [ 1518.232837][T16065] veth1_vlan: left promiscuous mode [ 1518.238029][T16065] veth0_vlan: left promiscuous mode [ 1518.244057][T16065] veth1_macvtap: left promiscuous mode [ 1518.249579][T16065] veth0_macvtap: left promiscuous mode [ 1518.255094][T16065] veth1_vlan: left promiscuous mode [ 1518.260286][T16065] veth0_vlan: left promiscuous mode [ 1518.360449][T16065] team0 (unregistering): Port device team_slave_1 removed [ 1518.369560][T16065] team0 (unregistering): Port device team_slave_0 removed [ 1518.404850][T16065] team0 (unregistering): Port device team_slave_1 removed [ 1518.414681][T16065] team0 (unregistering): Port device team_slave_0 removed [ 1518.467680][T16065] team0 (unregistering): Port device team_slave_1 removed [ 1518.477619][T16065] team0 (unregistering): Port device team_slave_0 removed [ 1519.125342][T16065] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1519.315016][T16065] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1519.364736][T16065] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1519.414679][T16065] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1519.464669][T16065] bridge_slave_1: left allmulticast mode [ 1519.470305][T16065] bridge_slave_1: left promiscuous mode [ 1519.475955][T16065] bridge0: port 2(bridge_slave_1) entered disabled state [ 1519.483655][T16065] bridge_slave_0: left allmulticast mode [ 1519.489273][T16065] bridge_slave_0: left promiscuous mode [ 1519.494947][T16065] bridge0: port 1(bridge_slave_0) entered disabled state [ 1519.564361][T16065] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1519.574266][T16065] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1519.583810][T16065] bond0 (unregistering): Released all slaves [ 1519.648171][T16065] hsr_slave_0: left promiscuous mode [ 1519.654005][T16065] hsr_slave_1: left promiscuous mode [ 1519.659892][T16065] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1519.667309][T16065] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1519.674951][T16065] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1519.682428][T16065] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1519.692107][T16065] veth1_macvtap: left promiscuous mode [ 1519.697887][T16065] veth0_macvtap: left promiscuous mode [ 1519.703532][T16065] veth1_vlan: left promiscuous mode [ 1519.708767][T16065] veth0_vlan: left promiscuous mode [ 1519.765325][T16065] team0 (unregistering): Port device team_slave_1 removed [ 1519.776574][T16065] team0 (unregistering): Port device team_slave_0 removed