last executing test programs: 4m28.981162012s ago: executing program 2 (id=3993): r0 = socket(0x10, 0x803, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x365}, {&(0x7f0000000280)=""/85, 0x7c}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000400)=""/106, 0x1c}, {&(0x7f0000000980)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0xbe8}, {&(0x7f00000007c0)=""/154, 0x8}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) 4m28.924297242s ago: executing program 2 (id=3995): r0 = socket$phonet_pipe(0x23, 0x5, 0x2) r1 = socket$netlink(0x10, 0x3, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, 0x0, 0x0) connect$pppl2tp(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070080000000000000000000850000006d00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000780)='mm_page_free\x00', r2}, 0x10) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x8004, &(0x7f0000000080)={[{@discard}, {@bh}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}]}, 0x1, 0x7b9, &(0x7f00000007c0)="$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") r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x1) pwrite64(r3, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x107842, 0x42) sendfile(r1, r4, 0x0, 0x80020000) connect$phonet_pipe(r0, &(0x7f0000000040)={0x23, 0x0, 0x0, 0x1}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYRES32=r0], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) ioctl$SIOCPNENABLEPIPE(r0, 0x89ed, 0x0) 4m28.071953928s ago: executing program 2 (id=4003): syz_open_dev$tty1(0xc, 0x4, 0x1) (async) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000, 0x0, 0x0, 0x6, 0x3, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$KDGKBMODE(r0, 0x4bfa, &(0x7f0000000080)) (async) ioctl$KDGKBMODE(r0, 0x4bfa, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r1, 0x0, 0xfffffffffffffffd}, 0x18) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x34) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x18, 0xc, &(0x7f0000000540)=@framed={{0x18, 0x8, 0x0, 0x0, 0x9}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, @exit], {0x95, 0x0, 0xff85}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = socket$packet(0x11, 0x2, 0x300) ioctl(r3, 0x6, &(0x7f0000000280)="70a9d3aa0829a49f2806000000") ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="b400000010000904000000000000000000002200", @ANYRES32=0x0, @ANYBLOB="fffffffed9526cfd8400128009000100766c616e000000007400028006000100000600000c000200367da1650e000000280003800c00010001800000002000000c000100a1000000c84200000c0001000800000008000000340004800c00010006000000ff0300000c00010004000000080000000c00010004000000020000000c000100050000000300000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRESOCT], 0xb4}}, 0x0) (async) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="b400000010000904000000000000000000002200", @ANYRES32=0x0, @ANYBLOB="fffffffed9526cfd8400128009000100766c616e000000007400028006000100000600000c000200367da1650e000000280003800c00010001800000002000000c000100a1000000c84200000c0001000800000008000000340004800c00010006000000ff0300000c00010004000000080000000c00010004000000020000000c000100050000000300000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRESOCT], 0xb4}}, 0x0) 4m27.248240144s ago: executing program 2 (id=4014): syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000480), 0x1, 0x3d0, &(0x7f00000004c0)="$eJzs3M1uG0UcAPD/br5I+mEjcUCFgyUQBAFxHQhQhEThyscFeAArSUuF21SNkWjJoSBOnDggbhz6Ahx4gKpCSEi8Ai+AKlUozQFuQWvvOm4cp7Fix2r6+0mjndkdZ/bv3axm1rsTwGOrEhHnI2IiIhYjopSvT/MUN9spq3d/c2N5a3NjOYnt7U/+SSLJ1xV/K8mXJ/LCfBqRfhfxzM3edtev3/ii3misXsvL1eblq9X16zdevXS5fnH14uqV2pvnarWlxbdqrw8t1p+ef+ncxPvnz/z8V+nO0vT0bLa/J/Nt3XEMSyUqne9kt6VhNzZm0+PeAQAADiTN+/6Trf5/KSZaubZSVDfGunMAAADAUGy/my8BAACAYywx9gcAAIBjrngO4P7mxnKRxvg4wpG7915ElHfebd7qxD8ZT+R1pkb4fmslIq6+kJSyFCN6DxkAoNudrP9zdq/+XxpPd9WbiWj1h2aH3H5lV7m3/5PeHXKTD8j6f+9ExFZP/y8tqpQn8tKpVldxKrlwqbF6NiJOR8R8TM1k5do+bXzw7y8f99uWxf97cup0kbL2s+VOjfTu5MyDn1mpN+uHibnbvW8izkzuFX/S6f8mETF3iDYmvr71dr9tD49/tLZvRby45/Hfmbkn2X9+omrrfKgWZ0Wv/7799aN+7Y87/uz4z+0ffznpnq9pffA2bn/+57P9tnWPfwY5/6eTT1v5Ylz2Vb3ZvFaLmE4+7F2/uPPZolzUz+Kff27v///i+pfkc1qdzK8Bg/r+h99eOUj8WcraL8aCRyGLf2Wg4z945o3bf3zWr/2Hx58d//YcYPP5moNc/w66g4f57gAAAOBRkbbuayTpQiefpgsL7fsdT8Vc2lhbb758Ye3LKyvt+x/lmEqLO12lrvuhtfbP6J3y4q7yaxHxZET8WJptlReW1xor4w4eAAAAHhMn+oz/M38f2VMIAAAAwMiVx70DAAAAwMgZ/wMAAMCxdph5/WRkZI5rZtxXJgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgEfb/wEAAP//Wt22ag==") mknod(&(0x7f0000000180)='./file1\x00', 0x800, 0x7) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket(0x400000000010, 0x3, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001300)=@newtfilter={0x68, 0x2c, 0xd27, 0x70bd2c, 0x25dfdbff, {0x0, 0x0, 0x0, r4, {0x10, 0x6}, {}, {0x10, 0x3}}, [@filter_kind_options=@f_flower={{0xb}, {0x38, 0x2, [@TCA_FLOWER_ACT={0x34, 0x3, [@m_gact={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}]}]}}]}, 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x0) io_setup(0x6, &(0x7f0000000240)=0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r6 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r6, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x2, 0x0, "ef359f413bb907000020a4ae6de2fbd11000000000f1ffffff0ff8ee09e737ff0edf0200000000008f18d2b8f6277dd41905b9aafab4afaaf755a3f6a00400", "036c47c6780820d1cbf7966d61ffcf33524bbd9bffbcc2542ded71038232d71e14efbac003000000852f2036dc783800000000e9b49600", "f28359738e229a4c66810000000000f300e6d902000000000000000000000001"}) io_submit(r5, 0x3200, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0xe7030003, 0x0, 0x1, 0x0, r0, &(0x7f00000003c0)='\n', 0x1}]) 4m27.016457506s ago: executing program 2 (id=4017): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r2, 0xc0a85320, &(0x7f00000003c0)={{0x80}, 'port0\x00', 0x511e36599023629, 0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000640)={{0x80}, 'port1\x00', 0x0, 0x100001, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x6}) 4m25.792360675s ago: executing program 2 (id=4041): r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x8, &(0x7f0000004200)=0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x3, r0, 0x0}]) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0), r0) (fail_nth: 2) 4m25.792044465s ago: executing program 32 (id=4041): r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x8, &(0x7f0000004200)=0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x3, r0, 0x0}]) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0), r0) (fail_nth: 2) 4m15.840065385s ago: executing program 5 (id=4207): perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x68, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r3}, &(0x7f0000000a00), &(0x7f0000000a40)=r2}, 0x20) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) open(&(0x7f0000000080)='./bus\x00', 0x143c62, 0x0) mount(&(0x7f00000000c0), &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000040)='trans=rdma,') 4m15.780302526s ago: executing program 5 (id=4208): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000004000000000000000000008500000050000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x25, &(0x7f0000000040)={0x0, 0x0, 0x80, 0x200000007}) fcntl$lock(r1, 0x25, &(0x7f0000000180)={0x0, 0x1, 0x0, 0x80000000}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x2, 0x800800000003}, 0x1100, 0x5dd8, 0x3, 0x5, 0x0, 0x8, 0xff7b, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x17, 0x0, 0x3, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000072000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sys_enter\x00', r6}, 0x10) rt_sigaction(0x19, 0x0, 0x0, 0x8, &(0x7f0000000440)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001580)="42bf7e4b", 0x4}], 0x1}, 0x48001) setsockopt$sock_attach_bpf(r7, 0x1, 0x10, &(0x7f0000001280), 0x4) sendmsg$inet(r8, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="c6", 0x1}], 0x1}, 0x20008840) recvmsg$unix(r7, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x2122) sendmsg$nl_route_sched(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=@newtaction={0x8c, 0x30, 0x1, 0x0, 0x0, {}, [{0x78, 0x1, [@m_ct={0x2c, 0x2, 0x0, 0x0, {{0x7}, {0x4}, {0x4, 0x2}, {0xc}, {0xc}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0x0, 0xfffffffffffffffe}}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000300)=ANY=[@ANYBLOB="440000001000030500"/20, @ANYRES32=0x0, @ANYBLOB="15460100ef000000140012800b0001006d616373656300000400028008000500", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3], 0x44}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000240)={'erspan0\x00', &(0x7f00000001c0)={'gretap0\x00', r3, 0x20, 0x47, 0x1c000, 0x5, {{0xa, 0x4, 0x1, 0x9, 0x28, 0x68, 0x0, 0xcc, 0x2f, 0x0, @private=0xa010100, @loopback, {[@timestamp={0x44, 0x10, 0x21, 0x0, 0xa, [0x7, 0x9, 0x3]}, @noop]}}}}}) 4m15.471381618s ago: executing program 5 (id=4213): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000001c0)={'sit0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x81000000, 0x25dfdbfb, {0x0, 0x0, 0x0, r3, {0x0, 0x6}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_gred={{0x9}, {0x14, 0x2, [@TCA_GRED_DPS={0x10, 0x3, {0x10, 0x1}}]}}, @TCA_RATE={0x6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x48801}, 0x0) 4m15.373338539s ago: executing program 5 (id=4214): syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000480), 0x1, 0x3d0, &(0x7f00000004c0)="$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") mknod(&(0x7f0000000180)='./file1\x00', 0x800, 0x7) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket(0x400000000010, 0x3, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001300)=@newtfilter={0x68, 0x2c, 0xd27, 0x70bd2c, 0x25dfdbff, {0x0, 0x0, 0x0, r4, {0x10, 0x6}, {}, {0x10, 0x3}}, [@filter_kind_options=@f_flower={{0xb}, {0x38, 0x2, [@TCA_FLOWER_ACT={0x34, 0x3, [@m_gact={0x30, 0x1, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}]}]}}]}, 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r5, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x2, 0x0, "ef359f413bb907000020a4ae6de2fbd11000000000f1ffffff0ff8ee09e737ff0edf0200000000008f18d2b8f6277dd41905b9aafab4afaaf755a3f6a00400", "036c47c6780820d1cbf7966d61ffcf33524bbd9bffbcc2542ded71038232d71e14efbac003000000852f2036dc783800000000e9b49600", "f28359738e229a4c66810000000000f300e6d902000000000000000000000001"}) io_submit(0x0, 0x3200, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0xe7030003, 0x0, 0x1, 0x0, r0, &(0x7f00000003c0)='\n', 0x1}]) 4m15.027687181s ago: executing program 5 (id=4217): r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800000000003}, 0x1320, 0xffffffff, 0x20000, 0x5, 0x0, 0x1, 0xffff, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280), r1) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000540)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000500)={&(0x7f00000002c0)={0x1d8, r2, 0x2, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x168, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xea, 0x3, "d267e590a9146fb21c364c7c07a64351a5d328046f70a90d5675c799c4baf57d08cab8752b497d43cb16f34b53ad175202c31d5e68b6111b31dff0f836f9fdc8b9c36c531e845a8077e26185a153e556f910d40494f7ebd7b080e5d7fc649f72efb755e77c502b5d5e348c055cac51a16d262d9cc6679ab0a530a93f97165da3d1eadbd2f286fb693c59e435b95a6fc87a8e55acf423a8f35e76ac4a34a0e03cc5f5c9cd20da9aeea4ea627a4dd660cc555ac7daf88ba580cfa852b51c1507b5df281f6b5004fe6701a3df6c5804f01d1d0e2a2c87d0776ce15930786ad18cb15068ea3c1171"}, @TIPC_NLA_NODE_REKEYING={0x8, 0x6, 0x6}, @TIPC_NLA_NODE_ID={0x6f, 0x3, "8ce9a9516c4b76b516516efd2a418f309fa6b54413af3d307af94159276c50432d6ddc5b1ee10e0a402caaa274a3cf514963f275821c2c841b7705edef8968cfb9ae3535c43c372d5c0679f29390a981ef0a7faefd7fe0f1543e96f42672fca1c2712c4df824582c67c120"}]}, @TIPC_NLA_NET={0x20, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6a4d}]}, @TIPC_NLA_SOCK={0x28, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8282}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xea}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}]}]}]}, 0x1d8}, 0x1, 0x0, 0x0, 0x8000}, 0x854) symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000440)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0xffffffffffffffff, 0x20000, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) faccessat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x1) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x60, r5, 0x1, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_PMSR_ATTR_PEERS={0x4c, 0xe, 0x0, 0x1, [{0x48, 0x0, 0x0, 0x1, [@NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @broadcast}, @NL80211_PMSR_PEER_ATTR_REQ={0x2c, 0x3, 0x0, 0x1, [@NL80211_PMSR_REQ_ATTR_DATA={0x4}, @NL80211_PMSR_REQ_ATTR_DATA={0x24, 0x1, 0x0, 0x1, [@NL80211_PMSR_TYPE_FTM={0x18, 0x1, 0x0, 0x1, [@NL80211_PMSR_FTM_REQ_ATTR_ASAP={0x4}, @NL80211_PMSR_FTM_REQ_ATTR_NUM_BURSTS_EXP={0x5}, @NL80211_PMSR_FTM_REQ_ATTR_BURST_DURATION={0x5}]}, @NL80211_PMSR_TYPE_FTM={0x4}, @NL80211_PMSR_TYPE_FTM={0x4}]}]}, @NL80211_PMSR_PEER_ATTR_ADDR={0xa, 0x1, @device_b={0x8, 0x2, 0x11, 0x0, 0x0, 0x7}}]}]}]}, 0x60}}, 0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r6) sendmsg$NLBL_MGMT_C_ADDDEF(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c020000", @ANYRES16=r7, @ANYBLOB="01000000000000000000040000000800020005000000"], 0x1c}}, 0x0) r8 = syz_genetlink_get_family_id$nl802154(&(0x7f00000005c0), r6) ioctl$sock_SIOCGIFINDEX_802154(r6, 0x8933, &(0x7f0000000600)={'wpan3\x00', 0x0}) r10 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) r12 = gettid() ioctl$sock_SIOCGIFINDEX_802154(r10, 0x8933, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r10, 0x8933, &(0x7f0000000600)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r10, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x2c, r11, 0x1, 0x70bd28, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x35f40ee32a93b59c}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r13}, @NL802154_ATTR_PID={0x8, 0x1c, r12}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000000) sendmsg$NL802154_CMD_SET_CCA_MODE(r6, &(0x7f0000000700)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000780)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="04002bbd7000fddbdf250d00000008000100000000000c000600000000000000000008000300", @ANYRES32=r9, @ANYBLOB="08000300", @ANYRES32=r13, @ANYBLOB="0c000600030000000300000008000300f6966cf3fcc8b2a2c5ad3690a2187e9e7cb6c00f54f947b38592c5e0478668667fd0f0286e539bc39b2667ed3bc6a13668110421e5e2ec4c1d2e140053cac8995baa66d16a4884d135a871e6562d9dff3c484c470657d988bd520fcbccac3eb7afb7", @ANYRES32=0x0, @ANYBLOB="08000c0004000000"], 0x54}, 0x1, 0x0, 0x0, 0x891}, 0x4) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000740)=0x0) fcntl$setown(r0, 0x8, r14) 4m13.616099521s ago: executing program 5 (id=4227): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000080)=ANY=[@ANYBLOB="180200000000000000000000000000d11b3dd800270000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ff7f0000850000007b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00'}, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000005c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_DELFLOWTABLE={0x48, 0x18, 0xa, 0x5, 0x0, 0x0, {0x2}, [@NFTA_FLOWTABLE_HOOK={0x1c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg2\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x3}}}, 0x70}, 0x1, 0x0, 0x0, 0x40000}, 0x20008000) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) connect$can_bcm(r1, &(0x7f00000000c0)={0x1d, r2}, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000c00)={0x1, 0xa7, 0x4000, {}, {}, {0x0, 0x0, 0x0, 0x1}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "0000000000000100"}}, 0x48}}, 0x10) fsopen(&(0x7f00000000c0)='proc\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200000001000000000000000000008500000036000000c5000000080000009500"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000006"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x3}, @typedef={0x3}, @ptr={0x0, 0x0, 0x0, 0x2, 0x4}, @volatile={0x0, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0x0, 0x0, 0x61, 0x61]}}, 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r3, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000280)='./file0\x00', 0x402, &(0x7f0000000380)=ANY=[], 0x1, 0x285, &(0x7f0000000d80)="$eJzs3M9qE2sYx/Ff05w2TWmTxTkHzgHxQTe6Gdp4ARKkBTGg1EbUhTC1Ew0ZMyUTKhGx3blx4XUUl+4E9Qa6cefeXTeCm4J/IklTO21SitJ0ovl+oDNP+86veSczhGcGMls3nz+olEKn5NaVSJkS0rq2pWyr6hjprBPtekxR6zo/+en9qeu3bl/JFwpzC2bz+cULOTObPv364eMXZ97WJ2+8nH41rs3sna2PuQ+b/27+t/Vt8X45tHJo1aBuri0FQd1d8j1bLocVx+ya77mhZ+Vq6NX2jZf8YGWlYW51eSq9UvPC0Nxqwypew+qB1WsNc++55ao5jmNTaeEoxY2FBTcf9yzQN8nWolbLu6OSJrqGixtxTAoAAMQr2v9r4Pr/VtcSHf/a1f+v0/8fLnHUBvT/w6DV/6d7ng70/wAAAAAAAAAAAAAAAAAAAAAA/A62m81Ms9nM7K53f8YlpSTt/h73PNEf3cc/KY7/8Ih8cS8l+U9Xi6tFyR9pLVvyJZXly9OMMvrSPh86dur5y4W5GWvL6o2/1smvrRZH9+dnlVG2d352J2/7838pHc3nlNHfvfO5nvkxnTsbyTvK6N1dBfK13D6v9/JPZs0uXS0cyE+0twMAAAAA4E/g2A89r98d57DxnfxP3B84cH2d1P/JePcdAAAAAIBhETYeVVzf92rxFJ87NwtinsaAF/9I+qX4xchTX/eGkl1/Oe7iWTAob90AFilJx/oPJ9SPqcb4oQQAAACgL/aa/rhnAgAAAAAAAAAAAAAAAAAAAAAAAAAAAADA8DqJB54d8tKJE95VAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIHbfAwAA//8PxyVc") openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 4m13.541784901s ago: executing program 33 (id=4227): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000080)=ANY=[@ANYBLOB="180200000000000000000000000000d11b3dd800270000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ff7f0000850000007b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00'}, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000005c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_DELFLOWTABLE={0x48, 0x18, 0xa, 0x5, 0x0, 0x0, {0x2}, [@NFTA_FLOWTABLE_HOOK={0x1c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg2\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x3}}}, 0x70}, 0x1, 0x0, 0x0, 0x40000}, 0x20008000) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) connect$can_bcm(r1, &(0x7f00000000c0)={0x1d, r2}, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000c00)={0x1, 0xa7, 0x4000, {}, {}, {0x0, 0x0, 0x0, 0x1}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "0000000000000100"}}, 0x48}}, 0x10) fsopen(&(0x7f00000000c0)='proc\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200000001000000000000000000008500000036000000c5000000080000009500"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000006"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x3}, @typedef={0x3}, @ptr={0x0, 0x0, 0x0, 0x2, 0x4}, @volatile={0x0, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0x0, 0x0, 0x61, 0x61]}}, 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r3, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000280)='./file0\x00', 0x402, &(0x7f0000000380)=ANY=[], 0x1, 0x285, &(0x7f0000000d80)="$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") openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 4m12.31505642s ago: executing program 4 (id=4241): r0 = socket$inet6(0xa, 0x6, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@private2, @in=@remote}}, {{}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a000000020000000110000007"], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0x44b, 0x0, 0x25dfdbfc, {0x7a, 0x0, 0x0, 0x0, 0x49001}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @bridge={{0xb}, {0x10, 0x2, 0x0, 0x1, [@IFLA_BR_MCAST_QUERY_INTVL={0xc, 0x21, 0x1ff}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000851}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r5}, 0x10) r6 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d000, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x10}) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r7, 0xc0185879, &(0x7f0000000000)={@desc={0x1, 0x0, @auto='\x00\x00&\x00'}}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000300), r7) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001240)=ANY=[@ANYBLOB="44000000100003042abd70000000000000000400", @ANYRES32=0x0, @ANYBLOB="50dc04002000040008000500", @ANYRES32, @ANYBLOB="140012800b0001006970766c616e00000400028008000a00", @ANYRES32=r9], 0x44}, 0x1, 0x0, 0x0, 0x4040800}, 0x4850) ioctl$ifreq_SIOCGIFINDEX_team(r7, 0x8933, &(0x7f0000000400)) syz_io_uring_setup(0x58bb, &(0x7f0000000540)={0x0, 0x92af, 0x10100, 0x3, 0x1e2}, &(0x7f0000000280), &(0x7f0000000380)) 4m12.158972831s ago: executing program 4 (id=4245): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000160000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = getpid() r3 = syz_pidfd_open(r2, 0x0) process_madvise(r3, &(0x7f0000001fc0)=[{&(0x7f0000001a40)="4c532882", 0x4}], 0x1, 0x24, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x3, 0x3, 0x3}, 0x10) r5 = socket$tipc(0x1e, 0x2, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) close(r4) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000002c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE(0x0, 0x0, 0x48) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$ext4(&(0x7f0000000280)='ext2\x00', &(0x7f0000000480)='./file0\x00', 0x48a, &(0x7f0000000580)={[{@init_itable}, {@discard, 0x22}, {@inlinecrypt}, {@noload}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x1}}, {@minixdf, 0x22}, {@errors_continue}, {@auto_da_alloc}, {@noblock_validity}]}, 0x1, 0x45d, &(0x7f0000001400)="$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") sendmsg$IPSET_CMD_CREATE(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="4c00000002060108000034e40000000000000000050001000600000005000400000000000900020073797a3100000080050005000200000011000300686173683a69702c706f7274"], 0x4c}}, 0x2) sendmsg$IPSET_CMD_ADD(r7, &(0x7f00000002c0)={0x0, 0x4001, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="50000000090601020000000000000000020000840900020073797a31000000000500010007000000280007800c00018008000140fffffff70500070084000000060004404e22000006000540"], 0x50}, 0x1, 0x0, 0x0, 0x10000082}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) 4m11.841413393s ago: executing program 4 (id=4248): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, 0x0, 0x190) 4m11.776204264s ago: executing program 4 (id=4249): syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000480), 0x1, 0x3d0, &(0x7f00000004c0)="$eJzs3M1uG0UcAPD/br5I+mEjcUCFgyUQBAFxHQhQhEThyscFeAArSUuF21SNkWjJoSBOnDggbhz6Ahx4gKpCSEi8Ai+AKlUozQFuQWvvOm4cp7Fix2r6+0mjndkdZ/bv3axm1rsTwGOrEhHnI2IiIhYjopSvT/MUN9spq3d/c2N5a3NjOYnt7U/+SSLJ1xV/K8mXJ/LCfBqRfhfxzM3edtev3/ii3misXsvL1eblq9X16zdevXS5fnH14uqV2pvnarWlxbdqrw8t1p+ef+ncxPvnz/z8V+nO0vT0bLa/J/Nt3XEMSyUqne9kt6VhNzZm0+PeAQAADiTN+/6Trf5/KSZaubZSVDfGunMAAADAUGy/my8BAACAYywx9gcAAIBjrngO4P7mxnKRxvg4wpG7915ElHfebd7qxD8ZT+R1pkb4fmslIq6+kJSyFCN6DxkAoNudrP9zdq/+XxpPd9WbiWj1h2aH3H5lV7m3/5PeHXKTD8j6f+9ExFZP/y8tqpQn8tKpVldxKrlwqbF6NiJOR8R8TM1k5do+bXzw7y8f99uWxf97cup0kbL2s+VOjfTu5MyDn1mpN+uHibnbvW8izkzuFX/S6f8mETF3iDYmvr71dr9tD49/tLZvRby45/Hfmbkn2X9+omrrfKgWZ0Wv/7799aN+7Y87/uz4z+0ffznpnq9pffA2bn/+57P9tnWPfwY5/6eTT1v5Ylz2Vb3ZvFaLmE4+7F2/uPPZolzUz+Kff27v///i+pfkc1qdzK8Bg/r+h99eOUj8WcraL8aCRyGLf2Wg4z945o3bf3zWr/2Hx58d//YcYPP5moNc/w66g4f57gAAAOBRkbbuayTpQiefpgsL7fsdT8Vc2lhbb758Ye3LKyvt+x/lmEqLO12lrvuhtfbP6J3y4q7yaxHxZET8WJptlReW1xor4w4eAAAAHhMn+oz/M38f2VMIAAAAwMiVx70DAAAAwMgZ/wMAAMCxdph5/WRkZI5rZtxXJgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgEfb/wEAAP//Wt22ag==") mknod(&(0x7f0000000180)='./file1\x00', 0x800, 0x7) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x2, 0x0, "ef359f413bb907000020a4ae6de2fbd11000000000f1ffffff0ff8ee09e737ff0edf0200000000008f18d2b8f6277dd41905b9aafab4afaaf755a3f6a00400", "036c47c6780820d1cbf7966d61ffcf33524bbd9bffbcc2542ded71038232d71e14efbac003000000852f2036dc783800000000e9b49600", "f28359738e229a4c66810000000000f300e6d902000000000000000000000001"}) io_submit(0x0, 0x3200, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0xe7030003, 0x0, 0x1, 0x0, r0, &(0x7f00000003c0)='\n', 0x1}]) 4m11.507018626s ago: executing program 4 (id=4251): bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = socket$netlink(0x10, 0x3, 0x6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000240)="04", 0x1, 0x20000045, &(0x7f0000000040)={0xa, 0x2, 0x1000, @empty}, 0x1c) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f00000000c0)={'macsec0\x00', 0x400}) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000040)={0x0, 0x0}) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000200)={'macsec0\x00', 0x200}) io_uring_register$IORING_REGISTER_FILES_UPDATE2(0xffffffffffffffff, 0xe, &(0x7f0000000140)={0xfff, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)=""/109, 0x6d}], &(0x7f0000000100)=[0xfffffffffffffff9, 0x7], 0x1}, 0x20) close_range(r0, 0xffffffffffffffff, 0x0) 4m10.961514449s ago: executing program 4 (id=4257): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r1}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 4m10.96132637s ago: executing program 34 (id=4257): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r1}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 4m8.970634534s ago: executing program 0 (id=4271): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000080)=ANY=[@ANYBLOB="180200000000000000000000000000d11b3dd800270000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ff7f0000850000007b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00'}, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000005c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_DELFLOWTABLE={0x48, 0x18, 0xa, 0x5, 0x0, 0x0, {0x2}, [@NFTA_FLOWTABLE_HOOK={0x1c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg2\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x3}}}, 0x70}, 0x1, 0x0, 0x0, 0x40000}, 0x20008000) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) connect$can_bcm(r1, &(0x7f00000000c0)={0x1d, r2}, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000c00)={0x1, 0xa7, 0x4000, {}, {}, {0x0, 0x0, 0x0, 0x1}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "0000000000000100"}}, 0x48}}, 0x10) fsopen(&(0x7f00000000c0)='proc\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200000001000000000000000000008500000036000000c5000000080000009500"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000006"], 0x50) close(0x3) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) 4m8.407173728s ago: executing program 0 (id=4276): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r3, 0x40345410, &(0x7f00000083c0)={{0x1}}) r4 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) read(r3, &(0x7f00000003c0)=""/4096, 0x1000) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000040)={'syztnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x4, 0x53, 0xb, 0x9, 0x2b, @local, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x80, 0x1, 0x10, 0x401}}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r5, 0x89f0, &(0x7f0000000140)={'syztnl0\x00', &(0x7f00000013c0)={'ip6_vti0\x00', r6, 0x0, 0x57, 0x3, 0xff000000, 0x4, @mcast2, @local, 0x7, 0xf030, 0x5, 0x8}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000280)=@o_path={&(0x7f00000001c0)='./file0\x00', r0, 0x4000, r2}, 0x18) shmdt(0x0) 4m8.233331989s ago: executing program 0 (id=4278): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x9, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x9}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}]}, &(0x7f0000000180)='syzkaller\x00', 0x5, 0x30, &(0x7f0000000300)=""/48, 0x41000, 0x1c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000600)={0x0, 0xb, 0x8, 0xd}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000640)=[r0, r0, 0xffffffffffffffff, r0, r0, r0, r0], &(0x7f0000000680)=[{0x1, 0x5, 0x8}, {0x4, 0x3, 0x5, 0x8}, {0x4, 0x1, 0xf, 0x3}], 0x10, 0x80c3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f0000000140)='erofs_readpages\x00', r1, 0x0, 0x9}, 0x18) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f00000001c0)={0x2, 0x4e24, @loopback}, 0x10) sendmsg$rds(r3, &(0x7f0000000100)={&(0x7f0000000040)={0x2, 0x0, @local}, 0x10, 0x0, 0x0, &(0x7f00000012c0)=[@rdma_args={0x48, 0x114, 0x1, {{0x3, 0x2}, {&(0x7f0000001080)=""/148, 0x94}, &(0x7f00000011c0), 0x0, 0x60, 0xffffffff00000001}}], 0x48, 0x8004}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x43, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r6 = openat$cgroup_devices(r5, &(0x7f0000000100)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r6, &(0x7f00000000c0)=ANY=[@ANYBLOB="63202a3a2a8df14cf0a920487ae9449bea552cf4d5acc00ff8562e15bfdd"], 0xa) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r6, 0x0, r7, 0x0, 0x4, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r8 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') r9 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$notify(r9, 0x402, 0x4) r10 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r10, 0x402, 0x8000003d) open(&(0x7f0000000280)='.\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) getdents64(r8, &(0x7f0000000c00)=""/4098, 0x1002) 4m8.231930999s ago: executing program 0 (id=4279): syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000480), 0x1, 0x3d0, &(0x7f00000004c0)="$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") mknod(&(0x7f0000000180)='./file1\x00', 0x800, 0x7) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket(0x400000000010, 0x3, 0x0) socket$unix(0x1, 0x2, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, 0x0, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x2, 0x0, "ef359f413bb907000020a4ae6de2fbd11000000000f1ffffff0ff8ee09e737ff0edf0200000000008f18d2b8f6277dd41905b9aafab4afaaf755a3f6a00400", "036c47c6780820d1cbf7966d61ffcf33524bbd9bffbcc2542ded71038232d71e14efbac003000000852f2036dc783800000000e9b49600", "f28359738e229a4c66810000000000f300e6d902000000000000000000000001"}) io_submit(0x0, 0x3200, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0xe7030003, 0x0, 0x1, 0x0, r0, &(0x7f00000003c0)='\n', 0x1}]) 4m8.10051407s ago: executing program 0 (id=4282): syz_io_uring_setup(0x1249, 0x0, &(0x7f0000000180), &(0x7f0000000000)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) r3 = memfd_create(0x0, 0x3) fcntl$addseals(r3, 0x409, 0xb) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r4 = memfd_create(&(0x7f0000001380)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf#2\x99\x1e\xa1`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\f<\x8f\xc1\x99\x89r\xe1?\xbdu\x98\xc3\xf8\xd2Q#\xc6g\xa0\x85\xd6G\x85\x11X\x8d,\x02\xd45\xb8\xca\x97\x9d\xcb\x1e\x80\xd6\xd5>N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec\x8aog\x87BR\x9d\xad\xd4FcB\xda\x95\xc3\xdd\x9d\x8f\x1a\xce\x18\x80\"j\xe1\xba\x1e\x97uX\xccv\xd6\vcz\x92A^\xbc\xceF\xf7\xe5:\xaf\xc5~\xbcJ e\r\x88c\x9d\xb92\xb6i4zq\xb3c\x0f\xb2t\x93\xf2E6b\xfa\xcdJ5\xe3W]`4\xd8D\x05\v\xfc)\xca\xedQ\xd0]Ot\'\xc2tDF\xf9\xa7\xb5(\x83\xa5\x0f\x1d\x1d\x06Dg\x13>\x19\xe85#\aaT\x89=\x104\xd5\x85l\x96\x91\xea\x172P\xb3:\xadZ\xbc\xbe\x00\xf0\x14\x96\xd9M\xd7\x88QZs\xb2\xe1+$jfQodH\x05/y`~7\x16\x02\x00(v\xe6`\"6\xfcgC\xb5\xf0\x13.zj\xc5bj+@\x00\x00\x00\x00\x00\x00\x00.\xd4`=z\xd1n\x8d\x8f\xa5hS\x8e[\xb3\xa3\x87\xb9\xe2_Z\x11\xef\xc2]V\xf3\x03\x94\xb9\xe1\xa68\x8d\\\xe5\xef\xacpM\xf0\xa6\x04\x10\xb7\xc0t\x83\\\xf7\x12k\x9f\x10\xd5Z\x19\xc1\xc1\x80\\o\x97\xce=U\xdd\xaa\x1b\x05\x14\x13\xa6\xbd#\xde\x04\xe6$\xec$3\xf6\x97\xc6\xeaSL\xb7A72M\x88k@\xe5\xa3\n&\x1e\xc84\xa9\xe2\xccM\x906\x95xQ-2p\xd62\'\xec\x0f\x13;I\x95fE_\r\xe7\t!A\x05\xe4\x8f\x9e0\xf8/T\x18\xf7\xa1\x9f\xde1\xd5\x80<\xf5\b\xa9\xec\x85\xaeW\xb3\xd8#)bn \xfb\xf2\x88\xfaR\xff\xdd\x80\x96_\xec5\xf0\x1c\a\x8a\x80\x00@=\r8u+%f:\x1e\x82\xfap\xf6\x89\xea\xba\xe3\xbbM%F\xdb\\\xd1eJJ*\xc67\xca\x03\xa3\xf7(\xbb\xecN\xd4\xe7\xf2:u\x8a\b\xd5\v\xca\xfd\\\xd6\xe3\x05\xb3\x03\xd5\xe0\xd2\xf2{\'\x8b\xdf\xa1\xbe}\xb2\xe4y\xbb\xe6\x1f\x10c\xf5WQ\x82\x04\x01C\x83,\x90\x1a\xfa\x8e\x17\x89\xe2\xedX\x8d\rmq\t\xb5$\xb4\x9b\x92z\xd6/-\x13,\xb5%\x8eM/\x04\xa7\x7f\x1b\x85\xf1\xa4X\x17\xbb\x1cR14\xfb!\b\x10\xe8\xb2\xd41gK\xe4\xea\xe39d\bL\xe5\x1b\xbd[\x9bWD:\r&\xe9\vn^\xcc\x86\xe3\xce1>3{\xaa{\xbd0P\x9f\xa68\xf5\x82\xb8\x9aD\x9c{\xe6\xf8\xcbD\xb5aJ\xb0\x92\x89\xbc\x82\x1ch\x89\xe7\xdd]q,\xec\xc4\xa5\x93\xe5,\x0e,>/\xaf|\xf0\x01V\x7f\xc9?\xba\x16\xe4$+}5dy\xb1\xef\xf1m\xa5\x94d9\xaf\xcfq\x8b=\x026\xef\r\x91\x18\xc5\xb6\xb9fM\x8ayZ\xbcd\xa5\x8a\x88\x98\xc3\xfc`\xa6\xba\x1f\x17\v$\x88g\xb4\xad\b\xc1\xddW\xa6\xc1\xb7\xb0\xa3\x84Q\x13GoU\xe2\xb7\x03\x9c\xd5\x0f\xa8\x0ef\"\x15\x82\xe7\xbd\xf8\xca\x10f\xfe6h\xe9\xc3\xc2\xa0O:\xac~\x1a\xf7\xbeF\xbe\xe5\xf0\x81\xd6&\xc00x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x2, 0x800800000003}, 0x1100, 0x5dd8, 0x3, 0x5, 0x0, 0x8, 0xff7b, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x17, 0x0, 0x3, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000072000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sys_enter\x00', r6}, 0x10) rt_sigaction(0x19, 0x0, 0x0, 0x8, &(0x7f0000000440)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001580)="42bf7e4b", 0x4}], 0x1}, 0x48001) setsockopt$sock_attach_bpf(r7, 0x1, 0x10, &(0x7f0000001280), 0x4) sendmsg$inet(r8, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="c6", 0x1}], 0x1}, 0x20008840) recvmsg$unix(r7, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x2122) sendmsg$nl_route_sched(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=@newtaction={0x8c, 0x30, 0x1, 0x0, 0x0, {}, [{0x78, 0x1, [@m_ct={0x2c, 0x2, 0x0, 0x0, {{0x7}, {0x4}, {0x4, 0x2}, {0xc}, {0xc}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0x0, 0xfffffffffffffffe}}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000300)=ANY=[@ANYBLOB="440000001000030500"/20, @ANYRES32=0x0, @ANYBLOB="15460100ef000000140012800b0001006d616373656300000400028008000500", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3], 0x44}}, 0x0) 4m7.982160131s ago: executing program 35 (id=4283): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000004000000000000000000008500000050000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r1, 0x26, &(0x7f0000000000)={0x1}) fcntl$lock(r1, 0x25, &(0x7f0000000040)={0x0, 0x0, 0x80, 0x200000007}) fcntl$lock(r1, 0x25, &(0x7f0000000180)={0x0, 0x1, 0x0, 0x80000000}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'bridge0\x00', 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x2, 0x800800000003}, 0x1100, 0x5dd8, 0x3, 0x5, 0x0, 0x8, 0xff7b, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x17, 0x0, 0x3, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000072000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sys_enter\x00', r6}, 0x10) rt_sigaction(0x19, 0x0, 0x0, 0x8, &(0x7f0000000440)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001580)="42bf7e4b", 0x4}], 0x1}, 0x48001) setsockopt$sock_attach_bpf(r7, 0x1, 0x10, &(0x7f0000001280), 0x4) sendmsg$inet(r8, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)="c6", 0x1}], 0x1}, 0x20008840) recvmsg$unix(r7, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x2122) sendmsg$nl_route_sched(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=@newtaction={0x8c, 0x30, 0x1, 0x0, 0x0, {}, [{0x78, 0x1, [@m_ct={0x2c, 0x2, 0x0, 0x0, {{0x7}, {0x4}, {0x4, 0x2}, {0xc}, {0xc}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0x0, 0xfffffffffffffffe}}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000300)=ANY=[@ANYBLOB="440000001000030500"/20, @ANYRES32=0x0, @ANYBLOB="15460100ef000000140012800b0001006d616373656300000400028008000500", @ANYRES32=r3, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r3], 0x44}}, 0x0) 4m6.374628963s ago: executing program 3 (id=4303): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0xfc, 0x0, 0x7ffc0002}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r1 = socket$netlink(0x10, 0x3, 0x14) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100020, 0x0, 0x0, 0x6, 0x3, 0x0, 0xa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) timerfd_create(0x7, 0x0) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000001200)={&(0x7f00000001c0)=ANY=[@ANYBLOB='8\x00\x00\x00\x00\x00\t'], 0x38}, 0x1, 0x0, 0x0, 0x814}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x3, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x660}}, &(0x7f0000000040)='GPL\x00', 0xc, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) name_to_handle_at(0xffffffffffffffff, &(0x7f00000018c0)='./file2/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x1600) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) epoll_create1(0x0) syz_read_part_table(0x61d, &(0x7f0000000000)="$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") bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000400)='%pS \x00'}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000ff01000000000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000280), 0x400000, 0x0) write$selinux_create(r4, &(0x7f0000000580)=@objname={'system_u:object_r:unconfined_exec_t:s0', 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 0x7fffffff, 0x20, './file0\x00'}, 0x72) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) getcwd(&(0x7f0000000000)=""/146, 0x92) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) sendmsg$nl_route(r1, &(0x7f0000000640)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000600)={&(0x7f00000003c0)=@newlinkprop={0x3c, 0x6c, 0x10, 0x70bd29, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x90, 0x4c022}, [@IFLA_LINK_NETNSID={0x8, 0x25, 0x1}, @IFLA_IFNAME={0x14, 0x3, 'syzkaller1\x00'}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000040}, 0x40040) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000900)={&(0x7f0000000380)='kmem_cache_free\x00', r5}, 0x18) epoll_pwait2(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 4m5.690296627s ago: executing program 3 (id=4314): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000080)=ANY=[@ANYBLOB="180200000000000000000000000000d11b3dd800270000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ff7f0000850000007b0000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00'}, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000005c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_DELFLOWTABLE={0x48, 0x18, 0xa, 0x5, 0x0, 0x0, {0x2}, [@NFTA_FLOWTABLE_HOOK={0x1c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg2\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x3}}}, 0x70}, 0x1, 0x0, 0x0, 0x40000}, 0x20008000) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) connect$can_bcm(r1, &(0x7f00000000c0)={0x1d, r2}, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000c00)={0x1, 0xa7, 0x4000, {}, {}, {0x0, 0x0, 0x0, 0x1}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "0000000000000100"}}, 0x48}}, 0x10) fsopen(&(0x7f00000000c0)='proc\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200000001000000000000000000008500000036000000c5000000080000009500"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x3}, @typedef={0x3}, @ptr={0x0, 0x0, 0x0, 0x2, 0x4}, @volatile={0x0, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0x0, 0x0, 0x61, 0x61]}}, 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r3, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000280)='./file0\x00', 0x402, &(0x7f0000000380)=ANY=[], 0x1, 0x285, &(0x7f0000000d80)="$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") openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 4m5.173795111s ago: executing program 3 (id=4320): bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000380)=""/180}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r3}, 0x10) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)) 4m4.732385914s ago: executing program 3 (id=4324): syz_mount_image$ext4(&(0x7f0000000400)='ext4\x00', &(0x7f0000000440)='./file0\x00', 0x0, &(0x7f0000000480), 0x1, 0x3d0, &(0x7f00000004c0)="$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") mknod(&(0x7f0000000180)='./file1\x00', 0x800, 0x7) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x2, 0x0, "ef359f413bb907000020a4ae6de2fbd11000000000f1ffffff0ff8ee09e737ff0edf0200000000008f18d2b8f6277dd41905b9aafab4afaaf755a3f6a00400", "036c47c6780820d1cbf7966d61ffcf33524bbd9bffbcc2542ded71038232d71e14efbac003000000852f2036dc783800000000e9b49600", "f28359738e229a4c66810000000000f300e6d902000000000000000000000001"}) io_submit(0x0, 0x3200, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0xe7030003, 0x0, 0x1, 0x0, r0, &(0x7f00000003c0)='\n', 0x1}]) 4m4.418821486s ago: executing program 3 (id=4326): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, 0x0, 0x190) 4m4.096376149s ago: executing program 3 (id=4328): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x10414, &(0x7f0000000200)={[{@init_itable_val}, {@jqfmt_vfsold}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6a}}, {@user_xattr}, {@errors_remount}, {@quota}]}, 0x3, 0x42f, &(0x7f0000000940)="$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") lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000040)=ANY=[], 0xfe37, 0x0) unlink(&(0x7f0000000180)='./file1\x00') (fail_nth: 1) 4m4.085436519s ago: executing program 36 (id=4328): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x10414, &(0x7f0000000200)={[{@init_itable_val}, {@jqfmt_vfsold}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6a}}, {@user_xattr}, {@errors_remount}, {@quota}]}, 0x3, 0x42f, &(0x7f0000000940)="$eJzs289rHFUcAPDvzCat/WViqT+aVo1WMfgjadJae/CiKHhQEPRQjzFJS+y2kSaCLUGjSD1Kwbt4FPwLPOlF1JPgVe9SKJJLq6eV2Z1Jdje7aZJustX9fGCS92be8t53Z97ue/N2AuhZw9mfJGJ/RPweEQO1bGOB4dq/W8uLU38vL04lUam89VdSLXdzeXGqKFq8bl+R6YtIP0viSIt65y9fOT9ZLs9cyvNjCxfeH5u/fOW52QuT52bOzVycOH365InxF05NPN+ROLO4bg59NHf08GvvXHtj6sy1d3/+Ninib4qjQ4bXO/hkpdLh6rrrQF066etiQ9iUUq2bRn+1/w9EKVZP3kC8+mlXGwdsq0qlUnmg/eGlCvA/lkS3WwB0R/FFn81/i22Hhh53hRsv1SZAWdy38q12pC/SvEx/0/y2k4Yj4szSP19lW2zPfQgAgAbfZ+OfZ1uN/9Kovy90b76GMhgR90XEwYg4FRGHIuL+iGrZByPioU3W37xIsnb8k17fUmAblI3/XszXthrHf8XoLwZLee5ANf7+5OxseeZ4/p6MRP/uLD++Th0/vPLbF+2O1Y//si2rvxgL5u243re78TXTkwuTdxJzvRufRAz1tYo/WVkJSCLicEQMbbGO2ae/Odru2O3jX0cH1pkqX0c8VTv/S9EUfyFZf31y7J4ozxwfK66KtX759eqb7eq/o/g7IDv/e1te/yvxDyb167Xzm6/j6h+ft53TbPX635W83bDvw8mFhUvjEbuS12uNrt8/0VRuYrV8Fv/Isdb9/2CsvhNHIiK7iB+OiEci4tG87Y9FxOMRcWyd+H96+Yn3th7/9srin97U+V9N7IrmPa0TpfM/ftdQ6eBm4s/O/8lqaiTfs5HPv420a2tXMwAAAPz3pBGxP5J0dCWdpqOjtd/wH4q9aXlufuGZs3MfXJyuPSMwGP1pcadroO5+6Hg+rS/yE035E/l94y9Le6r50am58nS3g4cet69N/8/8Wep264Bt53kt6F36P/Qu/R96l/4PvatF/9/TjXYAO6/V9//HXWgHsPOa+r9lP+gh5v/Qu/R/6F36P/Sk+T1x+4fkJSTWJCK9K5ohsU2Jbn8yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdMa/AQAA//9QOObV") lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000040)=ANY=[], 0xfe37, 0x0) unlink(&(0x7f0000000180)='./file1\x00') (fail_nth: 1) 3.683437724s ago: executing program 8 (id=7803): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000000c0)={0xfffc, 0xfffa}, 0x8) sendto$inet6(r0, &(0x7f0000000000)="f8", 0x1, 0x40008c1, &(0x7f0000000100)={0xa, 0x4e20, 0x2, @loopback, 0x8}, 0x1c) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x189401) r2 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000000)=ANY=[@ANYBLOB="380000000314010000000000000000000900020073797a2f000000000800410072786500140033007465616d5f736c6176655f30"], 0x38}}, 0x0) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) io_setup(0x2278, &(0x7f0000000180)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(r4, 0x2, &(0x7f0000000140)=[&(0x7f00000001c0)={0x0, 0x4, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x1}, &(0x7f0000001940)={0x0, 0x0, 0x2, 0x2, 0x2, 0xffffffffffffffff, 0x0}]) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f00000000c0)=0x0) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r7) sendmsg$NFC_CMD_DEV_UP(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x1c, r8, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x8004) write$nci(r3, &(0x7f0000000140)=ANY=[@ANYBLOB="414601", @ANYRES32=r7], 0x4) sendmsg$IPSET_CMD_DESTROY(r2, &(0x7f0000001900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000000306d7f30000000000000000030000000900020073f97ab2000000000500010007000000"], 0x28}, 0x1, 0x0, 0x0, 0x24000000}, 0x40000) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000180)={'\x00', 0x3, 0x1, 0x0, 0xfffffffffffff5b0, 0x9, r9}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xb, &(0x7f0000000740)=ANY=[@ANYRESOCT, @ANYRES16=r6, @ANYRES32=r8], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1, @void, @value}, 0x1d) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x3002, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x80, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000000)={'macsec0\x00'}) r11 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$nci(r11, &(0x7f0000000900)=@NCI_OP_CORE_INIT_RSP_V2={0x0, 0x0, 0x2, 0x1, 0x1, {0x1, 0xb6c7, 0x8, 0x840f, 0xc0, 0x67, 0x2, 0xe99, 0xfef, "493e78f76085a4bf82b8e3b0f205c3b24a0c5a4f71988feb6d84461e3ce8af090717135cce0ea5bc27404a501cea6006de6a00cdee69630e4b28a82f2a1d3e322148cb6fecc868b8ddb395780f3fc03049d468468b9424bca213cd447dd2f650343194c2929f5687c95c1bea7cfcbe45d932f727cfa9a51d00ce4202ecfab41ad2087512a1d89d7650f77ae0e10b6395a4a9ce5ac4ad38a5b1f64228a2764b7bae8f0163a7ed88f9c4dcbebed7c38c744e38844b27600b6527308cdae5fdab40845dc5ee4f451130755ac3c0da2c8cba059a5688fc3b13f157dfcb312470290df012d451b19f5b2c49e5c9ba5d894e129fa3767b6163d5fce54a8f6fe3b6272005a37977953b5afab1fa14b0d0e2b3c9e39dbd44b69a33bffe2eae30f76bc326f8835e7874d0719264c008d963fc379a6174b9f210ddbf14a40aac247a2bd9c2b11096bc3ce5d2c870f1402d5579bd1672af83c25245dd73e4cf3aaf5cb9f823d23b49bcd21b315defa8eb349a63a18e9a646e337201c27c81764791ee07cb28c3739ad1f09b7ca03702ff596309f11b69e475aa2a48e2389a6c7d300e9e5a3ec7467e4d6b4fa8417d98b9161eaec48210965a5aeb40262aa021e75400545172514f124774e2303ce00ec3c6ed81b17c34270d007c9200bf2187ef346a4b5f6cafb2306dfb01c10b1774cc86514aff97d47bb163c537c1afbaaedfa1a09b7e234e7193cd2d003ce07414bf7391c5935437c44183741a2500eb050204fa080c33d27649a384e85a1ce2626893d86464fcbb29316017144c308e05a240172bc3ada8d31451f16a533846adebe3d900c0c035544ebd00be9b880213c39293746b0655eaa6e448f7055f2bc77f2db5206c422f2d8aba5562069fe135c7271c4a6ca8a6aec13c4217beeabdccc6637c4f0eaa93c441883b54aac8c8df322977a23b1263355362729301c0ec30e58c70cfcfa413308c09e18f0b4b544add37e815fff8b3a459ecfa42c7ef87bc0c6450be9a2ba44977e1f01aff300b2210afc0a19b8484a93aafd9190951b69b67d13fcde103157d0df41b34a672025a9d6efd9dc6ae26d6de58504d30868b786cb6642d10cc5cd2bcbb2e3966631100eea4713c0617b1fcb291c9864b9b5bafc6dc3186c212cd28fe45de98dab1fcad948c030171540e907be2007341951658c0ffc9663d63501e4f75b5c6663982d61cce990121c563afcbe3f85ab94c8317c39374473d4ea4132f5d7f7bb6038ddaf87698784664c58ea5ff8bc7f46b5fea0e2a2354e4ce1d5fa1d21a012c62f56af0408f5511bfba29807d6e0e1c1ab9090d88a334b8adc2e7f7a6a74f06e58f26df414668f2a1df5ded5f2513edfaf43f7e779b89a4995c22d8cceebcbf4966ce4dfb6b1be75e9e3f1a677d6dbb36330a7b73b8b2bd0568fa5365f7bb51a3bd33cc766f990ca94a94ca7844c475230bbc70bc1dc120d6458130ca997677d1a773cc6c0bb59f611c6e1a319d5f754771d4c7db2623b83a3fbffd2e23ca456c224be3312891f371c4fe96fa47a0a4f226c833e6d6039946d0bff3401ac122fb43f5fa619b488a8bd4e3ec7c76f2a7da4d414aad942d555989a43340fe1e5ba552851cbd9c817a10c4eeb6b345d9989866f56dd0dafd75028df6efbd14d7f78371012b2656e7018da231b1923c6e3a7310e04dca414f15471308e7813b09971f2d7d9ba1fc0e3b0d9868cb3f9dacaf32ac0e539561b2ab22cf6a1843c12bb2cf30bb669bc108324a481d5e1ae3ada77c152c32c94a79c67a22dfc856bb273583166634f315f4c5203abc5cc6f8f97b3ed4a3c03d453f3e20d9d79eac08500fca6ee8f358d11cb9d37b9e6e2a0d6166fe8eb4d71d2ba5e044aa94500a4c9d90816a8183887dc2a73de47a6ed6482c1bfb088a1c22fe0a9509efd1f3b22eed12a64cc43731849cb2c01caf18438d4b47ae73afac5f8eab15e65e919f1bb6dd55b8db3be6bbe99a4507563c36fdc649b9b65419614e445e934838c334944c208b9446fb8171d24c52839209d9ef30556c0ddc3101f48d934a52acf1a66759a3a7bc492cafe6cb631479f6deebe0dcf5561a37f11010e8395de020c7c54abb54b03c0da485ec0da81770b1746aa30ab59612b93fe68aefa6d74fa9e9ef791c100f9ce7066dc11f5c3980a4a35d3664d842ef8c23eed727cea2870732620416ffde0b64b3e407a538e11d7dc736c3bff54a040aed608fe275b616f6536a5ce6ccaacccddbaf433912037f83c5fbcd7807d4c38be6f53c3a3ac7103838df66919ad0d92fd5018cbc0bb3df9dba4a3876a4111e62bd8054f3a473f7414c79b1ba051cee21401cb7142e0d315478c33d7a2c24c68da2170ddea2d584c6536a59c70cb6db01374a8adf37d05846cfbd7b34f013b25d7ae158756c9322438649f3b05251b003d6939c3d171f1f35986e1d59017ef5fe94d9441421bc9d1e2a1ee9fe379aa99f54aeac91634a22ced67b0b2453ec17327a7560ea82aba467a1327e7a02390714e4653c72f13379815a7c2ce856831f7d34d0af1135a34d888c249940fcf76f6c28c4eae563dc3af0d371ffb1c5328a1ab84846b9505bb087950af7ee72c57bbf7088219714bffe33556e4e098e49c0f900a5f9bdff8d265f4b1cb7f5ad8aeb2abfd90a30005b02cc95fed85f0dd8a47cf01247cbfa2b8db63b665388866e800756155170ac77ee96af7787122004aaa2f95d475cf572b7c6a5830fda0aad8e48102b94cf86e0b9ff3529b386e208be661d5a49947540c02a3a81eb694797607694ab65f5272cafd25cc9d73ef800c460af35214752fd7eb1d5b424faaeba5a31e450c3de592812d95427e533b7eeeec201a2f30b25ab82e5026bc82cafe83312b3ec48ad3c063ead419062d4e710153915d9f3d0bc43e06a28c2d5d09013cd4c2c1a9c1225ae992c746c018e96162f607d39ad244343fc02b61e2c5461023f2fa0a556eed0c10d24f13815ad85847ebaa6fb78c86e6469e723ce8b5f192a30c666c1c555f77f32c9bc82818f379d170e189701d9d28762342f9914d83d183d5861f7b87fac17a855edff2649d28a786d67e6f7c726c26e42010c5e53bdedd186523c965a6075f67dc172fc17afce38753d4d65ce979618f1de9bbb4d57bc389467a916544854de7a7472f88f7a66fa1df6e99e09681f6efc4c0d84dc5be722047d674a50548452f775122e501e7547fd48f12f66b4deee6544aeeef2e993f0260d8b822bdc7df252a27ea0b83f6146adf40c62b4405f49c4f73441b5259814eccdb1160af0dc7979d9451bd74e85116126702fbdcec3ccc44b5e6a39283fb6830f2aca106e6511d37ec24280407834b9a5008fd9997529ae5670b217e78d98631fe36d6afce8e6c46450b7e2e239a7649715d3fbf94408beee55c27d87a70940d3037d64b50d7836a52f4ad90ac832f5a1a7b008db5c9f3d5fe5ed980e4e4ae9f6897d0c8625f6c3b04f16ec9c7de6d12c4bfa95e886d5429a7968a9a29af8f84e487e66299963adf0b7fbc826fc3828a6ae75117fd50b1ae0c8fa7efefa6d503348594b8157b61e73d320a5e0068a1b62c4c340c30c4af77b85ed38fdadbd5828ddc1b5466ddd248ef835d1faa8f90e81561ff76c9ca72dd48ee7e84f9fd8da585a028ae1f031a68dce7339b6eaf8c321eef968086f8d4e2dfd3fc991a9b7f5b1e94f88e5e09d21eb309121271702b7260335efbcf14a143f46eef269738be8a6edaeccdfd8236a3fb9449a28fdc6ae3c13b42aaddc530e86392047f5b085d47f3428f9aa93707c2af0e45894b70886798128c0a7b2102e54d283acdb49f8d39af89681cae98191767492731d8c08f1e56f52ec71f00c1a913caf2f16cd444d93f2a1f1141a5091c41b09a046b9a911904f2151ed8ccd9247048f38e163549a205e2e2128282bf9190711cd097768d5372b0f800ef099b72bd126dd92b28ddc58f81f24b5b98a0c6a779c9c063623faa58eab584c5f5fbcbf49468c8d323c60b898ab674c4a171c9fcc1e624e4abccec3f7646aa950ed7db312abcf20d9ee752a6c3f4eed5b6602605b4e5e3ed8a6ffe7e0500466d446e2cfd9237ab5183e0f42a82e126dae44ed93e0fe2d54af217ff408a2ee2c299c1a9f806e6a323ce99360531da40626552c53a1106fcc0611ab45aef1f6bc7657bbda95290c984a3a18b044919725b9858ef19753c42510039dd32ad130f6f497d802298c7900b6f028d453d94ed457b4716a481e9169be31db6266ed9b351dd93fe78698914750fa7d140db4d65e66c373c192de9a011459f642d1670a7ec8668ade06a01f1b53615f5fb43796a504b34a0741bec35b7884ba28528d07ab8afc2485d2213e36ff2f714323f4d5f1b00c5074ba126c88c65be20e2da92b3d5864f7e49a4b1c5cbc9bef171d42e6c25f6e6150d4b78cd6aaf4503aeeac025b3752e1874d944c0cfc30cedca896977144f8d5da04aa1d23ae26bf6661a09aaf14db187b7ac84ecd2c8a79daf69284df5ecf2ae912ba25542aff0b8259bc261394758229936ba21884fcc3959536d7d75a9842ec6cb751239b01601be6334d8870cec5d4df89bc38b1f8a98b82f7b1081a5ed79147c3b476c6652d3b887d872a27653aaa8a901341ef92b00f8b60972ea699042fcbdf2c4850d774fe3ccd5c886e951746453ebae3f9e7f4eed85231f3ff5adcff7079bdab234446ceb1a1a886b21e4586b671d4909fc517acc944a222fb1cc03f8e7368f8e010bfc16474e262bf43545403f3f3cfdd607b413d4fd25368517dfef5675494c592d21a269d50d65b179a3277b14a3e63874d49591361bce543bd5923e99b822ff6d55c8800e3f6d100b81f209138505f0fde5711c9ede5c6307be599dc17988afb4d713e613cd4ccdc833c94e2dbfe43a02a77c1a8a9817996d5dd78f1a97abf83e4a4e6999dab1e3c681b0fe76c6962ab43094af9a0fccd5e61a5d30ddd6b5931edb22d7024daa434fd5800b1f5f0605ac580592c83ad7f53b9dcbbfa5d1a539ad75f01811c0e8561749958d87876836887b88fd3f3150efd86ae990964cae696bb1ebf0849268bd75c068bea7a749c4c1999a80076003b23898da448da92c17b287e9a657abffb3b0447d81fbbb8f25d24cd763bd348253204e6339ef40729d3a24ca847cd9abaf32f849e1483a8f525f18752bd435589a51edbf03a0dc3c31eafa0d661beecb80ac88f7a62209ab2a13af9505ef29303217473318d19feac421e0c003d074549be151530b639d33479126bb424239c432d2d57f420b886f394da1924c303e0d45b1e2372c4fda5ab8d608c3a7d0be2a4f3176dc62d0a1b8f2111a5aae5a8b5d8e5dadc6d22da0af5d30be445b14f82aace1d1012250520f06bdd1f3c7f401823027d4c475d12e11617306c96d85976a7c74ee150a9fc1478e4846eebdd5c64e4d4d16638554115c390213d16711163846269a3c9406140d9c987a1172f2a9d6575ce141eb889c925728bb4de32932059ff6acf2705680b8f665b619ad2c442dd3d784a25ee81eeef1dc17a9fda3acdf597f2a0fe5cc0a7ed3bf3a328fb43f574ce2cd44cc5cbac89dacb79e47883ba0878495703e35a01ab72639f6d32c1b1d657767866255df75e27835b5bd2907096c7bd0a7d844aff650694380904fa7fb3dd60a4093e5f1b0d40dd342c867fe82391b5420d0d472d9c81eae98d1e73dce35c1238fefe7e6a2a6e79236f97cb6fe654ca73b984bb65054344494681861c5f"}}, 0x1000) r12 = openat$nci(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) sendfile(r12, r10, &(0x7f0000000800)=0x1, 0x390fe744) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000090) 3.174713899s ago: executing program 8 (id=7807): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'netdevsim0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0200000004000000008001400200000000000000", @ANYRES32, @ANYBLOB='\x00'/15, @ANYRES32=r3], 0x50) 2.490035053s ago: executing program 6 (id=7811): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800700, &(0x7f0000000340)={[{@usrjquota}, {@journal_dev={'journal_dev', 0x3d, 0x8000}}, {@debug}, {@minixdf}, {@resgid}, {@grpquota}, {@usrjquota}, {@journal_dev={'journal_dev', 0x3d, 0xdcc}}]}, 0x3, 0x44a, &(0x7f0000000400)="$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") socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_io_uring_setup(0x10d2, &(0x7f0000000480)={0x0, 0x7734, 0x200, 0x0, 0x34f}, &(0x7f00000000c0)=0x0, &(0x7f0000000000)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000400)={0x1, &(0x7f0000000200)=[{0x2e, 0x0, 0x0, 0x4}]}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = socket$inet(0x2, 0x2, 0x0) bind$inet(r2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x84, 0x80, 0x0, 0x0) sendmsg$rds(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r3, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, &(0x7f0000000380)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001240)={&(0x7f0000000200)='kfree\x00', r5, 0x0, 0xfffffffffffffffd}, 0x18) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000000)={0x0, 0x20, &(0x7f0000000340)={&(0x7f0000000880)=ANY=[@ANYBLOB="540100001a001307000000000000001cac141400"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ffffffff0000000000000000000000000000000032000000ac141417000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000048000200656362286369706865725f6e756c6c29000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001c"], 0x154}}, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e20, 0x2, @rand_addr=' \x01\x00', 0x80000000}}, 0x25a, 0xc57, 0x81, 0x7, 0x1}, 0x0) r7 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x800) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r7, 0x4058534c, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) io_uring_enter(r0, 0x47bc, 0x0, 0x0, 0x0, 0x0) 2.239938835s ago: executing program 1 (id=7814): r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x72, 0x101301) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x20000000000001d2, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffdfc, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000280), &(0x7f00000002c0)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) r4 = socket(0x2, 0x5, 0x0) sendmmsg$inet_sctp(r4, &(0x7f00000032c0)=[{&(0x7f0000002e40)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000200)="f9", 0x1}], 0x1, 0x0, 0x0, 0x80020}], 0x1, 0x40c0) sendmmsg$inet_sctp(r4, &(0x7f0000000bc0)=[{&(0x7f00000000c0)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000001c0)=[{0x0, 0x2}], 0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="30000000000000008400000001000000000000000c0000000000000000002b0388edb6556900"/51, @ANYRES32=0x0], 0x30}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r6 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=@newtfilter={0x84, 0x2c, 0xd27, 0x30bd29, 0x25dfdc00, {0x0, 0x0, 0x0, r7, {0x0, 0x3}, {}, {0x7}}, [@filter_kind_options=@f_matchall={{0xd}, {0x50, 0x2, [@TCA_MATCHALL_ACT={0x4c, 0x2, [@m_gact={0x48, 0x1, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x42ab, 0x24d417d6, 0x3, 0x800, 0xe26}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}]}]}}]}, 0x84}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$TIOCGSERIAL(r8, 0x541e, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) symlink(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000cc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') readlink(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000e00)=""/4105, 0xbd5) 2.110430296s ago: executing program 6 (id=7815): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) openat(0xffffffffffffffff, &(0x7f00000003c0)='./bus\x00', 0x2, 0x108) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0xf000, @none, 0x0, 0x2}, 0xe) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01002abd7000000000001a000000"], 0x14}, 0x1, 0x0, 0x0, 0x40880}, 0xd0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000008000000a000000000311900181000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_init_net_socket$x25(0x9, 0x5, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r3, 0x58, &(0x7f0000000180)}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4, 0x0, 0xfffffffffffffffd}, 0x18) unshare(0x2c060000) unshare(0x2c020400) 2.018015256s ago: executing program 6 (id=7817): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000000c0)={0xfffc, 0xfffa}, 0x8) sendto$inet6(r0, &(0x7f0000000000)="f8", 0x1, 0x40008c1, &(0x7f0000000100)={0xa, 0x4e20, 0x2, @loopback, 0x8}, 0x1c) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x189401) r2 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000000)=ANY=[@ANYBLOB="380000000314010000000000000000000900020073797a2f000000000800410072786500140033007465616d5f736c6176655f30"], 0x38}}, 0x0) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) io_setup(0x2278, &(0x7f0000000180)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) io_submit(r4, 0x2, &(0x7f0000000140)=[&(0x7f00000001c0)={0x0, 0x4, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x1}, &(0x7f0000001940)={0x0, 0x0, 0x2, 0x2, 0x2, 0xffffffffffffffff, 0x0}]) ioctl$IOCTL_GET_NCIDEV_IDX(r3, 0x0, &(0x7f00000000c0)=0x0) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r7) sendmsg$NFC_CMD_DEV_UP(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x1c, r8, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x8004) write$nci(r3, &(0x7f0000000140)=ANY=[@ANYBLOB="414601", @ANYRES32=r7], 0x4) sendmsg$IPSET_CMD_DESTROY(r2, &(0x7f0000001900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)=ANY=[@ANYBLOB="280000000306d7f30000000000000000030000000900020073f97ab2000000000500010007000000"], 0x28}, 0x1, 0x0, 0x0, 0x24000000}, 0x40000) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000180)={'\x00', 0x3, 0x1, 0x0, 0xfffffffffffff5b0, 0x9, r9}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000019c0)={0x18, 0xb, &(0x7f0000000740)=ANY=[@ANYRESOCT, @ANYRES16=r6, @ANYRES32=r8], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1, @void, @value}, 0x1d) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000001c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4c8, 0x2e0, 0x9403, 0x3002, 0x0, 0x2c0, 0x3f8, 0x3d8, 0x3d8, 0x3f8, 0x3d8, 0x3, 0x0, {[{{@uncond, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x80, 0x1, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x528) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f0000000000)={'macsec0\x00'}) r11 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) write$nci(r11, &(0x7f0000000900)=@NCI_OP_CORE_INIT_RSP_V2={0x0, 0x0, 0x2, 0x1, 0x1, {0x1, 0xb6c7, 0x8, 0x840f, 0xc0, 0x67, 0x2, 0xe99, 0xfef, "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"}}, 0x1000) r12 = openat$nci(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) sendfile(r12, r10, &(0x7f0000000800)=0x1, 0x390fe744) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x20000090) 2.016339907s ago: executing program 9 (id=7818): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0b00000005000000010001000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000022007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mlockall(0x3) 1.734822769s ago: executing program 8 (id=7819): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00'}, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000005c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_DELFLOWTABLE={0x3c, 0x18, 0xa, 0x5, 0x0, 0x0, {0x2}, [@NFTA_FLOWTABLE_HOOK={0x1c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg2\x00'}]}]}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x3}}}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x20008000) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) connect$can_bcm(r1, &(0x7f00000000c0)={0x1d, r2}, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000c00)={0x1, 0xa7, 0x4000, {}, {}, {0x0, 0x0, 0x0, 0x1}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "0000000000000100"}}, 0x48}}, 0x10) fsopen(&(0x7f00000000c0)='proc\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200000001000000000000000000008500000036000000c5000000080000009500"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x3}, @typedef={0x3}, @ptr={0x0, 0x0, 0x0, 0x2, 0x4}, @volatile={0x0, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0x0, 0x0, 0x61, 0x61]}}, 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r3, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000280)='./file0\x00', 0x402, &(0x7f0000000380)=ANY=[], 0x1, 0x285, &(0x7f0000000d80)="$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") openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 1.666896799s ago: executing program 1 (id=7820): ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000200)) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x20000000000001d2, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffdfc, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000280), &(0x7f00000002c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) r3 = socket(0x2, 0x5, 0x0) sendmmsg$inet_sctp(r3, &(0x7f00000032c0)=[{&(0x7f0000002e40)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000200)="f9", 0x1}], 0x1, 0x0, 0x0, 0x80020}], 0x1, 0x40c0) sendmmsg$inet_sctp(r3, &(0x7f0000000bc0)=[{&(0x7f00000000c0)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000001c0)=[{0x0, 0x2}], 0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="30000000000000008400000001000000000000000c0000000000000000002b0388edb6556900"/51, @ANYRES32=0x0], 0x30}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r5 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=@newtfilter={0x84, 0x2c, 0xd27, 0x30bd29, 0x25dfdc00, {0x0, 0x0, 0x0, r6, {0x0, 0x3}, {}, {0x7}}, [@filter_kind_options=@f_matchall={{0xd}, {0x50, 0x2, [@TCA_MATCHALL_ACT={0x4c, 0x2, [@m_gact={0x48, 0x1, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x42ab, 0x24d417d6, 0x3, 0x800, 0xe26}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}]}]}}]}, 0x84}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) symlink(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000cc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') readlink(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000e00)=""/4105, 0xbd5) 1.51704829s ago: executing program 6 (id=7821): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00'}, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000005c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_DELFLOWTABLE={0x3c, 0x18, 0xa, 0x5, 0x0, 0x0, {0x2}, [@NFTA_FLOWTABLE_HOOK={0x1c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg2\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x3}}}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x20008000) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) connect$can_bcm(r1, &(0x7f00000000c0)={0x1d, r2}, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000c00)={0x1, 0xa7, 0x4000, {}, {}, {0x0, 0x0, 0x0, 0x1}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "0000000000000100"}}, 0x48}}, 0x10) fsopen(&(0x7f00000000c0)='proc\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200000001000000000000000000008500000036000000c5000000080000009500"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x3}, @typedef={0x3}, @ptr={0x0, 0x0, 0x0, 0x2, 0x4}, @volatile={0x0, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0x0, 0x0, 0x61, 0x61]}}, 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r3, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000280)='./file0\x00', 0x402, &(0x7f0000000380)=ANY=[], 0x1, 0x285, &(0x7f0000000d80)="$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") openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 1.414693131s ago: executing program 1 (id=7822): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x100a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffffc, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="006a1a2b063800000000000000b7080000010400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x0, &(0x7f0000000580), 0xfe, 0x507, &(0x7f0000001780)="$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") bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000500)={'veth1\x00', &(0x7f0000000200)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x1, 0x7fff, 0x1, 0x4, 0x8, 0xa4, 0x3, 0x3, 0xb69, 0xc1, 0x4, 0x1, 0x3, 0x5, 0x101, 0x80000000, 0x9, 0x3, 0x6, 0x1, 0xfffffffa, 0x401, 0x6, 0x9, 0x4, 0x4, 0x5, 0x66c, 0x200, 0x3, 0x0, 0xe, 0x2b11, 0x100, 0x2, 0x1c00, 0xb, 0x7, 0xbed4, 0x8, 0x8000100, 0x3, 0x0, 0x11003, 0x8, 0x7, 0x1, 0x2, 0x1, 0x7b, 0x3ff, 0xa, 0xfffffff9, 0xf, 0x101, 0xd7, 0x1fa4860a, 0x7, 0xaa, 0xfff, 0x2, 0x180000, 0x7, 0x8b, 0x5, 0x2af, 0xf5, 0xffffffff, 0x2, 0x6, 0x9, 0x4, 0x7, 0x9, 0xba27, 0x4, 0x5, 0x8, 0x752, 0x5, 0x4, 0x0, 0x10001, 0x2, 0xfffffffd, 0x6, 0x9, 0x8, 0x8, 0xffffffff, 0x5, 0x2, 0x80, 0x100, 0x5, 0x5704, 0x81, 0x2000b, 0x5, 0x2, 0x6, 0x22, 0x8, 0x4, 0xd9a, 0x800809, 0x2a2, 0x3ff, 0xffff, 0x2, 0x5, 0x8, 0x0, 0x7, 0xb57, 0x0, 0x7, 0x4, 0x5, 0x401, 0xd, 0x0, 0x401, 0x1, 0x200, 0xc5d, 0xffffffff]}}) poll(&(0x7f0000000000), 0x20000000000000b5, 0x9) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0), 0x208e24b) capset(&(0x7f0000000c00)={0x20080522}, &(0x7f0000000140)) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000640)='ns/pid_for_children\x00') setns(r1, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1) creat(&(0x7f00000000c0)='./file0\x00', 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f0000003ec0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000340)='kfree\x00', r3, 0x0, 0x97a1}, 0x18) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000012c0)=@base={0x12, 0x3, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x800000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r5}, &(0x7f0000000040), &(0x7f0000000140)=r4}, 0xffffffffffffff3a) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r5, &(0x7f0000000040)}, 0x20) setxattr$incfs_id(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000240)={'0000000000000000000000000000000', 0x30}, 0x20, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 1.247220112s ago: executing program 8 (id=7823): r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0x14) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f00000000c0)=0x32) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) close(r0) 1.208748862s ago: executing program 1 (id=7824): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001200)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r0, &(0x7f00000010c0)=""/173, 0xad, 0x101) io_uring_register$IORING_REGISTER_BUFFERS2(r0, 0xf, &(0x7f0000000180)={0x2, 0x1, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/174, 0xae}, {&(0x7f00000000c0)=""/63, 0x3f}], &(0x7f0000000140)=[0x3, 0x9, 0x289bffe5, 0x5, 0xfffffffffffffff8, 0x0, 0x10, 0x9]}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000008c0)={0x0}, 0x18) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) socket$xdp(0x2c, 0x3, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) 1.208310532s ago: executing program 9 (id=7825): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x800000000003}, 0x1320, 0xffffffff, 0x3, 0x5, 0x1, 0x1088f109, 0x6, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000340)=@keyring) (fail_nth: 4) 676.166776ms ago: executing program 9 (id=7827): bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX=0x0], 0x48) fsopen(0x0, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b70400000000000085"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xd, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000019580)='kfree\x00', r4}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f000001aa00)={{r3}, &(0x7f000001a980), &(0x7f000001a9c0)=r2}, 0x20) r5 = perf_event_open$cgroup(&(0x7f00000004c0)={0x3, 0x80, 0xc, 0x0, 0xf8, 0x5, 0x0, 0x7, 0x22110, 0x12, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000200), 0x4}, 0x1200, 0x0, 0x3, 0x6, 0x8, 0x1, 0x200, 0x0, 0x54, 0x0, 0x40}, 0xffffffffffffffff, 0x1ff, 0xffffffffffffffff, 0xa) r6 = perf_event_open(&(0x7f0000000600)={0x3, 0x80, 0x0, 0xb1, 0x0, 0x0, 0x0, 0x0, 0x20040, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x800, 0x0, 0x0, 0x3, 0x0, 0x0, 0x71, 0x0, 0x0, 0x0, 0x20000000010000}, 0x0, 0x0, r5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f00000001c0)='cpu>20\t&&') prlimit64(0x0, 0x2, &(0x7f0000000040)={0x0, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3000003, 0x4008032, 0xffffffffffffffff, 0xf058b000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) r9 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r9, 0x10f, 0x87, &(0x7f0000000240)={0x42, 0x1, 0x2}, 0x10) add_key(&(0x7f0000000040)='ceph\x00', 0x0, &(0x7f00000000c0)="010001", 0x3, 0xfffffffffffffffd) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[], 0x48) semget$private(0x0, 0x6, 0x182) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000003c0)={{}, &(0x7f0000000300), &(0x7f0000000340)='%+9llu \x00'}, 0x20) r10 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r10) 675.852446ms ago: executing program 7 (id=7828): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) openat(0xffffffffffffffff, &(0x7f00000003c0)='./bus\x00', 0x2, 0x108) bind$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0xf000, @none, 0x0, 0x2}, 0xe) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01002abd7000000000001a000000"], 0x14}, 0x1, 0x0, 0x0, 0x40880}, 0xd0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000008000000a000000000311900181000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_init_net_socket$x25(0x9, 0x5, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r3, 0x58, &(0x7f0000000180)}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4, 0x0, 0xfffffffffffffffd}, 0x18) unshare(0x2c060000) unshare(0x2c020400) 669.936716ms ago: executing program 6 (id=7829): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x100a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffffc, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="006a1a2b063800000000000000b7080000010400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x0, &(0x7f0000000580), 0xfe, 0x507, &(0x7f0000001780)="$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") bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000500)={'veth1\x00', &(0x7f0000000200)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x1, 0x7fff, 0x1, 0x4, 0x8, 0xa4, 0x3, 0x3, 0xb69, 0xc1, 0x4, 0x1, 0x3, 0x5, 0x101, 0x80000000, 0x9, 0x3, 0x6, 0x1, 0xfffffffa, 0x401, 0x6, 0x9, 0x4, 0x4, 0x5, 0x66c, 0x200, 0x3, 0x0, 0xe, 0x2b11, 0x100, 0x2, 0x1c00, 0xb, 0x7, 0xbed4, 0x8, 0x8000100, 0x3, 0x0, 0x11003, 0x8, 0x7, 0x1, 0x2, 0x1, 0x7b, 0x3ff, 0xa, 0xfffffff9, 0xf, 0x101, 0xd7, 0x1fa4860a, 0x7, 0xaa, 0xfff, 0x2, 0x180000, 0x7, 0x8b, 0x5, 0x2af, 0xf5, 0xffffffff, 0x2, 0x6, 0x9, 0x4, 0x7, 0x9, 0xba27, 0x4, 0x5, 0x8, 0x752, 0x5, 0x4, 0x0, 0x10001, 0x2, 0xfffffffd, 0x6, 0x9, 0x8, 0x8, 0xffffffff, 0x5, 0x2, 0x80, 0x100, 0x5, 0x5704, 0x81, 0x2000b, 0x5, 0x2, 0x6, 0x22, 0x8, 0x4, 0xd9a, 0x800809, 0x2a2, 0x3ff, 0xffff, 0x2, 0x5, 0x8, 0x0, 0x7, 0xb57, 0x0, 0x7, 0x4, 0x5, 0x401, 0xd, 0x0, 0x401, 0x1, 0x200, 0xc5d, 0xffffffff]}}) poll(&(0x7f0000000000), 0x20000000000000b5, 0x9) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0), 0x208e24b) capset(&(0x7f0000000c00)={0x20080522}, &(0x7f0000000140)) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000640)='ns/pid_for_children\x00') setns(r1, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1) creat(&(0x7f00000000c0)='./file0\x00', 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa4000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f0000003ec0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000340)='kfree\x00', r3, 0x0, 0x97a1}, 0x18) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000012c0)=@base={0x12, 0x3, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x800000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r5}, &(0x7f0000000040), &(0x7f0000000140)=r4}, 0xffffffffffffff3a) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r5, &(0x7f0000000040)}, 0x20) setxattr$incfs_id(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000240)={'0000000000000000000000000000000', 0x30}, 0x20, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 666.656346ms ago: executing program 7 (id=7830): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000005c80), 0x0, 0x10122, 0x0) setsockopt$MRT_DEL_MFC_PROXY(0xffffffffffffffff, 0x0, 0xd3, &(0x7f0000000040)={@dev={0xac, 0x14, 0x14, 0x17}, @broadcast, 0xffffffffffffffff, "246717e1db80a6f60c82a68d7cb18eceaf6d2be4f62e196f71f153ee47a665c9", 0x7, 0xffffffff, 0x7fff, 0x774f}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000200)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000700000000000000000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xc5fffffd) modify_ldt$write(0x1, &(0x7f0000000040)={0x806, 0xffffffffffffffff}, 0x10) syz_clone(0x1000, 0x0, 0x0, 0x0, 0x0, 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000080)=ANY=[@ANYBLOB="16000000020000001d"], 0x0) add_key$fscrypt_v1(&(0x7f0000000400), &(0x7f00000007c0)={'fscrypt:', @desc2}, &(0x7f0000000480)={0x0, "6035ae1e0fe721441700322225930e6c1e3e2a51a92fd796bc34d7cf6e0236805b4377f7ab1a9b01c103a4c6de6269613800", 0x1}, 0x48, 0xfffffffffffffffb) socket$inet(0x2, 0x6, 0x0) r0 = mq_open(&(0x7f0000000380)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\x01\x00\x00\x00a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|\x00\x17\xc0\xa3\xd5\xf9\xaa\x98/\xa4v\xe4)I\xf3+[e\x95\x89\x99\xca\x8e\xc5\xd3\\T\xf0\x1a|5\xfff\xff\x99\xa4\xbb\x9e#oR\xa4\xf1\xba\x04c\xb3-\xf7R\xb85\xb5\xdb\xe9?\xfa/\xdf\xb4R\xbfx=\v_j\x8e\xb0\'\xf4\xe5\xff!\xe1\xbf\x82e\xb1\x9b\x8d\xf3L\t\xd21\x9cbwV\xc8\xcc\xe4\x96M_w\xbc\xdf9\b\r\xf6\x95\xae\xb5,\x92\x8c\xc0DQm\x80\xd1w\xa2\x1a\x12Z\xe5\xf4H\xf7D\n\x96J\x93\xfb\xf0$\x9f\xf7\xa2\xae$O\xa3\xb6\xf5\x98\xd3\v\x00\x86\xa5\x8b\x81\x04\xaf\x03s\xe5\x86>\x0e\xa6\xe6\x1aV\x17\x8b\xed\xa7\'\xd0\r_\xe8,XVR\x13\xe5%\xb9\x88\xb8W@D\'\x17A\xc8\x80\x02J\xd4V\x00wH(\xc5v\f\xc9\xb6\xdf..$\xe6P(_\xf1\'\xc1:\xa3\xcb\xd9\xd1\xc7\x13\x99Md\x1dc\xf1\'j\x03!\x13\xd1\xb8\xbf\xe6\xb2M\b/\rp\xa5\x00\x00\x00\x00', 0x40, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x187842, 0x147) r2 = open(&(0x7f0000000080)='./file1\x00', 0x10b942, 0x0) sendfile(r2, r1, 0x0, 0x80000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) mq_unlink(&(0x7f0000000340)='eth0\x00') close(r0) 586.231126ms ago: executing program 1 (id=7831): r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000080)=0x14) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f00000000c0)=0x32) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) close(r0) 561.061816ms ago: executing program 7 (id=7832): ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000200)) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x20000000000001d2, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffdfc, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000280), &(0x7f00000002c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) r3 = socket(0x2, 0x5, 0x0) sendmmsg$inet_sctp(r3, &(0x7f00000032c0)=[{&(0x7f0000002e40)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000200)="f9", 0x1}], 0x1, 0x0, 0x0, 0x80020}], 0x1, 0x40c0) sendmmsg$inet_sctp(r3, &(0x7f0000000bc0)=[{&(0x7f00000000c0)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000001c0)=[{0x0, 0x2}], 0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="30000000000000008400000001000000000000000c0000000000000000002b0388edb6556900"/51, @ANYRES32=0x0], 0x30}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r5 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=@newtfilter={0x84, 0x2c, 0xd27, 0x30bd29, 0x25dfdc00, {0x0, 0x0, 0x0, r6, {0x0, 0x3}, {}, {0x7}}, [@filter_kind_options=@f_matchall={{0xd}, {0x50, 0x2, [@TCA_MATCHALL_ACT={0x4c, 0x2, [@m_gact={0x48, 0x1, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x42ab, 0x24d417d6, 0x3, 0x800, 0xe26}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}]}]}}]}, 0x84}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$TIOCGSERIAL(r7, 0x541e, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) symlink(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000cc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') readlink(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000e00)=""/4105, 0xbd5) 536.125327ms ago: executing program 9 (id=7833): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000005"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={r2, r1}, 0xc) 440.158388ms ago: executing program 9 (id=7834): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x100a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x0, 0x0, 0x9, 0xfffffffffffffffc, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="006a1a2b063800000000000000b7080000010400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x0, &(0x7f0000000580), 0xfe, 0x507, &(0x7f0000001780)="$eJzs3c9vI1cdAPDvOL+cNG3S0gMgoEspLGi1TuJto6oHWE4IoUqIHkHahsQbRbHjKHZKE/aQ/g9IVOIER/4Azj1x54LgxqUckChEoM1KHIxmPMk6WXtjSGJH8ecjjea9N46/78Wa9+Kvd/0CGFm3IuIgIiYj4v2ImMvbk/yI++0jfdzjw0erR4ePVpNotd77R5JdT9ui42dSL+TPWYyIH30v4qfJs3Ebe/ubK9VqZaddnV5o1rYXGnv7dzdqK+uV9cpWuby8tLz49r23ypc21tdqk3npy5/+4eBbP0+7NZu3dI7jMrWHPnESJzUeET+4imBDMJaPZ3LYHeH/UoiIVyLi9ez+n4ux7NUEAG6yVmsuWnOddQDgpitkObCkUMpzAbNRKJRK7RzeqzFTqNYbzTsP67tba+1c2XxMFB5uVCuLea5wPiaStL6UlZ/Wy2fq9yLi5Yj4xdR0Vi+t1qtrw/zDBwBG2Atn1v9/T7XXfwDghisOuwMAwMBZ/wFg9Fj/AWD0WP8BYPQ8Xf/vD7UfAMDgeP8PAKPH+g8AI+WH776bHq2j/Puv1z7Y292sf3B3rdLYLNV2V0ur9Z3t0nq9vp59Z0/tvOer1uvbS2/G7ofz395uNBcae/sPavXdreaD7Hu9H1QmBjIqAOB5Xn7tkz8nEXHwznR2RMdeDtZquNkKw+4AMDRjw+4AMDR2+4LRdYH3+NIDcEN02aL3lGJETJ9tbLVaravrEnDFbn9B/h9GVUf+378ChhEj/w+jS/4fRlerlfS753/0+0AA4HqT4wd6fP7/Sn7+bf7hwE/Wzj7i46vsFQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFxvx/v/lvK9wGejUCiVIl6MiPmYSB5uVCuLEfFSRPxpamIqrS8Nuc8AwEUV/pbk+3/dnntj9uzVyeTJVHaOiJ/96r1ffrjSbO78MW3/50l78+O8vTyM/gMA5zlep7Nzxxv5x4ePVo+PQfbn79+NiGI7/tHhZBydxB+P8excjImImPlXktfbko7cxUUcfBQRn+82/iRmsxxIe+fTs/HT2C8ONH7hVPxCdq19Tn8Xn7uEvsCo+SSdf+53u/8KcSs7d7//i9kMdXH5/Jc+1epRNgc+jX88/431mP9u9Rvjzd9/v12afvbaRxFfHI84jn3UMf8cx096xH+jz/h/+dJXXu91rfXriNvRPX5nrIVmbXuhsbd/d6O2sl5Zr2yVy8tLy4tv33urvJDlqBd6rwafvXPnpazQ5SHp+Gd6xC+eM/6v9zn+3/zn/R9/tce1NP43v9YtfiFefU78dE38Rp/xV2Z+V+x1LY2/1mP8573+d/qM/+lf95/ZNhwAGJ7G3v7mSrVa2Rlk4fgPiYEGVeivMJW/ONelP6cK17ZjmyvV7wwq1mT8Tz/Vap1u+Wy8r99hrxnjMrJuwHVwctNHxJNhdwYAAAAAAAAAAAAAAOjqSv+jUtIuDHuMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA3Fz/DQAA//+sasqI") bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$rds(0x15, 0x5, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000500)={'veth1\x00', &(0x7f0000000200)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x1, 0x7fff, 0x1, 0x4, 0x8, 0xa4, 0x3, 0x3, 0xb69, 0xc1, 0x4, 0x1, 0x3, 0x5, 0x101, 0x80000000, 0x9, 0x3, 0x6, 0x1, 0xfffffffa, 0x401, 0x6, 0x9, 0x4, 0x4, 0x5, 0x66c, 0x200, 0x3, 0x0, 0xe, 0x2b11, 0x100, 0x2, 0x1c00, 0xb, 0x7, 0xbed4, 0x8, 0x8000100, 0x3, 0x0, 0x11003, 0x8, 0x7, 0x1, 0x2, 0x1, 0x7b, 0x3ff, 0xa, 0xfffffff9, 0xf, 0x101, 0xd7, 0x1fa4860a, 0x7, 0xaa, 0xfff, 0x2, 0x180000, 0x7, 0x8b, 0x5, 0x2af, 0xf5, 0xffffffff, 0x2, 0x6, 0x9, 0x4, 0x7, 0x9, 0xba27, 0x4, 0x5, 0x8, 0x752, 0x5, 0x4, 0x0, 0x10001, 0x2, 0xfffffffd, 0x6, 0x9, 0x8, 0x8, 0xffffffff, 0x5, 0x2, 0x80, 0x100, 0x5, 0x5704, 0x81, 0x2000b, 0x5, 0x2, 0x6, 0x22, 0x8, 0x4, 0xd9a, 0x800809, 0x2a2, 0x3ff, 0xffff, 0x2, 0x5, 0x8, 0x0, 0x7, 0xb57, 0x0, 0x7, 0x4, 0x5, 0x401, 0xd, 0x0, 0x401, 0x1, 0x200, 0xc5d, 0xffffffff]}}) poll(&(0x7f0000000000), 0x20000000000000b5, 0x9) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000004c0), 0x208e24b) capset(&(0x7f0000000c00)={0x20080522}, &(0x7f0000000140)) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000640)='ns/pid_for_children\x00') setns(r1, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1) creat(&(0x7f00000000c0)='./file0\x00', 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f0000003ec0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000340)='kfree\x00', r3, 0x0, 0x97a1}, 0x18) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000012c0)=@base={0x12, 0x3, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x800000, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r5}, &(0x7f0000000040), &(0x7f0000000140)=r4}, 0xffffffffffffff3a) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r5, &(0x7f0000000040)}, 0x20) setxattr$incfs_id(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000240)={'0000000000000000000000000000000', 0x30}, 0x20, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 316.351159ms ago: executing program 8 (id=7835): r0 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000240)={'filter\x00', 0x0, 0x3, 0x68, [0x2, 0x7, 0x2, 0x80000001, 0x1, 0x3], 0xa, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000001c0)=""/104}, &(0x7f0000000040)=0x78) bind$isdn(0xffffffffffffffff, &(0x7f0000000300)={0x22, 0x0, 0x9, 0x10, 0xf}, 0x6) creat(&(0x7f00000002c0)='./file0\x00', 0x4f77f566c788bb0a) truncate(&(0x7f0000000180)='./file0\x00', 0x8fff5) open$dir(&(0x7f0000000100)='./file0\x00', 0x4200, 0x1) r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f00000032c0)=[{&(0x7f00000000c0)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000100)='a', 0x1}], 0x1, 0x0, 0x0, 0x44}], 0x1, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000080)={0x0, 0x5b, 0x0, 0x78}, 0xe) sendmmsg$inet_sctp(r1, &(0x7f00000032c0)=[{&(0x7f00000000c0)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="300000000000000084000000010000000000000004"], 0x30}], 0x1, 0x0) recvfrom(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000180)={@private1={0xfc, 0x1, '\x00', 0xfd}, 0x8000000, 0x0, 0x3, 0x1, 0xfffc}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@loopback={0xfec0ffff00000000}, 0x8000000, 0x0, 0x3, 0x0, 0x0, 0x600}, 0x20) close_range(r2, 0xffffffffffffffff, 0x0) 275.176549ms ago: executing program 7 (id=7836): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000005"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x5}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040)={r3, r2}, 0xc) 217.596049ms ago: executing program 8 (id=7837): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001200)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r0, &(0x7f00000010c0)=""/173, 0xad, 0x101) io_uring_register$IORING_REGISTER_BUFFERS2(r0, 0xf, &(0x7f0000000180)={0x2, 0x1, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/174, 0xae}, {&(0x7f00000000c0)=""/63, 0x3f}], &(0x7f0000000140)=[0x3, 0x9, 0x289bffe5, 0x5, 0xfffffffffffffff8, 0x0, 0x10, 0x9]}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000008c0)={0x0}, 0x18) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) socket$xdp(0x2c, 0x3, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) 213.145229ms ago: executing program 7 (id=7838): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) r1 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0xf, &(0x7f0000000000), 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x3f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r6 = syz_open_dev$usbfs(&(0x7f0000000000), 0x1ff, 0x2) r7 = dup(r6) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2869000000000, 0x7}, 0x1320, 0xffffffff, 0x5, 0x5, 0x4, 0x1088f10d, 0xfffb, 0x0, 0x4, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$USBDEVFS_CONTROL(r7, 0xc0185500, &(0x7f0000000240)={0x0, 0x3, 0x300, 0x3, 0x0, 0x0, 0x0}) msgrcv(0x0, 0xfffffffffffffffe, 0x0, 0x3, 0x3000) msgsnd(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="2d7c0aebb66b88a3d385e67ebdec69cd868a394dc3b9406c14c62d28611730f7bbaaec70215ce2fdebe8d2b62a24b0c97a70d73777071162fe947249b1fe19c77f36331a4324a3a545cf2d1cd7a9419505e4cc12afd30cd85353f570ad26115e36187599d6d480cd9473f01f8d883f60071400"/127], 0x8, 0x0) msgctl$IPC_STAT(0x0, 0x2, 0x0) msgrcv(0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x1000) msgsnd(0x0, &(0x7f0000000100)={0x2}, 0x8, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a80000000160a0103000000000000000002000000540003804000038014000100626f6e645f736c6176655f300000000014000100736974300000000000000000000000001400010073697430000000000000000000000000080002400000000008000140000000000900020073797a31000000000900010073797a30", @ANYRES8=r4, @ANYRESOCT=r0], 0xa8}, 0x1, 0x0, 0x0, 0x8000}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES8=r1, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x7f699ea7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8000000, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="d8000000180081054e81f783db4cb9040a1d080006007c09e8fc55a10a0015000600142603600e1208000f00fff00401a80008000800104004080000055c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb71b14d6d930dfe144ecc447c65e206d25b4084121d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad9e3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd4e1ffffffffc1c9b6278754ca397c388b0dd6e4edef3d9300fc0d15", 0xd8}], 0x1}, 0x4000000) 155.47362ms ago: executing program 1 (id=7839): r0 = socket$kcm(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000040)={0x0, &(0x7f0000000680)}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r7 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000240)={'syzkaller1\x00', @link_local}) writev(r6, &(0x7f0000000400)=[{&(0x7f0000000a40)="2e9b3d0007e03dd65193dfb6c575963f8864", 0x12}, {&(0x7f00000001c0)="99", 0x1}], 0x2) sendmsg$DEVLINK_CMD_RELOAD(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x84, r4, 0x1, 0x70bd26, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r2}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8}}]}, 0x84}, 0x1, 0x0, 0x0, 0x4040010}, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x0, 0x4, 0x8, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r11 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x17, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000002000000000000000100000018000000070000000000000002000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ff3c16b7020000080100000003000007000000850000000600000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7020000000000008500000086000000037ea1030200000038a630001000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b70200000000000085000000860000009500000000000000"], &(0x7f0000000180)='syzkaller\x00', 0x6f3, 0x88, &(0x7f00000004c0)=""/136, 0x40f00, 0x7c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x9, 0x1}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000005c0)=[r10, r8, r9, r10, r10], &(0x7f0000000600)=[{0x1, 0x2, 0xf, 0x9}], 0x10, 0x4, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r11, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRES32, @ANYRES16]) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @dev, 0x5}, 0x80, 0x0}, 0x24004059) close(r0) 154.73005ms ago: executing program 6 (id=7840): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00'}, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000005c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_DELFLOWTABLE={0x3c, 0x18, 0xa, 0x5, 0x0, 0x0, {0x2}, [@NFTA_FLOWTABLE_HOOK={0x1c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'wg2\x00'}]}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x3}}}, 0x64}, 0x1, 0x0, 0x0, 0x40000}, 0x20008000) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000100)={'vxcan0\x00', 0x0}) connect$can_bcm(r1, &(0x7f00000000c0)={0x1d, r2}, 0x10) sendmsg$can_bcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000c00)={0x1, 0xa7, 0x4000, {}, {}, {0x0, 0x0, 0x0, 0x1}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "0000000000000100"}}, 0x48}}, 0x10) fsopen(&(0x7f00000000c0)='proc\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200000001000000000000000000008500000036000000c5000000080000009500"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r4}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x3}, @typedef={0x3}, @ptr={0x0, 0x0, 0x0, 0x2, 0x4}, @volatile={0x0, 0x0, 0x0, 0xa, 0x2}]}, {0x0, [0x0, 0x0, 0x61, 0x61]}}, 0x0, 0x52, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r3, 0x0, 0xe, 0xfffffffffffffd85, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x739d, 0x0, 0x0, 0xfffffffffffffff3}, 0x28) socket$inet_sctp(0x2, 0x1, 0x84) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000280)='./file0\x00', 0x402, &(0x7f0000000380)=ANY=[], 0x1, 0x285, &(0x7f0000000d80)="$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") openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 456.45µs ago: executing program 7 (id=7841): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001200)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r0, &(0x7f00000010c0)=""/173, 0xad, 0x101) io_uring_register$IORING_REGISTER_BUFFERS2(r0, 0xf, &(0x7f0000000180)={0x2, 0x1, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/174, 0xae}, {&(0x7f00000000c0)=""/63, 0x3f}], &(0x7f0000000140)=[0x3, 0x9, 0x289bffe5, 0x5, 0xfffffffffffffff8, 0x0, 0x10, 0x9]}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000008c0)={0x0}, 0x18) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/74, 0x328000, 0x1000}, 0x1c) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) 0s ago: executing program 9 (id=7842): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) recvmmsg(0xffffffffffffffff, &(0x7f0000005c80), 0x0, 0x10122, 0x0) setsockopt$MRT_DEL_MFC_PROXY(0xffffffffffffffff, 0x0, 0xd3, &(0x7f0000000040)={@dev={0xac, 0x14, 0x14, 0x17}, @broadcast, 0xffffffffffffffff, "246717e1db80a6f60c82a68d7cb18eceaf6d2be4f62e196f71f153ee47a665c9", 0x7, 0xffffffff, 0x7fff, 0x774f}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000200)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000700000000000000000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xc5fffffd) modify_ldt$write(0x1, &(0x7f0000000040)={0x806, 0xffffffffffffffff}, 0x10) syz_clone(0x1000, 0x0, 0x0, 0x0, 0x0, 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f0000000080)=ANY=[@ANYBLOB="16000000020000001d"], 0x0) add_key$fscrypt_v1(&(0x7f0000000400), &(0x7f00000007c0)={'fscrypt:', @desc2}, &(0x7f0000000480)={0x0, "6035ae1e0fe721441700322225930e6c1e3e2a51a92fd796bc34d7cf6e0236805b4377f7ab1a9b01c103a4c6de6269613800", 0x1}, 0x48, 0xfffffffffffffffb) socket$inet(0x2, 0x6, 0x0) r0 = mq_open(&(0x7f0000000380)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\x01\x00\x00\x00a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|\x00\x17\xc0\xa3\xd5\xf9\xaa\x98/\xa4v\xe4)I\xf3+[e\x95\x89\x99\xca\x8e\xc5\xd3\\T\xf0\x1a|5\xfff\xff\x99\xa4\xbb\x9e#oR\xa4\xf1\xba\x04c\xb3-\xf7R\xb85\xb5\xdb\xe9?\xfa/\xdf\xb4R\xbfx=\v_j\x8e\xb0\'\xf4\xe5\xff!\xe1\xbf\x82e\xb1\x9b\x8d\xf3L\t\xd21\x9cbwV\xc8\xcc\xe4\x96M_w\xbc\xdf9\b\r\xf6\x95\xae\xb5,\x92\x8c\xc0DQm\x80\xd1w\xa2\x1a\x12Z\xe5\xf4H\xf7D\n\x96J\x93\xfb\xf0$\x9f\xf7\xa2\xae$O\xa3\xb6\xf5\x98\xd3\v\x00\x86\xa5\x8b\x81\x04\xaf\x03s\xe5\x86>\x0e\xa6\xe6\x1aV\x17\x8b\xed\xa7\'\xd0\r_\xe8,XVR\x13\xe5%\xb9\x88\xb8W@D\'\x17A\xc8\x80\x02J\xd4V\x00wH(\xc5v\f\xc9\xb6\xdf..$\xe6P(_\xf1\'\xc1:\xa3\xcb\xd9\xd1\xc7\x13\x99Md\x1dc\xf1\'j\x03!\x13\xd1\xb8\xbf\xe6\xb2M\b/\rp\xa5\x00\x00\x00\x00', 0x40, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file2\x00', 0x187842, 0x147) r2 = open(&(0x7f0000000080)='./file1\x00', 0x10b942, 0x0) sendfile(r2, r1, 0x0, 0x80000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) mq_unlink(&(0x7f0000000340)='eth0\x00') close(r0) kernel console output (not intermixed with test programs): re. [ 415.240143][T26555] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 415.253256][T26555] CPU: 0 UID: 0 PID: 26555 Comm: syz.8.7040 Not tainted 6.14.0-rc7-syzkaller-00074-ga7f2e10ecd8f #0 [ 415.253281][T26555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 415.253334][T26555] Call Trace: [ 415.253342][T26555] [ 415.253352][T26555] dump_stack_lvl+0xf2/0x150 [ 415.253384][T26555] dump_stack+0x15/0x1a [ 415.253418][T26555] should_fail_ex+0x24a/0x260 [ 415.253531][T26555] should_fail+0xb/0x10 [ 415.253564][T26555] should_fail_usercopy+0x1a/0x20 [ 415.253603][T26555] strncpy_from_user+0x25/0x210 [ 415.253680][T26555] ? kmem_cache_alloc_noprof+0x18e/0x320 [ 415.253838][T26555] ? getname_flags+0x81/0x3b0 [ 415.253881][T26555] getname_flags+0xb0/0x3b0 [ 415.253995][T26555] getname+0x17/0x20 [ 415.254012][T26555] path_setxattrat+0x23a/0x310 [ 415.254071][T26555] __x64_sys_lsetxattr+0x71/0x90 [ 415.254105][T26555] x64_sys_call+0x29c8/0x2dc0 [ 415.254135][T26555] do_syscall_64+0xc9/0x1c0 [ 415.254174][T26555] ? clear_bhb_loop+0x55/0xb0 [ 415.254201][T26555] ? clear_bhb_loop+0x55/0xb0 [ 415.254260][T26555] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 415.254291][T26555] RIP: 0033:0x7f4972fed169 [ 415.254306][T26555] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 415.254348][T26555] RSP: 002b:00007f4971651038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 415.254370][T26555] RAX: ffffffffffffffda RBX: 00007f4973205fa0 RCX: 00007f4972fed169 [ 415.254385][T26555] RDX: 0000200000000040 RSI: 00002000000000c0 RDI: 0000200000000080 [ 415.254407][T26555] RBP: 00007f4971651090 R08: 0000000000000000 R09: 0000000000000000 [ 415.254422][T26555] R10: 0000000000000018 R11: 0000000000000246 R12: 0000000000000001 [ 415.254438][T26555] R13: 0000000000000000 R14: 00007f4973205fa0 R15: 00007ffe4faf9d68 [ 415.254461][T26555] [ 415.440893][T26447] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 415.447911][T26447] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 415.473979][T26447] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 415.498715][T26447] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 415.505754][T26447] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 415.531788][T26447] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 415.564030][T26447] hsr_slave_0: entered promiscuous mode [ 415.588558][T26447] hsr_slave_1: entered promiscuous mode [ 415.594618][T26447] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 415.625708][T26447] Cannot create hsr debugfs directory [ 415.641288][T26558] pim6reg: entered allmulticast mode [ 415.662400][T26558] pim6reg: left allmulticast mode [ 415.881906][T26588] netlink: 248 bytes leftover after parsing attributes in process `syz.7.7048'. [ 415.891069][T26588] netlink: 4 bytes leftover after parsing attributes in process `syz.7.7048'. [ 416.380922][T26447] netdevsim netdevsim9 netdevsim0: renamed from eth0 [ 416.402086][T26447] netdevsim netdevsim9 netdevsim1: renamed from eth1 [ 416.412630][T26620] binfmt_misc: register: failed to install interpreter file ./file0 [ 416.446453][T26447] netdevsim netdevsim9 netdevsim2: renamed from eth2 [ 416.471054][T26447] netdevsim netdevsim9 netdevsim3: renamed from eth3 [ 416.556509][T26447] 8021q: adding VLAN 0 to HW filter on device bond0 [ 416.614225][T26632] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7055'. [ 416.636362][T26447] 8021q: adding VLAN 0 to HW filter on device team0 [ 416.653740][ T51] bridge0: port 1(bridge_slave_0) entered blocking state [ 416.660858][ T51] bridge0: port 1(bridge_slave_0) entered forwarding state [ 416.672361][T26638] netlink: 3 bytes leftover after parsing attributes in process `syz.8.7056'. [ 416.683860][ T51] bridge0: port 2(bridge_slave_1) entered blocking state [ 416.691024][ T51] bridge0: port 2(bridge_slave_1) entered forwarding state [ 416.714199][T26643] futex_wake_op: syz.1.7058 tries to shift op by -1; fix this program [ 416.737331][T26638] batadv0: entered allmulticast mode [ 416.743763][T26640] netlink: 4 bytes leftover after parsing attributes in process `syz.7.7057'. [ 416.785199][T26447] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 416.812916][T26656] netlink: 248 bytes leftover after parsing attributes in process `syz.7.7059'. [ 416.822239][T26656] netlink: 4 bytes leftover after parsing attributes in process `syz.7.7059'. [ 416.968740][T26447] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 416.991130][T26678] IPv6: Can't replace route, no match found [ 417.024201][T26681] netlink: 108 bytes leftover after parsing attributes in process `syz.8.7062'. [ 417.111093][T26697] pim6reg: entered allmulticast mode [ 417.117219][T26697] pim6reg: left allmulticast mode [ 417.669196][T26447] veth0_vlan: entered promiscuous mode [ 417.683995][T26447] veth1_vlan: entered promiscuous mode [ 417.708843][T26741] batadv1: entered allmulticast mode [ 417.719936][T26447] veth0_macvtap: entered promiscuous mode [ 417.729643][T26447] veth1_macvtap: entered promiscuous mode [ 417.745390][T26447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 417.756057][T26447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 417.765954][T26447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 417.776465][T26447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 417.786319][T26447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 417.796852][T26447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 417.806790][T26447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 417.817283][T26447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 417.827485][T26447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 417.838162][T26447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 417.902478][T26447] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 417.914579][T26447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 417.925158][T26447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 417.935012][T26447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 417.945601][T26447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 417.955492][T26447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 417.965989][T26447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 417.975995][T26447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 417.986485][T26447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 417.996434][T26447] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 418.006919][T26447] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 418.018548][T26447] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 418.046095][T26447] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 418.054924][T26447] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 418.063758][T26447] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 418.072760][T26447] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 418.078474][ T30] kauditd_printk_skb: 204 callbacks suppressed [ 418.078515][ T30] audit: type=1326 audit(2000000183.700:15352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26756 comm="syz.1.7077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f676445d169 code=0x7ffc0000 [ 418.119674][ T30] audit: type=1326 audit(2000000183.740:15353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26756 comm="syz.1.7077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f676445d169 code=0x7ffc0000 [ 418.145191][ T30] audit: type=1326 audit(2000000183.770:15354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26756 comm="syz.1.7077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f676445d169 code=0x7ffc0000 [ 418.168996][ T30] audit: type=1326 audit(2000000183.770:15355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26756 comm="syz.1.7077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f676445d169 code=0x7ffc0000 [ 418.192770][ T30] audit: type=1326 audit(2000000183.770:15356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26756 comm="syz.1.7077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f676445d169 code=0x7ffc0000 [ 418.216454][ T30] audit: type=1326 audit(2000000183.770:15357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26756 comm="syz.1.7077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f676445d169 code=0x7ffc0000 [ 418.240692][ T30] audit: type=1326 audit(2000000183.770:15358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26756 comm="syz.1.7077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f676445d169 code=0x7ffc0000 [ 418.264356][ T30] audit: type=1326 audit(2000000183.770:15359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26756 comm="syz.1.7077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f676445d169 code=0x7ffc0000 [ 418.288465][ T30] audit: type=1326 audit(2000000183.770:15360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26756 comm="syz.1.7077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f676445d169 code=0x7ffc0000 [ 418.312669][ T30] audit: type=1326 audit(2000000183.770:15361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=26756 comm="syz.1.7077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f676445d169 code=0x7ffc0000 [ 418.373768][T26773] FAULT_INJECTION: forcing a failure. [ 418.373768][T26773] name failslab, interval 1, probability 0, space 0, times 0 [ 418.377000][T26775] 9p: Unknown access argument : -22 [ 418.386462][T26773] CPU: 0 UID: 0 PID: 26773 Comm: syz.9.7013 Not tainted 6.14.0-rc7-syzkaller-00074-ga7f2e10ecd8f #0 [ 418.386496][T26773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 418.386514][T26773] Call Trace: [ 418.386524][T26773] [ 418.386536][T26773] dump_stack_lvl+0xf2/0x150 [ 418.386574][T26773] dump_stack+0x15/0x1a [ 418.386633][T26773] should_fail_ex+0x24a/0x260 [ 418.386674][T26773] should_failslab+0x8f/0xb0 [ 418.386713][T26773] kmem_cache_alloc_node_noprof+0x59/0x320 [ 418.386799][T26773] ? __alloc_skb+0x10b/0x310 [ 418.386830][T26773] __alloc_skb+0x10b/0x310 [ 418.386855][T26773] ? __rcu_read_unlock+0x4e/0x70 [ 418.387026][T26773] alloc_skb_with_frags+0x80/0x450 [ 418.387060][T26773] ? avc_has_perm+0xd4/0x160 [ 418.387153][T26773] ? ref_tracker_alloc+0x1f5/0x2f0 [ 418.387191][T26773] sock_alloc_send_pskb+0x435/0x4f0 [ 418.387232][T26773] ? __rcu_read_unlock+0x4e/0x70 [ 418.387261][T26773] ? __rcu_read_unlock+0x4e/0x70 [ 418.387310][T26773] packet_sendmsg+0x2469/0x3690 [ 418.387427][T26773] ? terminate_walk+0x260/0x280 [ 418.387468][T26773] ? __rcu_read_unlock+0x4e/0x70 [ 418.387602][T26773] ? avc_has_perm+0xd4/0x160 [ 418.387629][T26773] ? selinux_socket_sendmsg+0x185/0x1c0 [ 418.387668][T26773] ? __pfx_packet_sendmsg+0x10/0x10 [ 418.387710][T26773] __sock_sendmsg+0x140/0x180 [ 418.387751][T26773] __sys_sendto+0x1a8/0x230 [ 418.387829][T26773] __x64_sys_sendto+0x78/0x90 [ 418.387859][T26773] x64_sys_call+0x29fa/0x2dc0 [ 418.387894][T26773] do_syscall_64+0xc9/0x1c0 [ 418.387937][T26773] ? clear_bhb_loop+0x55/0xb0 [ 418.388045][T26773] ? clear_bhb_loop+0x55/0xb0 [ 418.388080][T26773] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 418.388115][T26773] RIP: 0033:0x7fb103c1d169 [ 418.388136][T26773] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 418.388159][T26773] RSP: 002b:00007fb102287038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 418.388183][T26773] RAX: ffffffffffffffda RBX: 00007fb103e35fa0 RCX: 00007fb103c1d169 [ 418.388295][T26773] RDX: 000000000000000e RSI: 00002000000002c0 RDI: 0000000000000003 [ 418.388310][T26773] RBP: 00007fb102287090 R08: 00002000000000c0 R09: 0000000000000014 [ 418.388325][T26773] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 418.388340][T26773] R13: 0000000000000000 R14: 00007fb103e35fa0 R15: 00007ffc0b15ca48 [ 418.388374][T26773] [ 418.759629][T26785] batadv1: entered allmulticast mode [ 419.243338][T26790] lo speed is unknown, defaulting to 1000 [ 419.347957][T26790] dummy0 speed is unknown, defaulting to 1000 [ 419.357879][T26802] lo speed is unknown, defaulting to 1000 [ 419.461058][T26802] dummy0 speed is unknown, defaulting to 1000 [ 419.521374][T26810] lo speed is unknown, defaulting to 1000 [ 419.603441][T26790] chnl_net:caif_netlink_parms(): no params data found [ 419.701197][T26810] dummy0 speed is unknown, defaulting to 1000 [ 419.732343][T11714] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 419.760215][T26790] bridge0: port 1(bridge_slave_0) entered blocking state [ 419.767424][T26790] bridge0: port 1(bridge_slave_0) entered disabled state [ 419.775596][T26790] bridge_slave_0: entered allmulticast mode [ 419.783597][T26790] bridge_slave_0: entered promiscuous mode [ 419.799478][T11714] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 419.825838][T26790] bridge0: port 2(bridge_slave_1) entered blocking state [ 419.833048][T26790] bridge0: port 2(bridge_slave_1) entered disabled state [ 419.840906][T26790] bridge_slave_1: entered allmulticast mode [ 419.847690][T26790] bridge_slave_1: entered promiscuous mode [ 419.862944][T11714] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 419.955609][T26790] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 419.975655][T11714] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 420.001388][T26790] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 420.084851][T26841] sctp: [Deprecated]: syz.8.7103 (pid 26841) Use of int in maxseg socket option. [ 420.084851][T26841] Use struct sctp_assoc_value instead [ 420.101691][T11714] bridge_slave_1: left allmulticast mode [ 420.107386][T11714] bridge_slave_1: left promiscuous mode [ 420.113239][T11714] bridge0: port 2(bridge_slave_1) entered disabled state [ 420.136223][T26841] hub 4-0:1.0: USB hub found [ 420.143902][T26841] hub 4-0:1.0: 8 ports detected [ 420.154197][T11714] bridge_slave_0: left allmulticast mode [ 420.159971][T11714] bridge_slave_0: left promiscuous mode [ 420.165665][T11714] bridge0: port 1(bridge_slave_0) entered disabled state [ 420.400220][T11714] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 420.410253][T11714] bond0 (unregistering): Released all slaves [ 420.419640][T26790] team0: Port device team_slave_0 added [ 420.430738][T26848] pim6reg: entered allmulticast mode [ 420.448780][T26790] team0: Port device team_slave_1 added [ 420.468606][T26852] pim6reg: left allmulticast mode [ 420.499420][T26790] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 420.506470][T26790] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 420.532506][T26790] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 420.558216][T26790] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 420.565290][T26790] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 420.591313][T26790] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 420.761600][T11714] hsr_slave_0: left promiscuous mode [ 420.776382][T11714] hsr_slave_1: left promiscuous mode [ 420.799647][T11714] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 420.807136][T11714] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 420.831192][T11714] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 420.838750][T11714] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 420.848627][T11714] veth1_macvtap: left promiscuous mode [ 420.854164][T11714] veth0_macvtap: left promiscuous mode [ 420.860242][T11714] veth1_vlan: left promiscuous mode [ 420.877617][T11714] veth0_vlan: left promiscuous mode [ 420.959447][T11714] team0 (unregistering): Port device team_slave_1 removed [ 420.969495][T11714] team0 (unregistering): Port device team_slave_0 removed [ 421.003648][T26790] hsr_slave_0: entered promiscuous mode [ 421.010721][T26790] hsr_slave_1: entered promiscuous mode [ 421.031205][T26897] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 421.044523][T26897] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 421.459414][T26915] pim6reg: entered allmulticast mode [ 421.465550][T26915] pim6reg: left allmulticast mode [ 421.789367][T26927] xt_CT: No such helper "snmp_trap" [ 421.947164][T26790] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 421.963280][T26790] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 422.003450][T26790] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 422.025325][T26790] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 422.059100][ C0] vcan0: j1939_tp_rxtimer: 0xffff888135dbae00: rx timeout, send abort [ 422.067342][ C0] vcan0: j1939_tp_rxtimer: 0xffff888135dbbc00: rx timeout, send abort [ 422.075789][ C0] vcan0: j1939_xtp_rx_abort_one: 0xffff888135dbae00: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 422.090202][ C0] vcan0: j1939_xtp_rx_abort_one: 0xffff888135dbbc00: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 422.471931][T26790] 8021q: adding VLAN 0 to HW filter on device bond0 [ 422.484699][T26790] 8021q: adding VLAN 0 to HW filter on device team0 [ 422.576831][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 422.584019][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 422.599766][T26940] xt_CT: No such helper "snmp_trap" [ 422.612017][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 422.619148][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 422.642621][T26951] __nla_validate_parse: 3 callbacks suppressed [ 422.642640][T26951] netlink: 830 bytes leftover after parsing attributes in process `syz.1.7128'. [ 422.658075][T26951] bond_slave_0: entered promiscuous mode [ 422.681477][T26790] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 422.692041][T26790] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 422.728010][T26951] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 422.892840][T26790] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 422.895029][T26968] sctp: [Deprecated]: syz.1.7130 (pid 26968) Use of int in maxseg socket option. [ 422.895029][T26968] Use struct sctp_assoc_value instead [ 422.936417][T26983] pim6reg: entered allmulticast mode [ 422.948386][T26983] pim6reg: left allmulticast mode [ 422.966876][T26968] hub 4-0:1.0: USB hub found [ 422.976652][T26968] hub 4-0:1.0: 8 ports detected [ 423.058890][T27006] futex_wake_op: syz.8.7134 tries to shift op by -1; fix this program [ 423.088691][ T30] kauditd_printk_skb: 110 callbacks suppressed [ 423.088783][ T30] audit: type=1326 audit(2000000188.720:15472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27004 comm="syz.8.7134" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4972fed169 code=0x7ffc0000 [ 423.155146][ T30] audit: type=1326 audit(2000000188.750:15473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27004 comm="syz.8.7134" exe="/root/syz-executor" sig=0 arch=c000003e syscall=154 compat=0 ip=0x7f4972fed169 code=0x7ffc0000 [ 423.169689][T26790] veth0_vlan: entered promiscuous mode [ 423.178940][ T30] audit: type=1326 audit(2000000188.750:15474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27004 comm="syz.8.7134" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4972fed169 code=0x7ffc0000 [ 423.207979][ T30] audit: type=1326 audit(2000000188.750:15475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27004 comm="syz.8.7134" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4972fed169 code=0x7ffc0000 [ 423.210134][T26790] veth1_vlan: entered promiscuous mode [ 423.231583][ T30] audit: type=1326 audit(2000000188.750:15476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27004 comm="syz.8.7134" exe="/root/syz-executor" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7f4972fed169 code=0x7ffc0000 [ 423.260622][ T30] audit: type=1326 audit(2000000188.770:15477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27004 comm="syz.8.7134" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4972fed169 code=0x7ffc0000 [ 423.284303][ T30] audit: type=1326 audit(2000000188.770:15478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27004 comm="syz.8.7134" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4972fed169 code=0x7ffc0000 [ 423.310909][ T30] audit: type=1326 audit(2000000188.900:15479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27004 comm="syz.8.7134" exe="/root/syz-executor" sig=0 arch=c000003e syscall=304 compat=0 ip=0x7f4972fed169 code=0x7ffc0000 [ 423.334723][ T30] audit: type=1326 audit(2000000188.900:15480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27004 comm="syz.8.7134" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4972fed169 code=0x7ffc0000 [ 423.358635][ T30] audit: type=1326 audit(2000000188.900:15481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27004 comm="syz.8.7134" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4972fed169 code=0x7ffc0000 [ 423.401911][T26790] veth0_macvtap: entered promiscuous mode [ 423.410379][T26790] veth1_macvtap: entered promiscuous mode [ 423.432167][T27030] pim6reg: entered allmulticast mode [ 423.441812][T27030] pim6reg: left allmulticast mode [ 423.457647][T26790] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 423.468268][T26790] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 423.478181][T26790] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 423.488833][T26790] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 423.498846][T26790] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 423.509356][T26790] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 423.519292][T26790] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 423.529761][T26790] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 423.539627][T26790] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 423.550091][T26790] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 423.566946][T26790] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 423.578175][T26790] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 423.588730][T26790] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 423.598676][T26790] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 423.609153][T26790] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 423.618998][T26790] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 423.629529][T26790] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 423.639451][T26790] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 423.649965][T26790] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 423.659819][T26790] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 423.670284][T26790] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 423.681499][T26790] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 423.690426][T26790] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 423.699190][T26790] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 423.707965][T26790] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 423.716697][T26790] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 423.784281][T27045] netlink: 4 bytes leftover after parsing attributes in process `syz.9.7143'. [ 423.804599][T27045] bond0: (slave bond_slave_1): Releasing backup interface [ 423.831346][T27053] netlink: 'syz.7.7088': attribute type 29 has an invalid length. [ 423.841918][T27049] pim6reg: entered allmulticast mode [ 423.850868][T27049] pim6reg: left allmulticast mode [ 423.958113][T27063] sctp: [Deprecated]: syz.9.7149 (pid 27063) Use of int in maxseg socket option. [ 423.958113][T27063] Use struct sctp_assoc_value instead [ 423.976395][T27063] hub 4-0:1.0: USB hub found [ 423.982796][T27063] hub 4-0:1.0: 8 ports detected [ 424.782971][T27080] lo speed is unknown, defaulting to 1000 [ 424.815948][T27080] dummy0 speed is unknown, defaulting to 1000 [ 424.867269][T27076] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 424.887606][T27076] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 424.989079][T27079] xt_CT: No such helper "snmp_trap" [ 425.668763][T27124] FAULT_INJECTION: forcing a failure. [ 425.668763][T27124] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 425.681934][T27124] CPU: 1 UID: 0 PID: 27124 Comm: syz.9.7168 Not tainted 6.14.0-rc7-syzkaller-00074-ga7f2e10ecd8f #0 [ 425.681991][T27124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 425.682008][T27124] Call Trace: [ 425.682016][T27124] [ 425.682026][T27124] dump_stack_lvl+0xf2/0x150 [ 425.682058][T27124] dump_stack+0x15/0x1a [ 425.682139][T27124] should_fail_ex+0x24a/0x260 [ 425.682215][T27124] should_fail+0xb/0x10 [ 425.682259][T27124] should_fail_usercopy+0x1a/0x20 [ 425.682296][T27124] _copy_to_user+0x20/0xa0 [ 425.682334][T27124] simple_read_from_buffer+0xa0/0x110 [ 425.682478][T27124] proc_fail_nth_read+0xf9/0x140 [ 425.682522][T27124] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 425.682577][T27124] vfs_read+0x19b/0x6f0 [ 425.682606][T27124] ? __rcu_read_unlock+0x4e/0x70 [ 425.682634][T27124] ? __fget_files+0x17c/0x1c0 [ 425.682685][T27124] ksys_read+0xe8/0x1b0 [ 425.682718][T27124] __x64_sys_read+0x42/0x50 [ 425.682752][T27124] x64_sys_call+0x2874/0x2dc0 [ 425.682777][T27124] do_syscall_64+0xc9/0x1c0 [ 425.682836][T27124] ? clear_bhb_loop+0x55/0xb0 [ 425.682917][T27124] ? clear_bhb_loop+0x55/0xb0 [ 425.682943][T27124] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 425.683038][T27124] RIP: 0033:0x7fb103c1bb7c [ 425.683056][T27124] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 425.683078][T27124] RSP: 002b:00007fb102287030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 425.683095][T27124] RAX: ffffffffffffffda RBX: 00007fb103e35fa0 RCX: 00007fb103c1bb7c [ 425.683168][T27124] RDX: 000000000000000f RSI: 00007fb1022870a0 RDI: 0000000000000004 [ 425.683179][T27124] RBP: 00007fb102287090 R08: 0000000000000000 R09: 0000000000000000 [ 425.683193][T27124] R10: 0000000008800000 R11: 0000000000000246 R12: 0000000000000001 [ 425.683207][T27124] R13: 0000000000000000 R14: 00007fb103e35fa0 R15: 00007ffc0b15ca48 [ 425.683230][T27124] [ 426.026255][T27138] futex_wake_op: syz.7.7174 tries to shift op by -1; fix this program [ 426.040139][T27140] pim6reg: entered allmulticast mode [ 426.048050][T27140] pim6reg: left allmulticast mode [ 426.339603][T27153] infiniband syz!: set active [ 426.344362][T27153] infiniband syz!: added team_slave_0 [ 426.438181][T27153] RDS/IB: syz!: added [ 426.452554][T27153] smc: adding ib device syz! with port count 1 [ 426.470339][T27153] smc: ib device syz! port 1 has pnetid [ 426.611549][T27174] veth0_vlan: entered allmulticast mode [ 426.856135][T27183] FAULT_INJECTION: forcing a failure. [ 426.856135][T27183] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 426.869345][T27183] CPU: 1 UID: 0 PID: 27183 Comm: syz.7.7188 Not tainted 6.14.0-rc7-syzkaller-00074-ga7f2e10ecd8f #0 [ 426.869373][T27183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 426.869386][T27183] Call Trace: [ 426.869414][T27183] [ 426.869422][T27183] dump_stack_lvl+0xf2/0x150 [ 426.869456][T27183] dump_stack+0x15/0x1a [ 426.869479][T27183] should_fail_ex+0x24a/0x260 [ 426.869513][T27183] should_fail+0xb/0x10 [ 426.869545][T27183] should_fail_usercopy+0x1a/0x20 [ 426.869619][T27183] _copy_to_user+0x20/0xa0 [ 426.869644][T27183] simple_read_from_buffer+0xa0/0x110 [ 426.869679][T27183] proc_fail_nth_read+0xf9/0x140 [ 426.869717][T27183] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 426.869750][T27183] vfs_read+0x19b/0x6f0 [ 426.869859][T27183] ? __rcu_read_unlock+0x4e/0x70 [ 426.869887][T27183] ? __fget_files+0x17c/0x1c0 [ 426.869928][T27183] ksys_read+0xe8/0x1b0 [ 426.869960][T27183] __x64_sys_read+0x42/0x50 [ 426.870005][T27183] x64_sys_call+0x2874/0x2dc0 [ 426.870091][T27183] do_syscall_64+0xc9/0x1c0 [ 426.870143][T27183] ? clear_bhb_loop+0x55/0xb0 [ 426.870245][T27183] ? clear_bhb_loop+0x55/0xb0 [ 426.870279][T27183] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 426.870378][T27183] RIP: 0033:0x7f0374a9bb7c [ 426.870394][T27183] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 426.870412][T27183] RSP: 002b:00007f0373107030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 426.870431][T27183] RAX: ffffffffffffffda RBX: 00007f0374cb5fa0 RCX: 00007f0374a9bb7c [ 426.870444][T27183] RDX: 000000000000000f RSI: 00007f03731070a0 RDI: 0000000000000007 [ 426.870456][T27183] RBP: 00007f0373107090 R08: 0000000000000000 R09: 0000000000000000 [ 426.870468][T27183] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 426.870547][T27183] R13: 0000000000000000 R14: 00007f0374cb5fa0 R15: 00007ffdfbe76748 [ 426.870567][T27183] [ 427.096027][T27185] pim6reg: entered allmulticast mode [ 427.123487][T27185] pim6reg: left allmulticast mode [ 427.314732][T27207] pim6reg: entered allmulticast mode [ 427.353891][T27207] pim6reg: left allmulticast mode [ 427.541161][T27246] pim6reg: entered allmulticast mode [ 427.546895][T27218] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 427.547556][T27246] pim6reg: left allmulticast mode [ 427.555583][T27218] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 427.578126][T27251] hub 4-0:1.0: USB hub found [ 427.583020][T27251] hub 4-0:1.0: 8 ports detected [ 427.664046][T27255] lo speed is unknown, defaulting to 1000 [ 427.742847][T27255] dummy0 speed is unknown, defaulting to 1000 [ 428.360262][T27331] 9p: Unknown access argument : -22 [ 428.957811][T27381] netlink: 'syz.8.7223': attribute type 3 has an invalid length. [ 429.579342][T27381] syz.8.7223 (27381) used greatest stack depth: 9072 bytes left [ 429.598433][T27405] 9p: Unknown access argument : -22 [ 430.351341][T27445] xt_CT: No such helper "snmp_trap" [ 430.517987][T27450] hub 2-0:1.0: USB hub found [ 430.551827][T27450] hub 2-0:1.0: 8 ports detected [ 430.562738][ T30] kauditd_printk_skb: 281 callbacks suppressed [ 430.562761][ T30] audit: type=1326 audit(2000000196.140:15763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27449 comm="syz.6.7255" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a6ce1d169 code=0x7ffc0000 [ 430.592671][ T30] audit: type=1326 audit(2000000196.140:15764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27449 comm="syz.6.7255" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a6ce1d169 code=0x7ffc0000 [ 430.616664][ T30] audit: type=1326 audit(2000000196.140:15765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27449 comm="syz.6.7255" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f4a6ce1d169 code=0x7ffc0000 [ 430.640232][ T30] audit: type=1326 audit(2000000196.140:15766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27449 comm="syz.6.7255" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a6ce1d169 code=0x7ffc0000 [ 430.663942][ T30] audit: type=1326 audit(2000000196.140:15767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27449 comm="syz.6.7255" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a6ce1d169 code=0x7ffc0000 [ 430.687603][ T30] audit: type=1326 audit(2000000196.140:15768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27449 comm="syz.6.7255" exe="/root/syz-executor" sig=0 arch=c000003e syscall=239 compat=0 ip=0x7f4a6ce1d169 code=0x7ffc0000 [ 430.703433][T27454] vlan0: entered promiscuous mode [ 430.711216][ T30] audit: type=1326 audit(2000000196.140:15769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27449 comm="syz.6.7255" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a6ce1d169 code=0x7ffc0000 [ 430.722815][T27454] netlink: 4 bytes leftover after parsing attributes in process `syz.6.7257'. [ 430.739980][ T30] audit: type=1326 audit(2000000196.150:15770): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27449 comm="syz.6.7255" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a6ce1d169 code=0x7ffc0000 [ 430.772651][ T30] audit: type=1326 audit(2000000196.150:15771): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27449 comm="syz.6.7255" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f4a6ce1d169 code=0x7ffc0000 [ 430.787033][T27455] netlink: 'syz.6.7257': attribute type 7 has an invalid length. [ 430.797458][ T30] audit: type=1326 audit(2000000196.250:15772): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27449 comm="syz.6.7255" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a6ce1d169 code=0x7ffc0000 [ 430.831506][T27454] vlan0 (unregistering): left promiscuous mode [ 431.029917][T27377] syz.8.7223 (27377) used greatest stack depth: 6208 bytes left [ 431.090322][T27482] vlan0: entered promiscuous mode [ 431.108120][T27482] netlink: 4 bytes leftover after parsing attributes in process `syz.8.7267'. [ 431.283464][T27491] 9p: Unknown access argument : -22 [ 431.312437][T27487] netlink: 'syz.8.7267': attribute type 13 has an invalid length. [ 431.320667][T27482] vlan0 (unregistering): left promiscuous mode [ 431.364356][T27496] netlink: 'syz.8.7267': attribute type 7 has an invalid length. [ 431.472907][T27487] 8021q: adding VLAN 0 to HW filter on device $H [ 431.579493][T27487] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 431.617683][T27502] hub 4-0:1.0: USB hub found [ 431.626827][T27502] hub 4-0:1.0: 8 ports detected [ 431.749195][T27516] binfmt_misc: register: failed to install interpreter file ./file0 [ 431.815333][T27522] 9p: Unknown access argument : -22 [ 432.014276][T27535] FAULT_INJECTION: forcing a failure. [ 432.014276][T27535] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 432.027432][T27535] CPU: 0 UID: 0 PID: 27535 Comm: syz.1.7291 Not tainted 6.14.0-rc7-syzkaller-00074-ga7f2e10ecd8f #0 [ 432.027462][T27535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 432.027478][T27535] Call Trace: [ 432.027485][T27535] [ 432.027493][T27535] dump_stack_lvl+0xf2/0x150 [ 432.027662][T27535] dump_stack+0x15/0x1a [ 432.027685][T27535] should_fail_ex+0x24a/0x260 [ 432.027723][T27535] should_fail+0xb/0x10 [ 432.027752][T27535] should_fail_usercopy+0x1a/0x20 [ 432.027850][T27535] strncpy_from_user+0x25/0x210 [ 432.027876][T27535] ? kmem_cache_alloc_noprof+0x18e/0x320 [ 432.027919][T27535] ? getname_flags+0x81/0x3b0 [ 432.027958][T27535] getname_flags+0xb0/0x3b0 [ 432.028042][T27535] getname+0x17/0x20 [ 432.028057][T27535] __se_sys_statx+0x5b/0x190 [ 432.028077][T27535] ? putname+0xcf/0xf0 [ 432.028094][T27535] ? __fget_files+0x17c/0x1c0 [ 432.028131][T27535] ? fput+0x1c4/0x200 [ 432.028166][T27535] ? ksys_write+0x176/0x1b0 [ 432.028197][T27535] __x64_sys_statx+0x67/0x80 [ 432.028219][T27535] x64_sys_call+0x1031/0x2dc0 [ 432.028249][T27535] do_syscall_64+0xc9/0x1c0 [ 432.028285][T27535] ? clear_bhb_loop+0x55/0xb0 [ 432.028323][T27535] ? clear_bhb_loop+0x55/0xb0 [ 432.028391][T27535] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 432.028419][T27535] RIP: 0033:0x7f676445d169 [ 432.028512][T27535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 432.028534][T27535] RSP: 002b:00007f6762ac7038 EFLAGS: 00000246 ORIG_RAX: 000000000000014c [ 432.028561][T27535] RAX: ffffffffffffffda RBX: 00007f6764675fa0 RCX: 00007f676445d169 [ 432.028573][T27535] RDX: 0000000000006000 RSI: 0000000000000000 RDI: ffffffffffffff9c [ 432.028585][T27535] RBP: 00007f6762ac7090 R08: 0000000000000000 R09: 0000000000000000 [ 432.028597][T27535] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000001 [ 432.028609][T27535] R13: 0000000000000000 R14: 00007f6764675fa0 R15: 00007ffd93140df8 [ 432.028631][T27535] [ 432.115962][T27533] sctp: [Deprecated]: syz.8.7290 (pid 27533) Use of int in maxseg socket option. [ 432.115962][T27533] Use struct sctp_assoc_value instead [ 432.286214][T27533] hub 4-0:1.0: USB hub found [ 432.293172][T27533] hub 4-0:1.0: 8 ports detected [ 432.953368][T27560] 9p: Unknown access argument : -22 [ 433.173712][T27557] xt_CT: No such helper "snmp_trap" [ 433.442853][T27577] hub 4-0:1.0: USB hub found [ 433.458069][T27577] hub 4-0:1.0: 8 ports detected [ 433.702023][T27590] 9p: Unknown access argument : -22 [ 433.790882][T27597] FAULT_INJECTION: forcing a failure. [ 433.790882][T27597] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 433.805129][T27597] CPU: 0 UID: 0 PID: 27597 Comm: syz.8.7315 Not tainted 6.14.0-rc7-syzkaller-00074-ga7f2e10ecd8f #0 [ 433.805157][T27597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 433.805169][T27597] Call Trace: [ 433.805175][T27597] [ 433.805181][T27597] dump_stack_lvl+0xf2/0x150 [ 433.805209][T27597] dump_stack+0x15/0x1a [ 433.805231][T27597] should_fail_ex+0x24a/0x260 [ 433.805307][T27597] should_fail_alloc_page+0xfd/0x110 [ 433.805346][T27597] __alloc_frozen_pages_noprof+0x109/0x340 [ 433.805453][T27597] alloc_pages_mpol+0xb4/0x260 [ 433.805486][T27597] folio_alloc_mpol_noprof+0x36/0x80 [ 433.805516][T27597] shmem_get_folio_gfp+0x3d1/0xd90 [ 433.805562][T27597] shmem_write_begin+0xa2/0x180 [ 433.805583][T27597] generic_perform_write+0x187/0x4a0 [ 433.805612][T27597] shmem_file_write_iter+0xc2/0xe0 [ 433.805689][T27597] do_iter_readv_writev+0x403/0x4b0 [ 433.805721][T27597] vfs_writev+0x2d9/0x880 [ 433.805740][T27597] ? proc_fail_nth_write+0x12a/0x150 [ 433.805796][T27597] __se_sys_pwritev2+0x100/0x1c0 [ 433.805828][T27597] __x64_sys_pwritev2+0x78/0x90 [ 433.805865][T27597] x64_sys_call+0x2afe/0x2dc0 [ 433.805953][T27597] do_syscall_64+0xc9/0x1c0 [ 433.806016][T27597] ? clear_bhb_loop+0x55/0xb0 [ 433.806047][T27597] ? clear_bhb_loop+0x55/0xb0 [ 433.806078][T27597] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 433.806103][T27597] RIP: 0033:0x7f4972fed169 [ 433.806191][T27597] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 433.806209][T27597] RSP: 002b:00007f4971651038 EFLAGS: 00000246 ORIG_RAX: 0000000000000148 [ 433.806250][T27597] RAX: ffffffffffffffda RBX: 00007f4973205fa0 RCX: 00007f4972fed169 [ 433.806265][T27597] RDX: 0000000000000001 RSI: 0000200000000240 RDI: 0000000000000005 [ 433.806278][T27597] RBP: 00007f4971651090 R08: 0000000000000000 R09: 0000000000000003 [ 433.806289][T27597] R10: 0000000000007000 R11: 0000000000000246 R12: 0000000000000001 [ 433.806301][T27597] R13: 0000000000000000 R14: 00007f4973205fa0 R15: 00007ffe4faf9d68 [ 433.806320][T27597] [ 434.079137][T27607] netlink: 108 bytes leftover after parsing attributes in process `syz.6.7316'. [ 434.612795][T27626] xt_CT: No such helper "snmp_trap" [ 434.812789][T27632] sctp: [Deprecated]: syz.6.7326 (pid 27632) Use of int in maxseg socket option. [ 434.812789][T27632] Use struct sctp_assoc_value instead [ 434.849405][T27632] hub 4-0:1.0: USB hub found [ 434.867845][T27632] hub 4-0:1.0: 8 ports detected [ 435.056810][T27642] pim6reg: entered allmulticast mode [ 435.063064][T27642] pim6reg: left allmulticast mode [ 435.776863][T27656] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 435.787248][T27656] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 435.981941][T27673] binfmt_misc: register: failed to install interpreter file ./file0 [ 436.046943][ T30] kauditd_printk_skb: 52 callbacks suppressed [ 436.046961][ T30] audit: type=1326 audit(2000000201.670:15825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27680 comm="syz.6.7345" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a6ce1d169 code=0x7ffc0000 [ 436.082647][ T30] audit: type=1326 audit(2000000201.710:15826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27680 comm="syz.6.7345" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f4a6ce1d169 code=0x7ffc0000 [ 436.104881][T27683] 9p: Unknown access argument : -22 [ 436.106355][ T30] audit: type=1326 audit(2000000201.710:15827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27680 comm="syz.6.7345" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a6ce1d169 code=0x7ffc0000 [ 436.135860][ T30] audit: type=1326 audit(2000000201.710:15828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27680 comm="syz.6.7345" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a6ce1d169 code=0x7ffc0000 [ 436.160441][ T30] audit: type=1326 audit(2000000201.790:15829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27680 comm="syz.6.7345" exe="/root/syz-executor" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7f4a6ce1d169 code=0x7ffc0000 [ 436.184092][ T30] audit: type=1326 audit(2000000201.790:15830): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27680 comm="syz.6.7345" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a6ce1d169 code=0x7ffc0000 [ 436.186305][T27681] futex_wake_op: syz.6.7345 tries to shift op by -1; fix this program [ 436.208033][ T30] audit: type=1326 audit(2000000201.790:15831): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27680 comm="syz.6.7345" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a6ce1d169 code=0x7ffc0000 [ 436.240784][ T30] audit: type=1326 audit(2000000201.810:15832): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27680 comm="syz.6.7345" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f4a6ce1d169 code=0x7ffc0000 [ 436.264461][ T30] audit: type=1326 audit(2000000201.810:15833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27680 comm="syz.6.7345" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a6ce1d169 code=0x7ffc0000 [ 436.288231][ T30] audit: type=1326 audit(2000000201.810:15834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27680 comm="syz.6.7345" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a6ce1d169 code=0x7ffc0000 [ 436.311890][ C1] vcan0: j1939_tp_rxtimer: 0xffff8881138cb600: rx timeout, send abort [ 436.311953][ C1] vcan0: j1939_tp_rxtimer: 0xffff8881138cb800: rx timeout, send abort [ 436.320195][ C1] vcan0: j1939_xtp_rx_abort_one: 0xffff8881138cb600: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 436.320245][ C1] vcan0: j1939_xtp_rx_abort_one: 0xffff8881138cb800: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 436.468433][T27703] FAULT_INJECTION: forcing a failure. [ 436.468433][T27703] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 436.481762][T27703] CPU: 1 UID: 0 PID: 27703 Comm: syz.8.7354 Not tainted 6.14.0-rc7-syzkaller-00074-ga7f2e10ecd8f #0 [ 436.481791][T27703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 436.481803][T27703] Call Trace: [ 436.481811][T27703] [ 436.481820][T27703] dump_stack_lvl+0xf2/0x150 [ 436.481872][T27703] dump_stack+0x15/0x1a [ 436.481899][T27703] should_fail_ex+0x24a/0x260 [ 436.481942][T27703] should_fail+0xb/0x10 [ 436.481973][T27703] should_fail_usercopy+0x1a/0x20 [ 436.482081][T27703] strncpy_from_user+0x25/0x210 [ 436.482114][T27703] path_getxattrat+0xb3/0x290 [ 436.482157][T27703] __x64_sys_lgetxattr+0x5f/0x70 [ 436.482209][T27703] x64_sys_call+0x2720/0x2dc0 [ 436.482240][T27703] do_syscall_64+0xc9/0x1c0 [ 436.482351][T27703] ? clear_bhb_loop+0x55/0xb0 [ 436.482464][T27703] ? clear_bhb_loop+0x55/0xb0 [ 436.482492][T27703] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 436.482519][T27703] RIP: 0033:0x7f4972fed169 [ 436.482534][T27703] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 436.482557][T27703] RSP: 002b:00007f4971651038 EFLAGS: 00000246 ORIG_RAX: 00000000000000c0 [ 436.482579][T27703] RAX: ffffffffffffffda RBX: 00007f4973205fa0 RCX: 00007f4972fed169 [ 436.482631][T27703] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 0000200000000040 [ 436.482647][T27703] RBP: 00007f4971651090 R08: 0000000000000000 R09: 0000000000000000 [ 436.482664][T27703] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 436.482678][T27703] R13: 0000000000000000 R14: 00007f4973205fa0 R15: 00007ffe4faf9d68 [ 436.482703][T27703] [ 436.513284][T27709] futex_wake_op: syz.6.7356 tries to shift op by -1; fix this program [ 436.774354][T27721] bond0: option resend_igmp: invalid value (37005) [ 436.774388][T11714] bond0: (slave bond_slave_0): interface is now down [ 436.774421][T11714] bond0: (slave bond_slave_1): interface is now down [ 436.787539][T11714] bond0: (slave bond_slave_0): interface is now down [ 436.787841][T27721] bond0: option resend_igmp: allowed values 0 - 255 [ 436.794463][T11714] bond0: (slave bond_slave_1): interface is now down [ 436.824282][T11714] bond0: now running without any active interface! [ 436.924016][T27726] binfmt_misc: register: failed to install interpreter file ./file0 [ 437.122994][ T3447] IPVS: starting estimator thread 0... [ 437.198306][T27754] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 437.227573][T27750] IPVS: using max 2304 ests per chain, 115200 per kthread [ 437.929001][T27800] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 438.013442][T27811] futex_wake_op: syz.6.7392 tries to shift op by -1; fix this program [ 438.317965][ C0] vcan0: j1939_tp_rxtimer: 0xffff8881327bf000: rx timeout, send abort [ 438.326220][ C0] vcan0: j1939_tp_rxtimer: 0xffff8881327bf200: rx timeout, send abort [ 438.337494][ C0] vcan0: j1939_xtp_rx_abort_one: 0xffff8881327bf000: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 438.351842][ C0] vcan0: j1939_xtp_rx_abort_one: 0xffff8881327bf200: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 438.718002][T27851] xt_CT: No such helper "snmp_trap" [ 438.779037][T27856] syz!: rxe_newlink: already configured on team_slave_0 [ 439.062949][T27858] lo speed is unknown, defaulting to 1000 [ 439.097686][T27858] dummy0 speed is unknown, defaulting to 1000 [ 439.988599][T27866] lo speed is unknown, defaulting to 1000 [ 440.021847][T27866] dummy0 speed is unknown, defaulting to 1000 [ 441.160779][ T30] kauditd_printk_skb: 66 callbacks suppressed [ 441.160797][ T30] audit: type=1400 audit(2000000206.790:15901): avc: granted { setsecparam } for pid=27853 comm="syz.9.7407" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 441.282817][T27886] sctp: [Deprecated]: syz.6.7415 (pid 27886) Use of int in maxseg socket option. [ 441.282817][T27886] Use struct sctp_assoc_value instead [ 441.342272][T27886] hub 4-0:1.0: USB hub found [ 441.364568][T27886] hub 4-0:1.0: 8 ports detected [ 441.467175][ T30] audit: type=1326 audit(2000000207.090:15902): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27910 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0374a9d169 code=0x7ffc0000 [ 441.490340][ T30] audit: type=1326 audit(2000000207.090:15903): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27910 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0374a9d169 code=0x7ffc0000 [ 441.513605][ T30] audit: type=1326 audit(2000000207.090:15904): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27910 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f0374a9d169 code=0x7ffc0000 [ 441.536824][ T30] audit: type=1326 audit(2000000207.090:15905): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27910 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f0374a9d1a3 code=0x7ffc0000 [ 441.577357][ T30] audit: type=1326 audit(2000000207.190:15906): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27910 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f0374a9bc1f code=0x7ffc0000 [ 441.600311][ T30] audit: type=1326 audit(2000000207.190:15907): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27910 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7f0374a9d1f7 code=0x7ffc0000 [ 441.623401][ T30] audit: type=1326 audit(2000000207.190:15908): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27910 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f0374a9bad0 code=0x7ffc0000 [ 441.646624][ T30] audit: type=1326 audit(2000000207.190:15909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27910 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f0374a9bdca code=0x7ffc0000 [ 441.669729][ T30] audit: type=1326 audit(2000000207.200:15910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27910 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0374a9d169 code=0x7ffc0000 [ 441.709487][T27913] FAULT_INJECTION: forcing a failure. [ 441.709487][T27913] name failslab, interval 1, probability 0, space 0, times 0 [ 441.722261][T27913] CPU: 0 UID: 0 PID: 27913 Comm: syz.9.7429 Not tainted 6.14.0-rc7-syzkaller-00074-ga7f2e10ecd8f #0 [ 441.722364][T27913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 441.722379][T27913] Call Trace: [ 441.722386][T27913] [ 441.722394][T27913] dump_stack_lvl+0xf2/0x150 [ 441.722422][T27913] dump_stack+0x15/0x1a [ 441.722516][T27913] should_fail_ex+0x24a/0x260 [ 441.722555][T27913] should_failslab+0x8f/0xb0 [ 441.722594][T27913] kmem_cache_alloc_noprof+0x52/0x320 [ 441.722618][T27913] ? __break_lease+0x7a/0xf60 [ 441.722682][T27913] __break_lease+0x7a/0xf60 [ 441.722721][T27913] ? security_inode_setxattr+0xcb/0x1f0 [ 441.722750][T27913] __vfs_setxattr_locked+0x12c/0x1d0 [ 441.722794][T27913] vfs_setxattr+0x140/0x290 [ 441.722845][T27913] file_setxattr+0x139/0x1b0 [ 441.722922][T27913] path_setxattrat+0x2c2/0x310 [ 441.722960][T27913] __x64_sys_fsetxattr+0x6d/0x80 [ 441.723007][T27913] x64_sys_call+0x29d2/0x2dc0 [ 441.723049][T27913] do_syscall_64+0xc9/0x1c0 [ 441.723087][T27913] ? clear_bhb_loop+0x55/0xb0 [ 441.723117][T27913] ? clear_bhb_loop+0x55/0xb0 [ 441.723154][T27913] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 441.723186][T27913] RIP: 0033:0x7fb103c1d169 [ 441.723205][T27913] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 441.723226][T27913] RSP: 002b:00007fb102287038 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 441.723267][T27913] RAX: ffffffffffffffda RBX: 00007fb103e35fa0 RCX: 00007fb103c1d169 [ 441.723280][T27913] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 441.723295][T27913] RBP: 00007fb102287090 R08: 0000000000000000 R09: 0000000000000000 [ 441.723326][T27913] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 441.723341][T27913] R13: 0000000000000000 R14: 00007fb103e35fa0 R15: 00007ffc0b15ca48 [ 441.723365][T27913] [ 441.979592][T27918] pim6reg: entered allmulticast mode [ 441.993119][T27918] pim6reg: left allmulticast mode [ 442.107034][T27928] syz!: rxe_newlink: already configured on team_slave_0 [ 442.109908][T27929] 9p: Unknown access argument : -22 [ 442.430517][T27957] FAULT_INJECTION: forcing a failure. [ 442.430517][T27957] name failslab, interval 1, probability 0, space 0, times 0 [ 442.443238][T27957] CPU: 1 UID: 0 PID: 27957 Comm: syz.8.7446 Not tainted 6.14.0-rc7-syzkaller-00074-ga7f2e10ecd8f #0 [ 442.443347][T27957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 442.443362][T27957] Call Trace: [ 442.443370][T27957] [ 442.443379][T27957] dump_stack_lvl+0xf2/0x150 [ 442.443411][T27957] dump_stack+0x15/0x1a [ 442.443436][T27957] should_fail_ex+0x24a/0x260 [ 442.443513][T27957] should_failslab+0x8f/0xb0 [ 442.443550][T27957] __kmalloc_cache_node_noprof+0x56/0x320 [ 442.443586][T27957] ? __get_vm_area_node+0xfb/0x1c0 [ 442.443669][T27957] __get_vm_area_node+0xfb/0x1c0 [ 442.443701][T27957] __vmalloc_node_range_noprof+0x280/0xe70 [ 442.443734][T27957] ? bpf_prog_alloc_no_stats+0x49/0x380 [ 442.443790][T27957] ? __rcu_read_unlock+0x4e/0x70 [ 442.443823][T27957] ? avc_has_perm_noaudit+0x1cc/0x210 [ 442.443851][T27957] ? selinux_capable+0x1f2/0x260 [ 442.443943][T27957] ? bpf_prog_alloc_no_stats+0x49/0x380 [ 442.443971][T27957] __vmalloc_noprof+0x5e/0x70 [ 442.444002][T27957] ? bpf_prog_alloc_no_stats+0x49/0x380 [ 442.444036][T27957] bpf_prog_alloc_no_stats+0x49/0x380 [ 442.444075][T27957] ? bpf_prog_alloc+0x28/0x150 [ 442.444107][T27957] bpf_prog_alloc+0x3a/0x150 [ 442.444137][T27957] bpf_prog_load+0x4d0/0x1050 [ 442.444183][T27957] __sys_bpf+0x463/0x7a0 [ 442.444300][T27957] __x64_sys_bpf+0x43/0x50 [ 442.444331][T27957] x64_sys_call+0x2914/0x2dc0 [ 442.444363][T27957] do_syscall_64+0xc9/0x1c0 [ 442.444418][T27957] ? clear_bhb_loop+0x55/0xb0 [ 442.444485][T27957] ? clear_bhb_loop+0x55/0xb0 [ 442.444585][T27957] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 442.444614][T27957] RIP: 0033:0x7f4972fed169 [ 442.444677][T27957] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 442.444699][T27957] RSP: 002b:00007f4971651038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 442.444718][T27957] RAX: ffffffffffffffda RBX: 00007f4973205fa0 RCX: 00007f4972fed169 [ 442.444798][T27957] RDX: 0000000000000094 RSI: 0000200000000380 RDI: 0000000000000005 [ 442.444811][T27957] RBP: 00007f4971651090 R08: 0000000000000000 R09: 0000000000000000 [ 442.444823][T27957] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 442.444835][T27957] R13: 0000000000000000 R14: 00007f4973205fa0 R15: 00007ffe4faf9d68 [ 442.444856][T27957] [ 442.444865][T27957] syz.8.7446: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null) [ 442.588913][T27955] sctp: [Deprecated]: syz.9.7445 (pid 27955) Use of int in maxseg socket option. [ 442.588913][T27955] Use struct sctp_assoc_value instead [ 442.591167][T27957] ,cpuset=/,mems_allowed=0 [ 442.591199][T27957] CPU: 1 UID: 0 PID: 27957 Comm: syz.8.7446 Not tainted 6.14.0-rc7-syzkaller-00074-ga7f2e10ecd8f #0 [ 442.591263][T27957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 442.591278][T27957] Call Trace: [ 442.591285][T27957] [ 442.591294][T27957] dump_stack_lvl+0xf2/0x150 [ 442.591330][T27957] dump_stack+0x15/0x1a [ 442.591400][T27957] warn_alloc+0x145/0x1b0 [ 442.591444][T27957] __vmalloc_node_range_noprof+0x2a5/0xe70 [ 442.591486][T27957] ? __rcu_read_unlock+0x4e/0x70 [ 442.591520][T27957] ? avc_has_perm_noaudit+0x1cc/0x210 [ 442.591571][T27957] ? selinux_capable+0x1f2/0x260 [ 442.591603][T27957] ? bpf_prog_alloc_no_stats+0x49/0x380 [ 442.591677][T27957] __vmalloc_noprof+0x5e/0x70 [ 442.591712][T27957] ? bpf_prog_alloc_no_stats+0x49/0x380 [ 442.591842][T27957] bpf_prog_alloc_no_stats+0x49/0x380 [ 442.591950][T27957] ? bpf_prog_alloc+0x28/0x150 [ 442.591986][T27957] bpf_prog_alloc+0x3a/0x150 [ 442.592023][T27957] bpf_prog_load+0x4d0/0x1050 [ 442.592122][T27957] __sys_bpf+0x463/0x7a0 [ 442.592167][T27957] __x64_sys_bpf+0x43/0x50 [ 442.592202][T27957] x64_sys_call+0x2914/0x2dc0 [ 442.592235][T27957] do_syscall_64+0xc9/0x1c0 [ 442.592279][T27957] ? clear_bhb_loop+0x55/0xb0 [ 442.592340][T27957] ? clear_bhb_loop+0x55/0xb0 [ 442.592438][T27957] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 442.592473][T27957] RIP: 0033:0x7f4972fed169 [ 442.592492][T27957] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 442.592516][T27957] RSP: 002b:00007f4971651038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 442.592546][T27957] RAX: ffffffffffffffda RBX: 00007f4973205fa0 RCX: 00007f4972fed169 [ 442.592584][T27957] RDX: 0000000000000094 RSI: 0000200000000380 RDI: 0000000000000005 [ 442.592600][T27957] RBP: 00007f4971651090 R08: 0000000000000000 R09: 0000000000000000 [ 442.592615][T27957] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 442.592631][T27957] R13: 0000000000000000 R14: 00007f4973205fa0 R15: 00007ffe4faf9d68 [ 442.592655][T27957] [ 442.592671][T27957] Mem-Info: [ 442.621707][T27961] netlink: 268 bytes leftover after parsing attributes in process `syz.7.7447'. [ 442.626018][T27957] active_anon:74094 inactive_anon:418 isolated_anon:0 [ 442.626018][T27957] active_file:5490 inactive_file:22187 isolated_file:0 [ 442.626018][T27957] unevictable:15 dirty:504 writeback:0 [ 442.626018][T27957] slab_reclaimable:3880 slab_unreclaimable:86149 [ 442.626018][T27957] mapped:29403 shmem:67554 pagetables:1733 [ 442.626018][T27957] sec_pagetables:0 bounce:0 [ 442.626018][T27957] kernel_misc_reclaimable:0 [ 442.626018][T27957] free:1731398 free_pcp:5992 free_cma:0 [ 442.783328][T27955] hub 4-0:1.0: USB hub found [ 442.787877][T27957] Node 0 active_anon:295448kB inactive_anon:1672kB active_file:21960kB inactive_file:88748kB unevictable:60kB isolated(anon):0kB isolated(file):0kB mapped:117728kB dirty:2016kB writeback:0kB shmem:269056kB writeback_tmp:0kB kernel_stack:3872kB pagetables:7284kB sec_pagetables:0kB all_unreclaimable? no [ 442.787940][T27957] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 442.788007][T27957] lowmem_reserve[]: 0 2885 7863 7863 [ 442.788076][T27957] Node 0 DMA32 free:2950724kB boost:0kB min:4136kB low:7068kB high:10000kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2954356kB mlocked:0kB bounce:0kB free_pcp:3632kB local_pcp:3532kB free_cma:0kB [ 442.788232][T27957] lowmem_reserve[]: 0 0 4978 4978 [ 442.788263][T27957] Node 0 Normal free:3958812kB boost:0kB min:7184kB low:12280kB high:17376kB reserved_highatomic:0KB active_anon:295448kB inactive_anon:1672kB active_file:21960kB inactive_file:88748kB unevictable:60kB writepending:2016kB present:5242880kB managed:5098208kB mlocked:60kB bounce:0kB free_pcp:21172kB local_pcp:4548kB free_cma:0kB [ 442.788339][T27957] lowmem_reserve[]: 0 0 0 0 [ 442.788394][T27957] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 442.788637][T27957] Node 0 DMA32: 3*4kB (M) 1*8kB (M) 1*16kB (M) 3*32kB (M) 3*64kB (M) 2*128kB (M) 2*256kB (M) 3*512kB (M) 3*1024kB (M) 2*2048kB (M) 718*4096kB (M) = 2950724kB [ 442.788892][T27957] Node 0 Normal: 22*4kB (ME) 2890*8kB (UME) 1804*16kB (UME) 445*32kB (UME) 703*64kB (UME) 323*128kB (UME) 102*256kB (UME) 151*512kB (UM) 108*1024kB (UM) 38*2048kB (UM) 858*4096kB (UME) = 3958856kB [ 442.789213][T27957] Node 0 hugepages_total=8 hugepages_free=0 hugepages_surp=4 hugepages_size=2048kB [ 442.789233][T27957] 95007 total pagecache pages [ 442.789242][T27957] 66 pages in swap cache [ 442.789250][T27957] Free swap = 81284kB [ 442.789259][T27957] Total swap = 124996kB [ 442.789267][T27957] 2097051 pages RAM [ 442.831305][T27955] hub 4-0:1.0: 8 ports detected [ 443.192252][T27957] 0 pages HighMem/MovableOnly [ 443.196931][T27957] 80070 pages reserved [ 443.340321][T28026] pim6reg: entered allmulticast mode [ 443.399382][T28026] pim6reg: left allmulticast mode [ 443.602432][T28051] netlink: 268 bytes leftover after parsing attributes in process `syz.7.7460'. [ 443.783161][T28077] bond0: option resend_igmp: invalid value (37005) [ 443.789956][T28077] bond0: option resend_igmp: allowed values 0 - 255 [ 443.796726][ T7863] bond0: (slave bond_slave_0): interface is now down [ 443.808723][ T7863] bond0: now running without any active interface! [ 443.872212][ T3447] IPVS: starting estimator thread 0... [ 444.027840][T28089] IPVS: using max 2400 ests per chain, 120000 per kthread [ 444.087649][T28100] lo speed is unknown, defaulting to 1000 [ 444.121101][T28100] dummy0 speed is unknown, defaulting to 1000 [ 444.379136][T28122] netlink: 268 bytes leftover after parsing attributes in process `syz.1.7474'. [ 444.706013][T28114] lo speed is unknown, defaulting to 1000 [ 444.796503][T28114] dummy0 speed is unknown, defaulting to 1000 [ 445.150043][T28114] chnl_net:caif_netlink_parms(): no params data found [ 445.272424][ T7863] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 445.297433][T28114] bridge0: port 1(bridge_slave_0) entered blocking state [ 445.304621][T28114] bridge0: port 1(bridge_slave_0) entered disabled state [ 445.316222][T28114] bridge_slave_0: entered allmulticast mode [ 445.323816][T28114] bridge_slave_0: entered promiscuous mode [ 445.333537][T28179] pim6reg: entered allmulticast mode [ 445.349477][ T7863] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 445.361138][T28179] pim6reg: left allmulticast mode [ 445.387581][T28114] bridge0: port 2(bridge_slave_1) entered blocking state [ 445.394686][T28114] bridge0: port 2(bridge_slave_1) entered disabled state [ 445.402746][T28114] bridge_slave_1: entered allmulticast mode [ 445.409397][T28114] bridge_slave_1: entered promiscuous mode [ 445.420708][ T7863] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 445.472342][T28114] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 445.488204][ T7863] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 445.542916][T28114] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 445.594825][T28186] futex_wake_op: syz.6.7488 tries to shift op by -1; fix this program [ 445.647395][ T7863] bridge_slave_1: left allmulticast mode [ 445.653146][ T7863] bridge_slave_1: left promiscuous mode [ 445.658896][ T7863] bridge0: port 2(bridge_slave_1) entered disabled state [ 445.666369][T28187] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7487'. [ 445.678271][ T7863] bridge_slave_0: left allmulticast mode [ 445.684006][ T7863] bridge_slave_0: left promiscuous mode [ 445.689842][ T7863] bridge0: port 1(bridge_slave_0) entered disabled state [ 445.835284][T28205] hub 4-0:1.0: USB hub found [ 445.856645][T28205] hub 4-0:1.0: 8 ports detected [ 446.065714][ T7863] $H (unregistering): (slave bond_slave_0): Releasing backup interface [ 446.079823][ T7863] bond_slave_0: left promiscuous mode [ 446.086278][ T7863] $H (unregistering): Released all slaves [ 446.097243][T28114] team0: Port device team_slave_0 added [ 446.104607][T28114] team0: Port device team_slave_1 added [ 446.135602][T28114] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 446.142666][T28114] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 446.168639][T28114] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 446.181538][T28114] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 446.188557][T28114] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 446.214598][T28114] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 446.252794][T28114] hsr_slave_0: entered promiscuous mode [ 446.259280][T28114] hsr_slave_1: entered promiscuous mode [ 446.265333][T28114] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 446.273790][T28114] Cannot create hsr debugfs directory [ 446.441391][T28215] xt_CT: No such helper "snmp_trap" [ 446.651551][T28238] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 446.658394][ T7863] hsr_slave_0: left promiscuous mode [ 446.668462][ T7863] hsr_slave_1: left promiscuous mode [ 446.685042][ T7863] veth1_macvtap: left promiscuous mode [ 446.690862][ T7863] veth0_macvtap: left promiscuous mode [ 446.707696][ T7863] veth1_vlan: left promiscuous mode [ 446.723330][ T7863] veth0_vlan: left promiscuous mode [ 446.856096][ T30] kauditd_printk_skb: 86 callbacks suppressed [ 446.856177][ T30] audit: type=1400 audit(2000000212.480:15997): avc: granted { setsecparam } for pid=28231 comm="syz.6.7499" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 446.945333][ T7863] team0 (unregistering): Port device team_slave_1 removed [ 446.955601][ T7863] team0 (unregistering): Port device team_slave_0 removed [ 447.046992][ T30] audit: type=1326 audit(2000000212.670:15998): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28278 comm="syz.6.7505" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a6ce1d169 code=0x7ffc0000 [ 447.125294][ T30] audit: type=1326 audit(2000000212.700:15999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28278 comm="syz.6.7505" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f4a6ce1d169 code=0x7ffc0000 [ 447.149061][ T30] audit: type=1326 audit(2000000212.700:16000): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28278 comm="syz.6.7505" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a6ce1d169 code=0x7ffc0000 [ 447.172669][ T30] audit: type=1326 audit(2000000212.710:16001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28278 comm="syz.6.7505" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f4a6ce1d169 code=0x7ffc0000 [ 447.196216][ T30] audit: type=1326 audit(2000000212.710:16002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28278 comm="syz.6.7505" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a6ce1d169 code=0x7ffc0000 [ 447.219906][ T30] audit: type=1326 audit(2000000212.710:16003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28278 comm="syz.6.7505" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a6ce1d169 code=0x7ffc0000 [ 447.243539][ T30] audit: type=1326 audit(2000000212.710:16004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28278 comm="syz.6.7505" exe="/root/syz-executor" sig=0 arch=c000003e syscall=425 compat=0 ip=0x7f4a6ce1d169 code=0x7ffc0000 [ 447.267232][ T30] audit: type=1326 audit(2000000212.710:16005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28278 comm="syz.6.7505" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4a6ce1d169 code=0x7ffc0000 [ 447.290843][ T30] audit: type=1326 audit(2000000212.710:16006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28278 comm="syz.6.7505" exe="/root/syz-executor" sig=0 arch=c000003e syscall=427 compat=0 ip=0x7f4a6ce1d169 code=0x7ffc0000 [ 447.406844][T28305] hub 4-0:1.0: USB hub found [ 447.436385][T28305] hub 4-0:1.0: 8 ports detected [ 447.460100][T28114] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 447.495384][T28114] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 447.508630][T28114] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 447.529599][T28114] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 447.567431][ T7863] IPVS: stop unused estimator thread 0... [ 447.700960][T28114] 8021q: adding VLAN 0 to HW filter on device bond0 [ 447.745459][T28114] 8021q: adding VLAN 0 to HW filter on device team0 [ 447.764429][ T1685] bridge0: port 1(bridge_slave_0) entered blocking state [ 447.771728][ T1685] bridge0: port 1(bridge_slave_0) entered forwarding state [ 447.814013][ T1039] IPVS: starting estimator thread 0... [ 447.835928][ T1685] bridge0: port 2(bridge_slave_1) entered blocking state [ 447.843065][ T1685] bridge0: port 2(bridge_slave_1) entered forwarding state [ 447.894289][T28114] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 447.904820][T28114] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 447.915583][T28339] IPVS: using max 2016 ests per chain, 100800 per kthread [ 448.059447][T28114] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 448.185421][T28350] tipc: Started in network mode [ 448.190572][T28350] tipc: Node identity 4, cluster identity 4711 [ 448.196755][T28350] tipc: Node number set to 4 [ 448.247315][T28114] veth0_vlan: entered promiscuous mode [ 448.259604][T28114] veth1_vlan: entered promiscuous mode [ 448.278986][T28114] veth0_macvtap: entered promiscuous mode [ 448.289063][T28114] veth1_macvtap: entered promiscuous mode [ 448.308103][T28114] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 448.318700][T28114] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 448.328598][T28114] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 448.339073][T28114] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 448.348926][T28114] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 448.359682][T28114] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 448.369765][T28114] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 448.380279][T28114] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 448.390179][T28114] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 448.400658][T28114] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 448.410507][T28114] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 448.420982][T28114] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 448.432647][T28114] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 448.441340][T28114] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 448.451909][T28114] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 448.461765][T28114] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 448.472221][T28114] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 448.482085][T28114] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 448.492540][T28114] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 448.502390][T28114] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 448.512849][T28114] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 448.522702][T28114] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 448.533291][T28114] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 448.543169][T28114] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 448.553626][T28114] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 448.564576][T28114] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 448.576466][T28114] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 448.585393][T28114] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 448.594175][T28114] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 448.601891][ C0] vcan0: j1939_tp_rxtimer: 0xffff888112eabc00: rx timeout, send abort [ 448.603036][T28114] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 448.611154][ C0] vcan0: j1939_tp_rxtimer: 0xffff888112eab200: rx timeout, send abort [ 448.628207][ C0] vcan0: j1939_xtp_rx_abort_one: 0xffff888112eabc00: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 448.642549][ C0] vcan0: j1939_xtp_rx_abort_one: 0xffff888112eab200: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 449.089856][T28466] sctp: [Deprecated]: syz.7.7518 (pid 28466) Use of int in maxseg socket option. [ 449.089856][T28466] Use struct sctp_assoc_value instead [ 449.108272][T28466] hub 4-0:1.0: USB hub found [ 449.115056][T28466] hub 4-0:1.0: 8 ports detected [ 449.292788][T28476] lo speed is unknown, defaulting to 1000 [ 449.345271][T28476] dummy0 speed is unknown, defaulting to 1000 [ 449.832405][T28462] lo speed is unknown, defaulting to 1000 [ 450.015768][T28488] syz!: rxe_newlink: already configured on team_slave_0 [ 450.082496][T28484] lo speed is unknown, defaulting to 1000 [ 450.115434][T28484] dummy0 speed is unknown, defaulting to 1000 [ 450.209450][T28462] dummy0 speed is unknown, defaulting to 1000 [ 450.802112][T28462] chnl_net:caif_netlink_parms(): no params data found [ 451.003640][T28522] pim6reg: entered allmulticast mode [ 451.019602][T28462] bridge0: port 1(bridge_slave_0) entered blocking state [ 451.026741][T28462] bridge0: port 1(bridge_slave_0) entered disabled state [ 451.036244][T28462] bridge_slave_0: entered allmulticast mode [ 451.048479][T28462] bridge_slave_0: entered promiscuous mode [ 451.055355][T28522] pim6reg: left allmulticast mode [ 451.079934][T28462] bridge0: port 2(bridge_slave_1) entered blocking state [ 451.087132][T28462] bridge0: port 2(bridge_slave_1) entered disabled state [ 451.112720][T28462] bridge_slave_1: entered allmulticast mode [ 451.123721][T28462] bridge_slave_1: entered promiscuous mode [ 451.170493][T28462] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 451.211044][T28462] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 451.314820][T28462] team0: Port device team_slave_0 added [ 451.332230][T28462] team0: Port device team_slave_1 added [ 451.395697][T28462] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 451.402784][T28462] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 451.428864][T28462] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 451.470178][T28462] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 451.477169][T28462] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 451.503280][T28462] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 451.556226][T28462] hsr_slave_0: entered promiscuous mode [ 451.564808][T28462] hsr_slave_1: entered promiscuous mode [ 451.573471][T28462] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 451.587571][T28462] Cannot create hsr debugfs directory [ 451.646335][T11714] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 451.716154][T11714] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 451.792137][T11714] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 451.842945][T11714] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 451.910023][T11714] bridge_slave_1: left allmulticast mode [ 451.915776][T11714] bridge_slave_1: left promiscuous mode [ 451.921572][T11714] bridge0: port 2(bridge_slave_1) entered disabled state [ 451.934562][T11714] bridge_slave_0: left promiscuous mode [ 451.940398][T11714] bridge0: port 1(bridge_slave_0) entered disabled state [ 452.013904][ T30] kauditd_printk_skb: 374 callbacks suppressed [ 452.013922][ T30] audit: type=1326 audit(2000000217.640:16381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28621 comm="syz.1.7543" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f676445d169 code=0x7ffc0000 [ 452.048583][ T30] audit: type=1326 audit(2000000217.670:16382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28621 comm="syz.1.7543" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f676445d169 code=0x7ffc0000 [ 452.072407][ T30] audit: type=1326 audit(2000000217.670:16383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28621 comm="syz.1.7543" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f676445d169 code=0x7ffc0000 [ 452.096121][ T30] audit: type=1326 audit(2000000217.670:16384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28621 comm="syz.1.7543" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f676445d169 code=0x7ffc0000 [ 452.120084][ T30] audit: type=1326 audit(2000000217.670:16385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28621 comm="syz.1.7543" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f676445d169 code=0x7ffc0000 [ 452.143686][ T30] audit: type=1326 audit(2000000217.670:16386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28621 comm="syz.1.7543" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f676445d169 code=0x7ffc0000 [ 452.167292][ T30] audit: type=1326 audit(2000000217.670:16387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28621 comm="syz.1.7543" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat=0 ip=0x7f676445d169 code=0x7ffc0000 [ 452.190908][ T30] audit: type=1326 audit(2000000217.670:16388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28621 comm="syz.1.7543" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f676445d169 code=0x7ffc0000 [ 452.214747][ T30] audit: type=1326 audit(2000000217.680:16389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28621 comm="syz.1.7543" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f676445d169 code=0x7ffc0000 [ 452.238603][ T30] audit: type=1326 audit(2000000217.680:16390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28621 comm="syz.1.7543" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f676445d169 code=0x7ffc0000 [ 452.370051][T11714] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 452.371537][ T10] IPVS: starting estimator thread 0... [ 452.385565][T11714] bond0 (unregistering): Released all slaves [ 452.403574][T28633] pim6reg: entered allmulticast mode [ 452.409181][T28667] pim6reg: left allmulticast mode [ 452.431949][T11714] tipc: Left network mode [ 452.451234][T28677] bond0: option resend_igmp: invalid value (37005) [ 452.457915][T28677] bond0: option resend_igmp: allowed values 0 - 255 [ 452.467568][T28674] IPVS: using max 1968 ests per chain, 98400 per kthread [ 452.556761][T11714] hsr_slave_0: left promiscuous mode [ 452.566793][T11714] hsr_slave_1: left promiscuous mode [ 452.577653][T11714] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 452.585203][T11714] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 452.593847][T11714] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 452.601455][T11714] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 452.611166][T11714] bridge_slave_0: left allmulticast mode [ 452.616923][T11714] veth1_macvtap: left promiscuous mode [ 452.622812][T11714] veth0_macvtap: left promiscuous mode [ 452.628464][T11714] veth1_vlan: left promiscuous mode [ 452.639160][T11714] veth0_vlan: left promiscuous mode [ 452.730414][T11714] team0 (unregistering): Port device team_slave_1 removed [ 452.744512][T11714] team0 (unregistering): Port device team_slave_0 removed [ 452.800222][T28686] pim6reg: entered allmulticast mode [ 452.806524][T28694] pim6reg: left allmulticast mode [ 453.204340][T28730] bond0: option resend_igmp: invalid value (37005) [ 453.211058][T28730] bond0: option resend_igmp: allowed values 0 - 255 [ 453.282489][T11714] IPVS: stop unused estimator thread 0... [ 453.379712][T28462] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 453.412646][T28462] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 453.433832][T28462] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 453.450778][T28462] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 453.467798][T28734] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 453.513291][T28462] 8021q: adding VLAN 0 to HW filter on device bond0 [ 453.528508][T28462] 8021q: adding VLAN 0 to HW filter on device team0 [ 453.541839][ T29] bridge0: port 1(bridge_slave_0) entered blocking state [ 453.548980][ T29] bridge0: port 1(bridge_slave_0) entered forwarding state [ 453.563346][ T7863] bridge0: port 2(bridge_slave_1) entered blocking state [ 453.570468][ T7863] bridge0: port 2(bridge_slave_1) entered forwarding state [ 453.583750][T28747] sctp: [Deprecated]: syz.8.7563 (pid 28747) Use of int in maxseg socket option. [ 453.583750][T28747] Use struct sctp_assoc_value instead [ 453.631855][T28462] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 453.642916][T28462] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 453.665205][T28753] hub 4-0:1.0: USB hub found [ 453.673998][T28753] hub 4-0:1.0: 8 ports detected [ 453.701773][T28752] lo speed is unknown, defaulting to 1000 [ 453.775433][T28462] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 453.814555][T28752] dummy0 speed is unknown, defaulting to 1000 [ 453.997668][T28772] futex_wake_op: syz.7.7568 tries to shift op by -1; fix this program [ 454.009859][T28770] sctp: [Deprecated]: syz.1.7564 (pid 28770) Use of int in maxseg socket option. [ 454.009859][T28770] Use struct sctp_assoc_value instead [ 454.078122][T28776] hub 4-0:1.0: USB hub found [ 454.089689][T28776] hub 4-0:1.0: 8 ports detected [ 454.206458][T28779] futex_wake_op: syz.7.7569 tries to shift op by -1; fix this program [ 454.311966][T28462] veth0_vlan: entered promiscuous mode [ 454.332625][T28462] veth1_vlan: entered promiscuous mode [ 454.380098][T28462] veth0_macvtap: entered promiscuous mode [ 454.398025][T28462] veth1_macvtap: entered promiscuous mode [ 454.413253][T28462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 454.423862][T28462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 454.433793][T28462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 454.444262][T28462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 454.454157][T28462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 454.464665][T28462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 454.474557][T28462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 454.484997][T28462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 454.494862][T28462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 454.505313][T28462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 454.515170][T28462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 454.525722][T28462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 454.542521][T28462] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 454.553086][T28462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 454.563655][T28462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 454.573647][T28462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 454.584185][T28462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 454.594030][T28462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 454.604587][T28462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 454.614432][T28462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 454.624897][T28462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 454.634796][T28462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 454.645266][T28462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 454.655189][T28462] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 454.665639][T28462] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 454.683362][T28462] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 454.696260][T28462] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 454.705057][T28462] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 454.713873][T28462] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 454.722764][T28462] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 454.827300][T28801] sctp: [Deprecated]: syz.1.7574 (pid 28801) Use of int in maxseg socket option. [ 454.827300][T28801] Use struct sctp_assoc_value instead [ 454.874724][T28801] hub 4-0:1.0: USB hub found [ 454.900541][T28801] hub 4-0:1.0: 8 ports detected [ 454.979444][T28816] futex_wake_op: syz.6.7580 tries to shift op by -1; fix this program [ 455.132602][T28832] pim6reg: entered allmulticast mode [ 455.171511][T28832] pim6reg: left allmulticast mode [ 455.296137][T28850] xt_limit: Overflow, try lower: 2147483649/3300 [ 455.312594][T28827] tipc: Started in network mode [ 455.317845][T28827] tipc: Node identity 4, cluster identity 4711 [ 455.324002][T28827] tipc: Node number set to 4 [ 455.407168][T28843] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 455.423855][T28843] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 455.450986][T28851] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 455.723508][T28851] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 455.834036][T28857] futex_wake_op: syz.8.7594 tries to shift op by -1; fix this program [ 455.853796][T28851] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 455.973283][T28851] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 455.991365][T28869] FAULT_INJECTION: forcing a failure. [ 455.991365][T28869] name failslab, interval 1, probability 0, space 0, times 0 [ 456.004272][T28869] CPU: 1 UID: 0 PID: 28869 Comm: syz.7.7599 Not tainted 6.14.0-rc7-syzkaller-00074-ga7f2e10ecd8f #0 [ 456.004304][T28869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 456.004319][T28869] Call Trace: [ 456.004325][T28869] [ 456.004333][T28869] dump_stack_lvl+0xf2/0x150 [ 456.004362][T28869] dump_stack+0x15/0x1a [ 456.004383][T28869] should_fail_ex+0x24a/0x260 [ 456.004435][T28869] should_failslab+0x8f/0xb0 [ 456.004466][T28869] kmem_cache_alloc_node_noprof+0x59/0x320 [ 456.004571][T28869] ? __alloc_skb+0x10b/0x310 [ 456.004594][T28869] __alloc_skb+0x10b/0x310 [ 456.004670][T28869] netlink_alloc_large_skb+0xad/0xe0 [ 456.004703][T28869] netlink_sendmsg+0x3b4/0x6e0 [ 456.004726][T28869] ? __pfx_netlink_sendmsg+0x10/0x10 [ 456.004744][T28869] __sock_sendmsg+0x140/0x180 [ 456.004784][T28869] ____sys_sendmsg+0x326/0x4b0 [ 456.004915][T28869] __sys_sendmsg+0x19d/0x230 [ 456.005002][T28869] __x64_sys_sendmsg+0x46/0x50 [ 456.005030][T28869] x64_sys_call+0x2734/0x2dc0 [ 456.005056][T28869] do_syscall_64+0xc9/0x1c0 [ 456.005088][T28869] ? clear_bhb_loop+0x55/0xb0 [ 456.005183][T28869] ? clear_bhb_loop+0x55/0xb0 [ 456.005215][T28869] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 456.005241][T28869] RIP: 0033:0x7f0374a9d169 [ 456.005342][T28869] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 456.005366][T28869] RSP: 002b:00007f0373107038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 456.005390][T28869] RAX: ffffffffffffffda RBX: 00007f0374cb5fa0 RCX: 00007f0374a9d169 [ 456.005405][T28869] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 456.005420][T28869] RBP: 00007f0373107090 R08: 0000000000000000 R09: 0000000000000000 [ 456.005433][T28869] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 456.005444][T28869] R13: 0000000000000000 R14: 00007f0374cb5fa0 R15: 00007ffdfbe76748 [ 456.005546][T28869] [ 456.265630][T28851] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 456.291062][T28851] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 456.319908][T28851] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 456.338356][T28878] lo speed is unknown, defaulting to 1000 [ 456.366027][T28851] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 456.418378][T28878] dummy0 speed is unknown, defaulting to 1000 [ 456.428809][T28887] futex_wake_op: syz.1.7606 tries to shift op by -1; fix this program [ 456.510630][T28882] lo speed is unknown, defaulting to 1000 [ 456.545301][T28882] dummy0 speed is unknown, defaulting to 1000 [ 456.663469][T28883] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 457.011567][T28925] futex_wake_op: syz.1.7617 tries to shift op by -1; fix this program [ 457.020106][ T30] kauditd_printk_skb: 376 callbacks suppressed [ 457.020121][ T30] audit: type=1326 audit(2000000222.650:16767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28924 comm="syz.1.7617" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f676445d169 code=0x7ffc0000 [ 457.056318][ T30] audit: type=1326 audit(2000000222.650:16768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28924 comm="syz.1.7617" exe="/root/syz-executor" sig=0 arch=c000003e syscall=154 compat=0 ip=0x7f676445d169 code=0x7ffc0000 [ 457.080079][ T30] audit: type=1326 audit(2000000222.650:16769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28924 comm="syz.1.7617" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f676445d169 code=0x7ffc0000 [ 457.103808][ T30] audit: type=1326 audit(2000000222.650:16770): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28924 comm="syz.1.7617" exe="/root/syz-executor" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7f676445d169 code=0x7ffc0000 [ 457.127467][ T30] audit: type=1326 audit(2000000222.660:16771): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28924 comm="syz.1.7617" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f676445d169 code=0x7ffc0000 [ 457.151181][ T30] audit: type=1326 audit(2000000222.660:16772): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28924 comm="syz.1.7617" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f676445d169 code=0x7ffc0000 [ 457.174885][ T30] audit: type=1326 audit(2000000222.660:16773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28924 comm="syz.1.7617" exe="/root/syz-executor" sig=0 arch=c000003e syscall=304 compat=0 ip=0x7f676445d169 code=0x7ffc0000 [ 457.198484][ T30] audit: type=1326 audit(2000000222.660:16774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28924 comm="syz.1.7617" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f676445d169 code=0x7ffc0000 [ 457.222100][ T30] audit: type=1326 audit(2000000222.660:16775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28924 comm="syz.1.7617" exe="/root/syz-executor" sig=0 arch=c000003e syscall=248 compat=0 ip=0x7f676445d169 code=0x7ffc0000 [ 457.245721][ T30] audit: type=1326 audit(2000000222.660:16776): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28924 comm="syz.1.7617" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f676445d169 code=0x7ffc0000 [ 457.674642][T28973] pim6reg: entered allmulticast mode [ 457.689008][T28973] pim6reg: left allmulticast mode [ 458.000791][T29008] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7634'. [ 458.040941][T29017] FAULT_INJECTION: forcing a failure. [ 458.040941][T29017] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 458.054178][T29017] CPU: 0 UID: 0 PID: 29017 Comm: syz.8.7635 Not tainted 6.14.0-rc7-syzkaller-00074-ga7f2e10ecd8f #0 [ 458.054207][T29017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 458.054234][T29017] Call Trace: [ 458.054243][T29017] [ 458.054253][T29017] dump_stack_lvl+0xf2/0x150 [ 458.054287][T29017] dump_stack+0x15/0x1a [ 458.054314][T29017] should_fail_ex+0x24a/0x260 [ 458.054351][T29017] should_fail+0xb/0x10 [ 458.054385][T29017] should_fail_usercopy+0x1a/0x20 [ 458.054500][T29017] _copy_from_user+0x1c/0xa0 [ 458.054525][T29017] kstrtouint_from_user+0x76/0xe0 [ 458.054562][T29017] ? 0xffffffff81000000 [ 458.054588][T29017] ? selinux_file_permission+0x22a/0x360 [ 458.054667][T29017] proc_fail_nth_write+0x4f/0x150 [ 458.054702][T29017] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 458.054793][T29017] vfs_write+0x27d/0x920 [ 458.054825][T29017] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 458.054865][T29017] ? __fget_files+0x17c/0x1c0 [ 458.054910][T29017] ksys_write+0xe8/0x1b0 [ 458.054963][T29017] __x64_sys_write+0x42/0x50 [ 458.054997][T29017] x64_sys_call+0x287e/0x2dc0 [ 458.055030][T29017] do_syscall_64+0xc9/0x1c0 [ 458.055068][T29017] ? clear_bhb_loop+0x55/0xb0 [ 458.055151][T29017] ? clear_bhb_loop+0x55/0xb0 [ 458.055179][T29017] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 458.055206][T29017] RIP: 0033:0x7f43178ebc1f [ 458.055224][T29017] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 458.055326][T29017] RSP: 002b:00007f4315f57030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 458.055348][T29017] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f43178ebc1f [ 458.055361][T29017] RDX: 0000000000000001 RSI: 00007f4315f570a0 RDI: 0000000000000007 [ 458.055373][T29017] RBP: 00007f4315f57090 R08: 0000000000000000 R09: 0000000000000000 [ 458.055385][T29017] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 458.055396][T29017] R13: 0000000000000000 R14: 00007f4317b05fa0 R15: 00007ffe43089ed8 [ 458.055417][T29017] [ 458.376578][T29043] futex_wake_op: syz.8.7642 tries to shift op by -1; fix this program [ 458.492567][T29060] pim6reg: entered allmulticast mode [ 458.512646][T29060] pim6reg: left allmulticast mode [ 458.783198][T29074] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 458.791650][T29104] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 458.791927][T29074] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 458.812378][T29104] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 458.834290][T29110] FAULT_INJECTION: forcing a failure. [ 458.834290][T29110] name failslab, interval 1, probability 0, space 0, times 0 [ 458.847172][T29110] CPU: 0 UID: 0 PID: 29110 Comm: syz.9.7654 Not tainted 6.14.0-rc7-syzkaller-00074-ga7f2e10ecd8f #0 [ 458.847281][T29110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 458.847296][T29110] Call Trace: [ 458.847303][T29110] [ 458.847313][T29110] dump_stack_lvl+0xf2/0x150 [ 458.847347][T29110] dump_stack+0x15/0x1a [ 458.847423][T29110] should_fail_ex+0x24a/0x260 [ 458.847541][T29110] should_failslab+0x8f/0xb0 [ 458.847573][T29110] __kmalloc_node_track_caller_noprof+0xa8/0x410 [ 458.847600][T29110] ? sidtab_sid2str_get+0xb8/0x140 [ 458.847647][T29110] kmemdup_noprof+0x2b/0x70 [ 458.847676][T29110] sidtab_sid2str_get+0xb8/0x140 [ 458.847710][T29110] security_sid_to_context_core+0x1eb/0x2f0 [ 458.847751][T29110] security_sid_to_context+0x27/0x30 [ 458.847786][T29110] selinux_socket_getpeersec_stream+0x100/0x2d0 [ 458.847816][T29110] security_socket_getpeersec_stream+0x7d/0xe0 [ 458.847856][T29110] sk_getsockopt+0xdd7/0x1720 [ 458.847928][T29110] ? selinux_socket_getsockopt+0x185/0x1c0 [ 458.847963][T29110] ? should_fail_ex+0xd7/0x260 [ 458.848010][T29110] do_sock_getsockopt+0x14a/0x260 [ 458.848045][T29110] __x64_sys_getsockopt+0x18c/0x200 [ 458.848081][T29110] x64_sys_call+0x1288/0x2dc0 [ 458.848128][T29110] do_syscall_64+0xc9/0x1c0 [ 458.848167][T29110] ? clear_bhb_loop+0x55/0xb0 [ 458.848236][T29110] ? clear_bhb_loop+0x55/0xb0 [ 458.848266][T29110] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 458.848294][T29110] RIP: 0033:0x7fb103c1d169 [ 458.848337][T29110] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 458.848360][T29110] RSP: 002b:00007fb102287038 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 458.848435][T29110] RAX: ffffffffffffffda RBX: 00007fb103e35fa0 RCX: 00007fb103c1d169 [ 458.848448][T29110] RDX: 000000000000001f RSI: 0000000000000001 RDI: 0000000000000005 [ 458.848460][T29110] RBP: 00007fb102287090 R08: 0000200000001000 R09: 0000000000000000 [ 458.848478][T29110] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 458.848493][T29110] R13: 0000000000000000 R14: 00007fb103e35fa0 R15: 00007ffc0b15ca48 [ 458.848517][T29110] [ 459.123737][T29117] xt_hashlimit: max too large, truncated to 1048576 [ 459.500949][T29140] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 459.521858][T29140] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 459.692952][T29159] tipc: Started in network mode [ 459.697909][T29159] tipc: Node identity 4, cluster identity 4711 [ 459.704084][T29159] tipc: Node number set to 4 [ 460.198490][T29206] binfmt_misc: register: failed to install interpreter file ./file2 [ 460.276820][T29212] FAULT_INJECTION: forcing a failure. [ 460.276820][T29212] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 460.290170][T29212] CPU: 1 UID: 0 PID: 29212 Comm: syz.7.7684 Not tainted 6.14.0-rc7-syzkaller-00074-ga7f2e10ecd8f #0 [ 460.290199][T29212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 460.290213][T29212] Call Trace: [ 460.290219][T29212] [ 460.290287][T29212] dump_stack_lvl+0xf2/0x150 [ 460.290319][T29212] dump_stack+0x15/0x1a [ 460.290341][T29212] should_fail_ex+0x24a/0x260 [ 460.290378][T29212] should_fail+0xb/0x10 [ 460.290429][T29212] should_fail_usercopy+0x1a/0x20 [ 460.290465][T29212] _copy_to_user+0x20/0xa0 [ 460.290488][T29212] simple_read_from_buffer+0xa0/0x110 [ 460.290576][T29212] proc_fail_nth_read+0xf9/0x140 [ 460.290609][T29212] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 460.290706][T29212] vfs_read+0x19b/0x6f0 [ 460.290736][T29212] ? __rcu_read_unlock+0x4e/0x70 [ 460.290763][T29212] ? __fget_files+0x17c/0x1c0 [ 460.290806][T29212] ksys_read+0xe8/0x1b0 [ 460.290840][T29212] __x64_sys_read+0x42/0x50 [ 460.290917][T29212] x64_sys_call+0x2874/0x2dc0 [ 460.290949][T29212] do_syscall_64+0xc9/0x1c0 [ 460.291031][T29212] ? clear_bhb_loop+0x55/0xb0 [ 460.291060][T29212] ? clear_bhb_loop+0x55/0xb0 [ 460.291086][T29212] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 460.291118][T29212] RIP: 0033:0x7f0374a9bb7c [ 460.291200][T29212] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 460.291222][T29212] RSP: 002b:00007f0373107030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 460.291241][T29212] RAX: ffffffffffffffda RBX: 00007f0374cb5fa0 RCX: 00007f0374a9bb7c [ 460.291258][T29212] RDX: 000000000000000f RSI: 00007f03731070a0 RDI: 0000000000000003 [ 460.291271][T29212] RBP: 00007f0373107090 R08: 0000000000000000 R09: 0000000000000000 [ 460.291286][T29212] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 460.291306][T29212] R13: 0000000000000000 R14: 00007f0374cb5fa0 R15: 00007ffdfbe76748 [ 460.291330][T29212] [ 460.536831][T29208] sctp: [Deprecated]: syz.1.7683 (pid 29208) Use of int in maxseg socket option. [ 460.536831][T29208] Use struct sctp_assoc_value instead [ 460.561331][T29208] hub 4-0:1.0: USB hub found [ 460.567382][T29208] hub 4-0:1.0: 8 ports detected [ 460.643885][T29220] netlink: 108 bytes leftover after parsing attributes in process `syz.6.7686'. [ 460.740406][T29224] FAULT_INJECTION: forcing a failure. [ 460.740406][T29224] name failslab, interval 1, probability 0, space 0, times 0 [ 460.753158][T29224] CPU: 1 UID: 0 PID: 29224 Comm: syz.7.7689 Not tainted 6.14.0-rc7-syzkaller-00074-ga7f2e10ecd8f #0 [ 460.753190][T29224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 460.753205][T29224] Call Trace: [ 460.753214][T29224] [ 460.753224][T29224] dump_stack_lvl+0xf2/0x150 [ 460.753284][T29224] dump_stack+0x15/0x1a [ 460.753312][T29224] should_fail_ex+0x24a/0x260 [ 460.753350][T29224] should_failslab+0x8f/0xb0 [ 460.753466][T29224] __kmalloc_noprof+0xab/0x3f0 [ 460.753493][T29224] ? security_prepare_creds+0x53/0x120 [ 460.753606][T29224] security_prepare_creds+0x53/0x120 [ 460.753646][T29224] prepare_creds+0x346/0x480 [ 460.753736][T29224] copy_creds+0x90/0x3f0 [ 460.753832][T29224] copy_process+0x64b/0x1f50 [ 460.753931][T29224] ? 0xffffffff81000000 [ 460.753943][T29224] ? selinux_file_permission+0x22a/0x360 [ 460.754034][T29224] kernel_clone+0x167/0x5e0 [ 460.754070][T29224] ? vfs_write+0x644/0x920 [ 460.754099][T29224] __x64_sys_clone+0xe7/0x120 [ 460.754151][T29224] x64_sys_call+0x2d7e/0x2dc0 [ 460.754181][T29224] do_syscall_64+0xc9/0x1c0 [ 460.754220][T29224] ? clear_bhb_loop+0x55/0xb0 [ 460.754315][T29224] ? clear_bhb_loop+0x55/0xb0 [ 460.754406][T29224] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 460.754433][T29224] RIP: 0033:0x7f0374a9d169 [ 460.754449][T29224] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 460.754471][T29224] RSP: 002b:00007f0373106fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 460.754493][T29224] RAX: ffffffffffffffda RBX: 00007f0374cb5fa0 RCX: 00007f0374a9d169 [ 460.754507][T29224] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 460.754604][T29224] RBP: 00007f0373107090 R08: 0000000000000000 R09: 0000000000000000 [ 460.754619][T29224] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 460.754635][T29224] R13: 0000000000000000 R14: 00007f0374cb5fa0 R15: 00007ffdfbe76748 [ 460.754659][T29224] [ 461.023886][T29236] lo speed is unknown, defaulting to 1000 [ 461.056211][T29236] dummy0 speed is unknown, defaulting to 1000 [ 461.341930][T29246] tipc: Started in network mode [ 461.346862][T29246] tipc: Node identity 4, cluster identity 4711 [ 461.353214][T29246] tipc: Node number set to 4 [ 461.444978][T29266] FAULT_INJECTION: forcing a failure. [ 461.444978][T29266] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 461.458257][T29266] CPU: 0 UID: 0 PID: 29266 Comm: syz.7.7701 Not tainted 6.14.0-rc7-syzkaller-00074-ga7f2e10ecd8f #0 [ 461.458289][T29266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 461.458306][T29266] Call Trace: [ 461.458313][T29266] [ 461.458341][T29266] dump_stack_lvl+0xf2/0x150 [ 461.458373][T29266] dump_stack+0x15/0x1a [ 461.458402][T29266] should_fail_ex+0x24a/0x260 [ 461.458441][T29266] should_fail+0xb/0x10 [ 461.458490][T29266] should_fail_usercopy+0x1a/0x20 [ 461.458545][T29266] _copy_from_user+0x1c/0xa0 [ 461.458571][T29266] move_addr_to_kernel+0x82/0x120 [ 461.458642][T29266] __sys_connect+0x67/0x1b0 [ 461.458795][T29266] __x64_sys_connect+0x41/0x50 [ 461.458832][T29266] x64_sys_call+0x22a7/0x2dc0 [ 461.458883][T29266] do_syscall_64+0xc9/0x1c0 [ 461.458918][T29266] ? clear_bhb_loop+0x55/0xb0 [ 461.458974][T29266] ? clear_bhb_loop+0x55/0xb0 [ 461.459008][T29266] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 461.459042][T29266] RIP: 0033:0x7f0374a9d169 [ 461.459062][T29266] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 461.459105][T29266] RSP: 002b:00007f0373107038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 461.459128][T29266] RAX: ffffffffffffffda RBX: 00007f0374cb5fa0 RCX: 00007f0374a9d169 [ 461.459144][T29266] RDX: 0000000000000010 RSI: 0000200000000000 RDI: 0000000000000006 [ 461.459158][T29266] RBP: 00007f0373107090 R08: 0000000000000000 R09: 0000000000000000 [ 461.459173][T29266] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 461.459187][T29266] R13: 0000000000000000 R14: 00007f0374cb5fa0 R15: 00007ffdfbe76748 [ 461.459212][T29266] [ 461.704449][T29273] sctp: [Deprecated]: syz.7.7705 (pid 29273) Use of int in maxseg socket option. [ 461.704449][T29273] Use struct sctp_assoc_value instead [ 461.722241][T29273] hub 4-0:1.0: USB hub found [ 461.727054][T29273] hub 4-0:1.0: 8 ports detected [ 461.811363][T29278] IPVS: set_ctl: invalid protocol: 43 255.255.255.255:20002 [ 461.880122][T29288] 9pnet_fd: Insufficient options for proto=fd [ 461.970171][T29296] netlink: 108 bytes leftover after parsing attributes in process `syz.7.7713'. [ 462.132617][ T30] kauditd_printk_skb: 359 callbacks suppressed [ 462.132634][ T30] audit: type=1326 audit(2000000227.760:17136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29289 comm="syz.8.7711" exe="/root/syz-executor" sig=0 arch=c000003e syscall=436 compat=0 ip=0x7f43178ed169 code=0x7ffc0000 [ 462.162691][ T30] audit: type=1326 audit(2000000227.760:17137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29289 comm="syz.8.7711" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f43178ed169 code=0x7ffc0000 [ 462.186349][ T30] audit: type=1326 audit(2000000227.760:17138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29289 comm="syz.8.7711" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f43178ed169 code=0x7ffc0000 [ 462.249573][T29302] netlink: 36 bytes leftover after parsing attributes in process `syz.8.7716'. [ 462.262134][T29305] FAULT_INJECTION: forcing a failure. [ 462.262134][T29305] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 462.275258][T29305] CPU: 0 UID: 0 PID: 29305 Comm: syz.1.7717 Not tainted 6.14.0-rc7-syzkaller-00074-ga7f2e10ecd8f #0 [ 462.275325][T29305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 462.275340][T29305] Call Trace: [ 462.275348][T29305] [ 462.275357][T29305] dump_stack_lvl+0xf2/0x150 [ 462.275387][T29305] dump_stack+0x15/0x1a [ 462.275409][T29305] should_fail_ex+0x24a/0x260 [ 462.275440][T29305] should_fail+0xb/0x10 [ 462.275468][T29305] should_fail_usercopy+0x1a/0x20 [ 462.275500][T29305] _copy_from_user+0x1c/0xa0 [ 462.275584][T29305] memdup_user+0x64/0xc0 [ 462.275612][T29305] strndup_user+0x68/0xa0 [ 462.275640][T29305] __se_sys_add_key+0x11b/0x320 [ 462.275677][T29305] __x64_sys_add_key+0x67/0x80 [ 462.275787][T29305] x64_sys_call+0x2964/0x2dc0 [ 462.275890][T29305] do_syscall_64+0xc9/0x1c0 [ 462.275923][T29305] ? clear_bhb_loop+0x55/0xb0 [ 462.275950][T29305] ? clear_bhb_loop+0x55/0xb0 [ 462.275977][T29305] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 462.276078][T29305] RIP: 0033:0x7f676445d169 [ 462.276101][T29305] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 462.276119][T29305] RSP: 002b:00007f6762ac7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 462.276138][T29305] RAX: ffffffffffffffda RBX: 00007f6764675fa0 RCX: 00007f676445d169 [ 462.276150][T29305] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000200000000300 [ 462.276162][T29305] RBP: 00007f6762ac7090 R08: fffffffffffffffe R09: 0000000000000000 [ 462.276245][T29305] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 462.276259][T29305] R13: 0000000000000000 R14: 00007f6764675fa0 R15: 00007ffd93140df8 [ 462.276280][T29305] [ 462.488594][ T30] audit: type=1326 audit(2000000228.120:17139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29308 comm="syz.9.7719" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb103c1d169 code=0x7ffc0000 [ 462.531977][ T30] audit: type=1326 audit(2000000228.140:17140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29308 comm="syz.9.7719" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fb103c1d169 code=0x7ffc0000 [ 462.555728][ T30] audit: type=1326 audit(2000000228.140:17141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29308 comm="syz.9.7719" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb103c1d169 code=0x7ffc0000 [ 462.579487][ T30] audit: type=1326 audit(2000000228.140:17142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29308 comm="syz.9.7719" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb103c1d169 code=0x7ffc0000 [ 462.594584][T29320] sctp: [Deprecated]: syz.9.7724 (pid 29320) Use of int in maxseg socket option. [ 462.594584][T29320] Use struct sctp_assoc_value instead [ 462.603045][ T30] audit: type=1326 audit(2000000228.140:17143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29308 comm="syz.9.7719" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb103c1d169 code=0x7ffc0000 [ 462.603123][ T30] audit: type=1326 audit(2000000228.150:17144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29308 comm="syz.9.7719" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fb103c1d169 code=0x7ffc0000 [ 462.621635][T29320] hub 4-0:1.0: USB hub found [ 462.641063][ T30] audit: type=1326 audit(2000000228.150:17145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29308 comm="syz.9.7719" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb103c1d169 code=0x7ffc0000 [ 462.695307][T29320] hub 4-0:1.0: 8 ports detected [ 462.722858][T29327] netlink: 268 bytes leftover after parsing attributes in process `syz.8.7727'. [ 462.762089][ T36] IPVS: starting estimator thread 0... [ 462.829531][T29340] FAULT_INJECTION: forcing a failure. [ 462.829531][T29340] name failslab, interval 1, probability 0, space 0, times 0 [ 462.842294][T29340] CPU: 1 UID: 0 PID: 29340 Comm: syz.9.7733 Not tainted 6.14.0-rc7-syzkaller-00074-ga7f2e10ecd8f #0 [ 462.842322][T29340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 462.842338][T29340] Call Trace: [ 462.842345][T29340] [ 462.842354][T29340] dump_stack_lvl+0xf2/0x150 [ 462.842403][T29340] dump_stack+0x15/0x1a [ 462.842429][T29340] should_fail_ex+0x24a/0x260 [ 462.842486][T29340] should_failslab+0x8f/0xb0 [ 462.842520][T29340] kmem_cache_alloc_noprof+0x52/0x320 [ 462.842545][T29340] ? security_file_alloc+0x32/0x100 [ 462.842580][T29340] security_file_alloc+0x32/0x100 [ 462.842687][T29340] init_file+0x5d/0x1b0 [ 462.842712][T29340] alloc_empty_file+0xea/0x200 [ 462.842732][T29340] path_openat+0x6a/0x1fc0 [ 462.842758][T29340] ? mntput+0x49/0x70 [ 462.842784][T29340] ? terminate_walk+0x260/0x280 [ 462.842878][T29340] ? path_openat+0x1a78/0x1fc0 [ 462.842907][T29340] ? _parse_integer_limit+0x167/0x180 [ 462.842962][T29340] do_filp_open+0x107/0x230 [ 462.843070][T29340] do_open_execat+0xd0/0x280 [ 462.843103][T29340] alloc_bprm+0x2a/0x680 [ 462.843166][T29340] do_execveat_common+0x12b/0x7e0 [ 462.843196][T29340] __x64_sys_execve+0x5a/0x70 [ 462.843223][T29340] x64_sys_call+0x1333/0x2dc0 [ 462.843294][T29340] do_syscall_64+0xc9/0x1c0 [ 462.843391][T29340] ? clear_bhb_loop+0x55/0xb0 [ 462.843420][T29340] ? clear_bhb_loop+0x55/0xb0 [ 462.843530][T29340] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 462.843567][T29340] RIP: 0033:0x7fb103c1d169 [ 462.843583][T29340] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 462.843601][T29340] RSP: 002b:00007fb102287038 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 462.843619][T29340] RAX: ffffffffffffffda RBX: 00007fb103e35fa0 RCX: 00007fb103c1d169 [ 462.843633][T29340] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000080 [ 462.843727][T29340] RBP: 00007fb102287090 R08: 0000000000000000 R09: 0000000000000000 [ 462.843742][T29340] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 462.843756][T29340] R13: 0000000000000000 R14: 00007fb103e35fa0 R15: 00007ffc0b15ca48 [ 462.843775][T29340] [ 463.069477][T29332] IPVS: using max 2352 ests per chain, 117600 per kthread [ 463.318179][T29357] netlink: 108 bytes leftover after parsing attributes in process `syz.8.7739'. [ 463.335017][T29359] netlink: 4 bytes leftover after parsing attributes in process `syz.7.7740'. [ 463.376627][T29359] bond0: (slave bond_slave_1): Releasing backup interface [ 464.394241][T29412] pim6reg: entered allmulticast mode [ 464.411265][T29412] pim6reg: left allmulticast mode [ 464.643772][T29420] netlink: 108 bytes leftover after parsing attributes in process `syz.7.7762'. [ 464.679574][T29425] 9p: Unknown access argument : -22 [ 464.888690][T29453] sctp: [Deprecated]: syz.8.7774 (pid 29453) Use of int in maxseg socket option. [ 464.888690][T29453] Use struct sctp_assoc_value instead [ 464.917863][T29453] hub 4-0:1.0: USB hub found [ 464.923508][T29453] hub 4-0:1.0: 8 ports detected [ 465.218933][T29466] hub 4-0:1.0: USB hub found [ 465.223700][T29466] hub 4-0:1.0: 8 ports detected [ 465.600514][T29479] syz!: rxe_newlink: already configured on team_slave_0 [ 465.639638][T29485] netlink: 4 bytes leftover after parsing attributes in process `syz.7.7787'. [ 465.914753][T29509] netlink: 108 bytes leftover after parsing attributes in process `syz.9.7792'. [ 466.006998][T29514] netlink: 4 bytes leftover after parsing attributes in process `syz.7.7798'. [ 466.036696][T29519] pim6reg: entered allmulticast mode [ 466.054675][T29519] pim6reg: left allmulticast mode [ 466.255204][T29527] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 466.523898][T29536] lo speed is unknown, defaulting to 1000 [ 467.035875][T29553] netlink: 'syz.1.7810': attribute type 2 has an invalid length. [ 467.039401][T29545] lo speed is unknown, defaulting to 1000 [ 467.076306][T29545] dummy0 speed is unknown, defaulting to 1000 [ 467.122514][T29536] dummy0 speed is unknown, defaulting to 1000 [ 467.639413][T29563] sctp: [Deprecated]: syz.1.7814 (pid 29563) Use of int in maxseg socket option. [ 467.639413][T29563] Use struct sctp_assoc_value instead [ 467.918360][T29572] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 468.055934][ T30] kauditd_printk_skb: 459 callbacks suppressed [ 468.055953][ T30] audit: type=1400 audit(2000000233.680:17605): avc: granted { setsecparam } for pid=29570 comm="syz.6.7817" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 468.146528][T29586] sctp: [Deprecated]: syz.1.7820 (pid 29586) Use of int in maxseg socket option. [ 468.146528][T29586] Use struct sctp_assoc_value instead [ 468.590056][T29597] FAULT_INJECTION: forcing a failure. [ 468.590056][T29597] name failslab, interval 1, probability 0, space 0, times 0 [ 468.602842][T29597] CPU: 0 UID: 0 PID: 29597 Comm: syz.9.7825 Not tainted 6.14.0-rc7-syzkaller-00074-ga7f2e10ecd8f #0 [ 468.602870][T29597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 468.602884][T29597] Call Trace: [ 468.602893][T29597] [ 468.602902][T29597] dump_stack_lvl+0xf2/0x150 [ 468.603009][T29597] dump_stack+0x15/0x1a [ 468.603034][T29597] should_fail_ex+0x24a/0x260 [ 468.603119][T29597] should_failslab+0x8f/0xb0 [ 468.603152][T29597] __kmalloc_node_track_caller_noprof+0xa8/0x410 [ 468.603225][T29597] ? asymmetric_lookup_restriction+0x7c/0x370 [ 468.603261][T29597] ? should_fail_ex+0xd7/0x260 [ 468.603290][T29597] kstrndup+0x77/0x120 [ 468.603396][T29597] asymmetric_lookup_restriction+0x7c/0x370 [ 468.603432][T29597] ? __pfx_asymmetric_lookup_restriction+0x10/0x10 [ 468.603473][T29597] keyring_restrict+0xf7/0x280 [ 468.603559][T29597] keyctl_restrict_keyring+0x103/0x1b0 [ 468.603589][T29597] __se_sys_keyctl+0x20f/0xbb0 [ 468.603627][T29597] ? __fget_files+0x17c/0x1c0 [ 468.603661][T29597] ? fput+0x1c4/0x200 [ 468.603682][T29597] ? ksys_write+0x176/0x1b0 [ 468.603713][T29597] __x64_sys_keyctl+0x67/0x80 [ 468.603737][T29597] x64_sys_call+0x163d/0x2dc0 [ 468.603770][T29597] do_syscall_64+0xc9/0x1c0 [ 468.603806][T29597] ? clear_bhb_loop+0x55/0xb0 [ 468.603832][T29597] ? clear_bhb_loop+0x55/0xb0 [ 468.603859][T29597] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 468.603898][T29597] RIP: 0033:0x7fb103c1d169 [ 468.603917][T29597] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 468.603934][T29597] RSP: 002b:00007fb102287038 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 468.603966][T29597] RAX: ffffffffffffffda RBX: 00007fb103e35fa0 RCX: 00007fb103c1d169 [ 468.603978][T29597] RDX: 0000200000000240 RSI: 000000003f461497 RDI: 000000000000001d [ 468.603992][T29597] RBP: 00007fb102287090 R08: 0000000000000000 R09: 0000000000000000 [ 468.604007][T29597] R10: 0000200000000340 R11: 0000000000000246 R12: 0000000000000001 [ 468.604023][T29597] R13: 0000000000000000 R14: 00007fb103e35fa0 R15: 00007ffc0b15ca48 [ 468.604047][T29597] [ 468.833316][ T30] audit: type=1326 audit(2000000234.460:17606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29599 comm="syz.7.7826" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0374a9d169 code=0x7ffc0000 [ 468.857274][ T30] audit: type=1326 audit(2000000234.460:17607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29599 comm="syz.7.7826" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0374a9d169 code=0x7ffc0000 [ 468.881212][ T30] audit: type=1326 audit(2000000234.460:17608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29599 comm="syz.7.7826" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0374a9d169 code=0x7ffc0000 [ 468.904922][ T30] audit: type=1326 audit(2000000234.460:17609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29599 comm="syz.7.7826" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0374a9d169 code=0x7ffc0000 [ 468.928713][ T30] audit: type=1326 audit(2000000234.460:17610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29599 comm="syz.7.7826" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0374a9d169 code=0x7ffc0000 [ 468.953451][ T30] audit: type=1326 audit(2000000234.510:17611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29599 comm="syz.7.7826" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0374a9d169 code=0x7ffc0000 [ 468.977121][ T30] audit: type=1326 audit(2000000234.510:17612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29599 comm="syz.7.7826" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0374a9d169 code=0x7ffc0000 [ 469.000772][ T30] audit: type=1326 audit(2000000234.510:17613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29599 comm="syz.7.7826" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0374a9d169 code=0x7ffc0000 [ 469.024756][ T30] audit: type=1326 audit(2000000234.510:17614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29599 comm="syz.7.7826" exe="/root/syz-executor" sig=0 arch=c000003e syscall=428 compat=0 ip=0x7f0374a9d169 code=0x7ffc0000 [ 469.179044][T29614] futex_wake_op: syz.7.7830 tries to shift op by -1; fix this program [ 469.269552][T29621] sctp: [Deprecated]: syz.7.7832 (pid 29621) Use of int in maxseg socket option. [ 469.269552][T29621] Use struct sctp_assoc_value instead [ 469.660905][T29640] netlink: 'syz.7.7838': attribute type 21 has an invalid length. [ 469.806017][T29645] ================================================================== [ 469.814145][T29645] BUG: KCSAN: data-race in vmalloc_info_show / vmalloc_info_show [ 469.821912][T29645] [ 469.824238][T29645] read-write to 0xffff88810100cf20 of 4 bytes by task 29634 on cpu 1: [ 469.832408][T29645] vmalloc_info_show+0x470/0x770 [ 469.837375][T29645] traverse+0x155/0x3c0 [ 469.841528][T29645] seq_read_iter+0x854/0x930 [ 469.846115][T29645] proc_reg_read_iter+0x118/0x190 [ 469.851162][T29645] vfs_read+0x5cc/0x6f0 [ 469.855316][T29645] __x64_sys_pread64+0xf6/0x150 [ 469.860179][T29645] x64_sys_call+0x26ee/0x2dc0 [ 469.864865][T29645] do_syscall_64+0xc9/0x1c0 [ 469.869379][T29645] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 469.875283][T29645] [ 469.877602][T29645] read-write to 0xffff88810100cf20 of 4 bytes by task 29645 on cpu 0: [ 469.885752][T29645] vmalloc_info_show+0x470/0x770 [ 469.890700][T29645] traverse+0x155/0x3c0 [ 469.894861][T29645] seq_read_iter+0x854/0x930 [ 469.899454][T29645] proc_reg_read_iter+0x118/0x190 [ 469.904494][T29645] vfs_read+0x5cc/0x6f0 [ 469.908655][T29645] __x64_sys_pread64+0xf6/0x150 [ 469.913514][T29645] x64_sys_call+0x26ee/0x2dc0 [ 469.918224][T29645] do_syscall_64+0xc9/0x1c0 [ 469.922751][T29645] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 469.928651][T29645] [ 469.930970][T29645] value changed: 0x0000009a -> 0x00000024 [ 469.936693][T29645] [ 469.939012][T29645] Reported by Kernel Concurrency Sanitizer on: [ 469.945159][T29645] CPU: 0 UID: 0 PID: 29645 Comm: syz.7.7841 Not tainted 6.14.0-rc7-syzkaller-00074-ga7f2e10ecd8f #0 [ 469.955916][T29645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 469.965968][T29645] ================================================================== [ 470.149208][T29651] futex_wake_op: syz.9.7842 tries to shift op by -1; fix this program