last executing test programs: 5m53.662315758s ago: executing program 32 (id=50): socket$nl_generic(0x10, 0x3, 0x10) r0 = io_uring_setup(0x38eb, &(0x7f0000000300)={0x0, 0x342a, 0x1000, 0x0, 0x3d4}) r1 = socket$inet6(0xa, 0x806, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(r1, &(0x7f0000000440)={0xa, 0x4e23, 0x0, @empty}, 0x1c) listen(r1, 0x3) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r3 = socket$inet_dccp(0x2, 0x6, 0x0) socket$kcm(0x10, 0x2, 0x0) r4 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r4, 0x6, 0x21, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='devpts\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) r5 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x800000000003}, 0x1100, 0x5dd8, 0x0, 0x5, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) connect$inet(r3, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) accept4(r1, 0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 5m31.313545252s ago: executing program 33 (id=248): io_uring_setup(0x22d6, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x2, 0x9, 0x9, 0x3, 0x2, 0x0, 0x70bd2b, 0x25dfdbfe}, 0x10}}, 0x20048844) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdcb, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0x1}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000240)={[{@user_xattr}, {@nombcache}, {@minixdf}, {@norecovery}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x7e}}, {@lazytime}, {@init_itable_val={'init_itable', 0x3d, 0x5}}, {@user_xattr}, {@errors_remount}]}, 0xfe, 0x58a, &(0x7f0000001300)="$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") chdir(&(0x7f0000000400)='./file0\x00') symlink(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='./file1\x00') openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) r2 = io_uring_setup(0x1a6d, &(0x7f0000000000)={0x0, 0x896d, 0x40, 0xfffffffe, 0x1f}) io_uring_register$IORING_REGISTER_RESTRICTIONS(r2, 0xb, &(0x7f00000006c0)=[@ioring_restriction_sqe_op={0x1, 0x56}], 0x1) 5m17.777679973s ago: executing program 34 (id=425): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000faff0000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100003020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000080)="b9dd0356aeabac58967bf2d01343", 0x0, 0xfffffdff, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0, 0x0, 0xd348}, 0x18) sync() sync() r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000a40000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1800403, &(0x7f0000000940), 0x2, 0x5ad, &(0x7f0000000180)="$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") sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000100001000000f5ffffffffffffff000a14000000060a0000000000000000000002"], 0x3c}}, 0x0) mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f0000000000)='\x06\x00\x00\x00\x04\xb0\xfe\x98\x9a!s\x91]\xab\xc9\xa2IV\xb6-\xd9z\x81\x91\x8aP}I\xc6\x0e\xd9\v\xda\xbfS\x16 \x04\r\xcd\xdb\x9a\xd4\xaf\r\x11\xa0\xd7\xd7\xb6\x9bz\x99\xaf\xfd\x87fN\xad\x90U\xb4A\xdf\xabB\xbba\x7f\xb8\x96\x1a\xe7\xc1\xab\x16\x02\x000xffffffffffffffff, 0xffffffffffffffff}, 0x0) r7 = dup(r6) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r5, @ANYBLOB=',wfdno=', @ANYRESHEX=r7, @ANYBLOB=',msize=0x0000000000001000']) 5m17.562303566s ago: executing program 35 (id=429): openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x2042, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000180), 0x205, 0x2581) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$USBDEVFS_SUBMITURB(r3, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0x80, 0xf, 0x0, 0x0, 0x7995}, 0x10007, 0x0, 0x0, 0x48000000, 0x0, 0x40000000, 0x0}) (fail_nth: 2) 5m15.405764556s ago: executing program 36 (id=444): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r2, 0x0) mbind(&(0x7f0000ff6000/0xa000)=nil, 0xa000, 0x4002, &(0x7f0000000000)=0x2, 0x3, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$qrtrtun(r1, &(0x7f0000000300)="ca0e808bb35bdabb", 0x8) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r3, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)=[0x7], 0x0, 0x0, 0x1}}, 0x3c) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000180)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r4, 0x0, 0x4}, 0x18) r5 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key(&(0x7f00000003c0)='ceph\x00', 0x0, &(0x7f0000000400)="010006000037a788a11d18000000000000006923c63a4541062101a59ea9cba39a989ca8", 0x24, r5) 5m9.405072701s ago: executing program 37 (id=483): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) write$tun(r1, &(0x7f0000000080)={@val={0x8, 0x800}, @val={0x2, 0x3, 0x6, 0x4d, 0x8000, 0x9}, @ipv4=@udp={{0x5, 0x4, 0x3, 0x1b, 0x62, 0x66, 0x0, 0x40, 0x11, 0x0, @private=0xa010102, @local}, {0x4f20, 0x4e22, 0x4e, 0x0, @opaque="faa7d48fdb1bd8c45b3fd77ad58563533523aca33b2aca994e0474bf1c4ac91eadc56d846732d395f58d5efab30c1d2fe62ae58851f3e388d48291dfcc2d0335c714880622ea"}}}, 0x70) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x2a, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYRES16=r0, @ANYRES32=0x0, @ANYBLOB="09feffff0000000008001b00f941000004001400040014000500270003000000080023000700000008002900c22903000400188008000f0081000000"], 0x54}, 0x1, 0x0, 0x0, 0x200000c1}, 0x0) 5m8.112261188s ago: executing program 38 (id=487): socket$nl_netfilter(0x10, 0x3, 0xc) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x200, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x2a, &(0x7f0000000100)=r3, 0x4) sendmsg$unix(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000180)="2f0359", 0x3}], 0x1, 0x0, 0x0, 0x800}, 0x20004011) recvmsg$unix(r1, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x10002) sendmsg$inet(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="8b", 0x1}], 0x1}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 4m44.001999278s ago: executing program 39 (id=700): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b70400000000000085000000010000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='kfree\x00', r1, 0x0, 0xfffffffffffffff0}, 0x18) socket$inet6(0xa, 0x1, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='mountinfo\x00') open(&(0x7f0000000080)='./file1\x00', 0x10b942, 0x1) prctl$PR_SET_NAME(0xf, &(0x7f0000000a40)='GPL\x00') getuid() 4m10.393747392s ago: executing program 40 (id=1126): creat(&(0x7f0000000240)='./bus\x00', 0xc2) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r1, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r2}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x2000000}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="5c0000001000010027bd70010000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000021000008001b000000000034001a80080002"], 0x5c}, 0x1, 0x0, 0x0, 0xc0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x18) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x141b82, 0x0) accept4$packet(r6, 0x0, &(0x7f0000000080), 0x80000) poll(&(0x7f0000000200), 0x2000000000000294, 0x7) write$cgroup_int(r6, &(0x7f0000000000)=0x700, 0x12) syz_mount_image$ext4(&(0x7f0000000580)='ext3\x00', &(0x7f0000000040)='./bus\x00', 0x1008082, &(0x7f00000005c0)={[{@nodioread_nolock}, {@nolazytime}, {@abort}, {@errors_continue}, {@data_ordered}, {@jqfmt_vfsv0}, {@nomblk_io_submit}, {@nobarrier}], [{@context={'context', 0x3d, 'root'}}, {@appraise}, {@flag='lazytime'}, {@audit}]}, 0x0, 0x5e8, &(0x7f0000000900)="$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") perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000680)={[{@nolazytime}, {@lazytime}, {@journal_path={'journal_path', 0x3d, './bus'}}, {@bsdgroups}, {@lazytime}, {@noload}]}, 0x3, 0x45c, &(0x7f0000002400)="$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") 3m56.973319421s ago: executing program 41 (id=1293): timer_gettime(0x0, 0x0) 3m45.183945497s ago: executing program 42 (id=1443): r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0xad3c3b, 0xffffffffffffffff, 0x7, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2, 0x0, 0x2}, 0x18) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x29}, './file0\x00'}) 3m21.897814906s ago: executing program 43 (id=1669): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x2, @perf_config_ext={0xf60, 0xffffffff}, 0x1100, 0x5dd8, 0x3a65, 0x5, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f00000001c0)='rxrpc_abort\x00', r1}, 0x18) r2 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) sendmsg$tipc(r2, &(0x7f00000005c0)={&(0x7f0000000000), 0x10, &(0x7f0000000480)=[{&(0x7f0000000180)="f7", 0x101d0}], 0x1}, 0x0) 3m7.005497155s ago: executing program 44 (id=1864): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) keyctl$instantiate_iov(0x14, 0x0, &(0x7f00000003c0)=[{0x0}, {0x0}, {0x0}, {0xffffffffffffffff}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) 3m1.581946762s ago: executing program 0 (id=1924): socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001b00)=@newqdisc={0x78, 0x24, 0xd0f, 0x0, 0x25dfdbff, {0x60, 0x0, 0x0, r1, {0x0, 0xffe0}, {0xffff, 0xffff}, {0x4, 0x1}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{0x5, 0x14, 0xfcc, 0x400, 0x9}, 0x81, 0x0, 0xc8c3, 0x40, 0x4, 0x1c, 0x11, 0x9, 0x8, 0xffffffff, {0xfffffff5, 0x4, 0xad8, 0x7, 0x4, 0x4}}}}]}, 0x78}}, 0x4) 3m1.581338771s ago: executing program 0 (id=1925): syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0xa00008, &(0x7f0000000340)={[{@noacl}]}, 0xfc, 0x7bb, &(0x7f00000007c0)="$eJzs3c9rHNcdAPDvrHYlWVYrFQqtexIUWoGxVLmq3UKh6qkUajA0Z9titRaOVl6jlY0lBLYJgVxySMghEF98jhPn5mt+XJNL/oYcgo2TyCYOOQSF2Z21VtKuLNvaXQd9PjDa92Zm973vvJ03TzvDTAAH1lj6JxdxJKKQJkey+UlkMyIfMVNf7/H6WjGdktjY+P+3SW2dR+trxWh6T+pwlvl9RHz6esTR3M5yqyurC7Plcmkpy08uL16arK6sHruwODtfmi9dPDE1PX385N9Onti/WL//YnX4/lv/+fOHMz++9rs7b36WxEwMZ8ua49gvYzGWbZNCugk3Ffa7pN5Lel0Bnku6a/bV9/I4EiPRt0tL/qurNQMAOuVaRGwAAAfLgOM/ABw0jd8BHq2vFRtT1M/nXO/pDxNd8uDfETFYj79xfrO+JF8/Z/flYO103dCjpHaOpCGJiNF9KH8sIm7ePXM7naJD5yEBWrl+IyLOjY5t7//THm7mBT/7L3tYZ2xbXv8H3fNxOv75++b478GTEWEu2/8Ha3+3j38GWuy7z+Pp+3/u3pbsPl87lY7//tl0bdvm+O/JRWujfVnuV7UxXyE5f6FcSvu2X0fEeBQG0vzULmWMP/zpYbtlzeO/795+9f20/PR1c43cvfzA1vfMzS7PvkjMzR7ciPhDvlX8yZP2T9qMf0/vsYz//uON99otS+NP421MO+PvrI1bEX9q2f6b10Elu16fOFn7Okw2vhQtfPTVu0Ptym9u/5t305LWio3/Bbohbf+h3eMfTZqv16w+exmf3xr5pN2yrfGfuZ2WvzX+1t///uSVWro/m3d1dnl5aSqiP/nfzvnHN9/byDfWT+Mf/2Pr/X+373/aDZ3L0htPufgxf/+bD54//s5K459L2z/Jgnhq+z974s7jhb525e+t/adrqfFszs7+L7/jc/dawRfaeAAAAAAAAAAAAAAAAAAAAAAAAACwR7mIGI4kN5HdM3E4crmJifozvH8bQ7lypbp89Hzl8sW5qD0rezQKucatLkea7oc6ld0Pv5E/vi3/14j4TUS8M3Colp8oVspzvQ4eAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADKHm57/n2t6/n/q64Fe1w4A6JjBXlcAAOg6x38AOHjaHP/7W88+1NG6AADdUTv+J/leVwMA6CK//wPAweP4DwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQIedPnUqnTZ+WF8rpvm5KyuXFypXjs2VqgsTgxFRrCxdmpivVObLpYliZbHtB12vv5QrlUvTcfHy1cnlUnV5srqyenYxn60yXzpbKnQlKgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4NtWV1YXZcrm0JLF74trKaiHbZj2sxo2sCr3eGt1NDL8c1Xj5EgMR0akimnuJQ93vmAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB+IX4OAAD//0TBFTs=") bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0x5, 0x29fd, 0x84, 0x105, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0x5, 0x29fd, 0x84, 0x105, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000005"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000740)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xc000, &(0x7f0000000000)={[], [{@seclabel}]}, 0x2, 0x246, &(0x7f0000000ac0)="$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") openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x141042, 0x0) (async) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x141042, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r4}, 0x10) pwritev2(r3, &(0x7f00000001c0)=[{&(0x7f0000000080)="ff", 0xfdef}], 0x1, 0xe7b, 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000240)=ANY=[@ANYBLOB="06000000000000000153d3000000000005"]) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r0}, 0x38) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000100)={0x0, &(0x7f0000000040)=""/129, &(0x7f0000000680), &(0x7f0000000000), 0x6c, r0}, 0x38) (async) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000100)={0x0, &(0x7f0000000040)=""/129, &(0x7f0000000680), &(0x7f0000000000), 0x6c, r0}, 0x38) 3m0.194026541s ago: executing program 0 (id=1933): munmap(&(0x7f0000002000/0x3000)=nil, 0x3000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) sendmsg(r0, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000340)}], 0x1}, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, &(0x7f0000001380)=""/4080, 0xfffffffffffffdcc, 0x0, 0x0, 0xffffffffffffff29}, &(0x7f0000000000)=0x40) 3m0.038269413s ago: executing program 0 (id=1937): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="58000000020605000000000000000000000000000900020073797a3100000000050005000a000000050001000600000013000300686173683a6e65742c696661636500000c0007800800124005000000050004"], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x800) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64=r0, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000080)='sys_enter\x00', r2}, 0x10) epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x7fff, 0x0, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000001b80)={&(0x7f00000002c0)=ANY=[@ANYBLOB="020afe00000000000010000100000000000000a7e25281097a0000e54d6d8ae02a148c1c6b7f01fb68e64cb84e6fb2ca06e4ddbbbc791c66375232c5530329be8b7f8c7dbb2164276c5801db3501c0800be65614a4a904dca12923e65e8c696d60917d2933f4b38d6b0c80ae"], 0x10}}, 0x20000804) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00', r4}, 0x9) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/wakeup_count', 0x404900, 0x170) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x9f, 0x0, 0x0, 0x0, 0xfffffffc, 0xfffe, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) r5 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r5, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) 2m58.381262026s ago: executing program 0 (id=1952): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="9c0000000008010300000000004f4300020000020900010073797a31000000001c000480080006400000000208000740000000080800063a00001000050003000100000014000480080001400000000c0800024000000003340004800800014000000007080001400000000908000140000009fc080001400000000d0800014000000005080001400000000505000300880000000600024088be00001006bf2dd9"], 0x9c}, 0x1, 0x0, 0x0, 0x20000011}, 0x4) (fail_nth: 2) 2m58.270128578s ago: executing program 0 (id=1954): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='kfree\x00', r1}, 0x18) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8001000000000000, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x8, 0x3, 0x1f0, 0x0, 0x11, 0x148, 0xb8, 0x0, 0x158, 0x2a8, 0x2a8, 0x158, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x2000000, 0x8}}}, {{@ip={@loopback, @loopback, 0xff000000, 0xff, 'hsr0\x00', 'pimreg\x00', {}, {0xff}, 0x4, 0x2, 0xb}, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x250) 2m58.225872729s ago: executing program 45 (id=1954): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='kfree\x00', r1}, 0x18) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x8001000000000000, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x8, 0x3, 0x1f0, 0x0, 0x11, 0x148, 0xb8, 0x0, 0x158, 0x2a8, 0x2a8, 0x158, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x2000000, 0x8}}}, {{@ip={@loopback, @loopback, 0xff000000, 0xff, 'hsr0\x00', 'pimreg\x00', {}, {0xff}, 0x4, 0x2, 0xb}, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x250) 1m58.754913777s ago: executing program 7 (id=2855): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000600)='./file0\x00', 0xc8d0, &(0x7f0000000140)=ANY=[@ANYRES8=0x0], 0x1, 0x2e3, &(0x7f0000000280)="$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") truncate(&(0x7f0000000000)='./file1\x00', 0xd105) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) openat$tun(0xffffffffffffff9c, 0x0, 0x80080, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xffd, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r3}, &(0x7f0000000040), &(0x7f0000000080)=r4}, 0x20) truncate(&(0x7f0000000040)='./file1\x00', 0x8de4) 1m58.364953902s ago: executing program 6 (id=2860): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x400000, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x62, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r3}, 0x3d) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0x5a, &(0x7f0000000500)=ANY=[@ANYRESHEX=r2], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r4}, 0x3d) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000300)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000580)='sched_switch\x00', r5}, 0x10) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000040)="3700000013000318680907070000000f0000ff3f13000000170a001700000000040037000d00030001362564aa58b9a6c0", 0x31}], 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000020000000c00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00]\x00\x00'], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r7}, 0xb) clock_nanosleep(0xfffffff2, 0xca9a3b, &(0x7f0000000000)={0x77359400}, 0xfffffffffffffffe) r8 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x14) fcntl$setsig(r8, 0xa, 0x13) fcntl$setlease(r8, 0x400, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000280)) 1m57.201981199s ago: executing program 7 (id=2876): r0 = io_uring_setup(0x56ad, &(0x7f0000000780)={0x0, 0x826e, 0x10000, 0xffffffff, 0x20002}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000640)=[{0x0}], 0x1) syz_clone3(&(0x7f0000000000)={0x285002400, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x46) io_uring_register$IORING_REGISTER_FILES(r0, 0x1e, &(0x7f0000000000)=[r0], 0x1) 1m57.036816591s ago: executing program 7 (id=2879): syz_mount_image$ext4(&(0x7f0000000880)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x21000e, &(0x7f0000000380), 0xde, 0x52d, &(0x7f0000001500)="$eJzs3c1vHGcZAPBnxrvBaVzsAodSqR+iQUkF2Y1r2loc2iIQt0qgcg+WvbGsrLORd93GVgWO+AOQEIJKnDhxQeLGBQnlT0BIlcgdAQIhSOHAARg0s7Ops8wmtrIfqf37Se/uO+/szvO8G+/sOx+ZCeDUeiEi3oyIuYh4KSIWy/a0LHHQL/nrPrz73npe8ua3/5ZEUrZFFNV7zpVvm+8/Veru7V9ba7dbO+V0s7d9o9nd27+0tb222dpsXV9ZWX519bXVV1Yvj6Wfeb9e/9qffvT9n3399V9/8d3fX/nLxe/kSX+1nD/o1/gUn17cKR7r+WdxTy0idsYbbGbmyv7UZ50IAABHko9SPxURnyvG/4sxV4zmCsNDuvnpZwcAAACMQ/bGQvw7icgAAACAE+uNiFiIJG2U5wIsRJo2Gv1zeD8TT6TtTrf3haud3esb+byIpainV7farcvlObVLUU/y6eWi/tH0y0PTKxHxVET8cPFsMd1Y77Q3Zr3zAwAAAE6Jc0Pb//9c7G//AwAAACfM0qwTAAAAACZu1PZ/MuU8AAAAgMlx/B8AAABOtG+89VZessH9rzfe2du91nnn0kare62xvbveWO/s3GhsdjqbxTX7th+0rHpEtDudG1+K2L3Z7LW6vWZ3b//Kdmf3eu/KlvsHAgAAwKw89fztO0lEHHz5bFFyZ/KHuRFvcK4AnBjpcV78x8nlAUzfqJ/5IzgzzjyA6avNOgFgdg5mnQAwa/dd6qNiUHD45J379hn8ZnI5AQAA43Xhs7fvfLfi+H+tPJ8fOLmOdfwfOFEe4fg/8DHn+D+cXvVjjQBuTTATYFYedquPkRfvqDr+X3lmcJY9dFkAAMBELRTl+bRRHgtciDRtNCKeLP6rfz25utVuXY6IT0bE7xbrn8inl4t3Jm4PCAAAAAAAAAAAAAAAAAAAAAAAAABHlGVJZAAAAMCJFpH+OSnv/3Vh8fzC8P6BM8m/FqO8pde7P3n7xzfXer2d5bz97/fae++X7S/PYg8GAAAAnEa1B84dbKcPtuMBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYJw+vPve+qBMM+5fvxIRS1XxazFfPM9HPSKe+EcStUPvSyJibgzxD25FxNNV8ZM8rVgqsxiOn0bE2enEfzbLssr458YQH06z2/n6582q718aLxTP1d//Wlke1X3rvzO/PDQnvbf+mxux/nvyiDGe+eAXzZHxb0U8U6te/wziJyPiv1i1wIoP5dvf2t//v8b+wiP7acSFyt+f5L5Yzd72jWZ3b//S1vbaZmuzdX1lZfnV1ddWX1m93Ly61W6Vj1Uh4gfP/uq/Q9H/k/UV/Y8R8Zce0v/zeaV+qDEbDlMG++Dm3U/3q/WhRRTxL75Y/ff39APi538Tny9/B/L5Fwb1g379sOd+/tvnKhMr42+M6P/D/v0vjlrokJe++b0/HPGlAMAUdPf2r621262diVfez7JsWrGOXon0qC8uhotT/cSmWxmM7iYWYv5x6emUK+cfjzSOUxnHni0AAOBx89Ggf9aZAAAAAAAAAAAAAAAAAAAAwOnV3Yt00pcTG455MJuuAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA80P8CAAD//yOS2ac=") r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0e00000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00@\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000e07b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECUREBITS(0x1c, 0x1d) setuid(0xee01) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x800, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0x8004587d, &(0x7f00000001c0)={@id={0x2, 0x0, @b}}) renameat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffff9c, &(0x7f0000001240)='./file1\x00', 0x4) 1m56.580821798s ago: executing program 7 (id=2885): syz_mount_image$ext4(&(0x7f0000000700)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x8052, &(0x7f0000000380)={[{@grpjquota}, {@init_itable_val={'init_itable', 0x3d, 0x7}}, {@dioread_nolock}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7fffffff}}]}, 0x3, 0x4de, &(0x7f0000000c40)="$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") syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000300)='./file0\x00', 0x51, &(0x7f0000000a80)={[{@nombcache}, {@resgid}, {@norecovery}, {@commit={'commit', 0x3d, 0x5}}, {@nobh}], [{@fsuuid={'fsuuid', 0x3d, {[0x34, 0x31, 0x37, 0x64, 0x34, 0x61, 0x62, 0x61], 0x2d, [0x62, 0x36, 0x63, 0x63], 0x2d, [0x31, 0x32, 0x31, 0x36], 0x2d, [0x37, 0x62, 0x65, 0x65], 0x2d, [0x61, 0x37, 0x33, 0x63, 0x66, 0x65, 0x66, 0x34]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ip_vti0\x00'}}, {@obj_type={'obj_type', 0x3d, 'commit'}}]}, 0x8, 0x603, &(0x7f0000001780)="$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") openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) r1 = gettid() mount$tmpfs(0x0, &(0x7f0000000080)='.\x00', &(0x7f00000000c0), 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r3) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r2, 0x0, &(0x7f00000002c0)=""/28}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0xfffffffffffffdd0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) r6 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000340)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="18000042dfb036b400000000000000000000000800000000"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, r6) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0), 0x401, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000400)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = eventfd2(0x0, 0x0) write$eventfd(r8, &(0x7f0000000140)=0xfffffffffffffff8, 0x8) syz_open_dev$tty1(0xc, 0x4, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1c, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRESDEC=r4, @ANYBLOB="0000000000000000b7080000000021007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) r9 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x0, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x8, 0x3, 0x4b0, 0x0, 0x11, 0x148, 0x0, 0x0, 0x440, 0x2a8, 0x2a8, 0x440, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x88000000, 0x3, 0x7}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0xd8, 0x0, {}, [@common=@unspec=@quota={{0x38}, {0x0, 0x0, 0x81}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x510) 1m55.854390408s ago: executing program 7 (id=2895): socket$rxrpc(0x21, 0x2, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000200008385000000710000001801000002696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x6, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000240), &(0x7f00000003c0)=r0}, 0x20) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000380)={r5, r2, 0x25, 0x2, @val=@tcx={@void, @value}}, 0x1c) syz_emit_ethernet(0x6e, &(0x7f0000000400)={@broadcast, @random="be9689ce9f88", @val={@val={0x88a8, 0x6, 0x1, 0x4}, {0x8100, 0x0, 0x0, 0x2}}, {@ipv4={0x800, @gre={{0x5, 0x4, 0x1, 0x1, 0x58, 0x66, 0x0, 0x5, 0x2f, 0x0, @rand_addr=0x64010102, @remote}, {{0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x3}, {0x1, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x1}, {0x8, 0x88be, 0x4, {{0x1, 0x1, 0x7, 0x2, 0x1, 0x0, 0x2, 0xc}, 0x1, {0x1}}}, {0x8, 0x22eb, 0x2000006, {{0x9, 0x2, 0x6, 0x1, 0x1, 0x1, 0x1}, 0x2, {0x1, 0x100, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1}}}, {0x8, 0x6558, 0x1}}}}}}, 0x0) 1m55.582162911s ago: executing program 7 (id=2897): socket$rxrpc(0x21, 0x2, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000200008385000000710000001801000002696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x6, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000240), &(0x7f00000003c0)=r0}, 0x20) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000380)={r5, r2, 0x25, 0x2, @val=@tcx={@void, @value}}, 0x1c) syz_emit_ethernet(0x6e, &(0x7f0000000400)={@broadcast, @random="be9689ce9f88", @val={@val={0x88a8, 0x6, 0x1, 0x4}, {0x8100, 0x0, 0x0, 0x2}}, {@ipv4={0x800, @gre={{0x5, 0x4, 0x1, 0x1, 0x58, 0x66, 0x0, 0x5, 0x2f, 0x0, @rand_addr=0x64010102, @remote}, {{0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x3}, {0x1, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x1}, {0x8, 0x88be, 0x4, {{0x1, 0x1, 0x7, 0x2, 0x1, 0x0, 0x2, 0xc}, 0x1, {0x1}}}, {0x8, 0x22eb, 0x2000006, {{0x9, 0x2, 0x6, 0x1, 0x1, 0x1, 0x1}, 0x2, {0x1, 0x100, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1}}}, {0x8, 0x6558, 0x1}}}}}}, 0x0) 1m55.459395293s ago: executing program 46 (id=2897): socket$rxrpc(0x21, 0x2, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000200008385000000710000001801000002696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x6, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000240), &(0x7f00000003c0)=r0}, 0x20) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000380)={r5, r2, 0x25, 0x2, @val=@tcx={@void, @value}}, 0x1c) syz_emit_ethernet(0x6e, &(0x7f0000000400)={@broadcast, @random="be9689ce9f88", @val={@val={0x88a8, 0x6, 0x1, 0x4}, {0x8100, 0x0, 0x0, 0x2}}, {@ipv4={0x800, @gre={{0x5, 0x4, 0x1, 0x1, 0x58, 0x66, 0x0, 0x5, 0x2f, 0x0, @rand_addr=0x64010102, @remote}, {{0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x0, 0x3}, {0x1, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x1}, {0x8, 0x88be, 0x4, {{0x1, 0x1, 0x7, 0x2, 0x1, 0x0, 0x2, 0xc}, 0x1, {0x1}}}, {0x8, 0x22eb, 0x2000006, {{0x9, 0x2, 0x6, 0x1, 0x1, 0x1, 0x1}, 0x2, {0x1, 0x100, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1}}}, {0x8, 0x6558, 0x1}}}}}}, 0x0) 1m52.898171079s ago: executing program 6 (id=2926): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000600)='./file0\x00', 0xc8d0, &(0x7f0000000140)=ANY=[@ANYRES8=0x0], 0x1, 0x2e3, &(0x7f0000000280)="$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") truncate(&(0x7f0000000000)='./file1\x00', 0xd105) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x80080, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x3, 0x800000000003}, 0x1100, 0x5dd8, 0x0, 0x5, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xffd, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) truncate(&(0x7f0000000040)='./file1\x00', 0x8de4) 1m51.970336552s ago: executing program 6 (id=2938): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x2002, 0x1, 0x220, [0x0, 0x0, 0x0, 0x0, 0x96f0, 0x20000500], 0x7, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0100000011000000000000000000a22a30456b880000145b41fe69e3ffff78616d3000000000000000000000000079616d3000000000000000000000000076657468315f742f5f626f6e640000000180c20000000000000000000180c20000000800000000000000b100000067010000900100007374617469737469630000000000000000000000000000000000000000000000180000000000000000000000000000000000000000000000000000000000646e61740000060000000000ff0300000000000000000000000000000000000010000000000000000180c20000000000bb8e66505c1aa6d062c3b52cffffffff000000006e666c6f670000000000000000000000000000000000000050000000121b6eb244c4f0fffbf04a000000007e4b000022569e338e2c551c2fc4a19597ba4c501c8b1f16fb7809c40aeea768e825383d2afb577ed2bb6dd99fd43741089cca6edb0041555449540000000000000000000000000626967e000000000000000000000008000000000000200000000000000000840200"/544]}, 0x298) 1m51.929086233s ago: executing program 6 (id=2939): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x800000000003}, 0x1320, 0xffffffff, 0x3, 0x5, 0x8, 0x1088f109, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xb, 0x0, 0x0, 0xd91, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @sk_lookup=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x5, 0x82000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x1100, 0x5dd8, 0x0, 0x7, 0x0, 0x8, 0xfffb, 0x0, 0x61, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000140)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x3f8, 0x0, 0x32, 0x0, 0x3}, 0x9c) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0xd, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0xfee4, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x1) sendmmsg$inet6(r1, &(0x7f0000000080)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="af", 0x34000}], 0x1}}], 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x50, &(0x7f0000000280)={0x0, &(0x7f0000000080)}, 0x10) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'netdevsim0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0200000004000000008001400200000000000000", @ANYRES32, @ANYBLOB="0000000000000000000000000000000180000000", @ANYRES32=r4], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f00000007c0), 0x10400, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r5, 0xc0189373, &(0x7f0000000800)={{0x1, 0x1, 0x18, r2}, './file0/file0\x00'}) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0xe, &(0x7f0000000700)={[{@nolazytime}, {@nolazytime}, {@debug}, {@lazytime}, {@nombcache}, {@noload}]}, 0x3, 0x440, &(0x7f0000000cc0)="$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") creat(&(0x7f0000000040)='./bus\x00', 0xa6) mount(&(0x7f00000002c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r6 = open(&(0x7f0000000040)='./bus\x00', 0x44842, 0x0) pwritev2(r6, &(0x7f0000000240)=[{&(0x7f0000000000)='$', 0x3fec00}], 0x2, 0x1400, 0x0, 0x3) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) lseek(r7, 0xfffffffffffffffc, 0x2) 1m51.494829649s ago: executing program 6 (id=2942): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000d8d60b007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(0xffffffffffffffff, 0x0, 0x24000004) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r1}, 0x18) syz_emit_ethernet(0xfdef, &(0x7f0000000380)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x33, 0x0, @private, @broadcast}, {0x0, 0x0, 0x8}}}}}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000014c0)={0xffffffffffffffff, 0x0, 0x62, 0x87, &(0x7f00000000c0)="e5ee0de62f6ec77e10511c754ca611bea25392a0bc1896da07cf7901ca1e2e8d66139c74df2562bba39d93d960f2bb7668d2d509672dabb734642e95b995b371e6e0d4ebb3734c1957a15b6ad1f00a03fef47a867fdc11f6a18597463715d635f50e", &(0x7f00000002c0)=""/135, 0x7fff, 0x0, 0x1000, 0xf7, &(0x7f00000003c0)="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", &(0x7f00000013c0)="a42973a86e79b0a38440e070722ac65b98c65714a8e5dd1388456d81ee80ff8aa96f38855c45ddd44c36a49c40cf53d80f336d4607ae7613269067346c0d071ee7d564fdfc263a6b4c71d75536eb9063a6e65ecc7dc13fc4b48823971dfae5e5557a045ddd0602ce0948483a47fc3d9855b881c5181ba4ce903b16b77453c20af7de060b4922b5e31effdfbf90303c049822a848a7412ad16e31caa17d5319449a0f61d7d91ad740f37a9d502549acfdcda24eb58e9f0cec31965f2e8955cb91e27e53207bc05abc16f4a1bca45d42800248acf3efdcbfe057e801cb3d2a24985b5c6c0fc93f7996c8e80f4c5fbe7e4b1f97b8a7c42753", 0x1, 0x0, 0x73cf}, 0x50) 1m50.782067419s ago: executing program 6 (id=2952): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000600)='./file0\x00', 0xc8d0, &(0x7f0000000140)=ANY=[@ANYRES8=0x0], 0x1, 0x2e3, &(0x7f0000000280)="$eJzs3M9LG2kYwPEnMYkxoslh2WUXFh92L7uXQbP3paEolAYq1pT+gNJRJ23INJFMsKSU2p56Lf0jehCP3oTWf8BLbz310puXQg/1UDol8yNGjdXGH/HH9wPyvvq8T+Z9Z1Sed2Bm4+bLh+WiYxTNukSTKhERkU2RjEQlFAnaqNdPSLtn8u/g5/d/Xr91+2ounx+fUp3ITf+XVdXhkTePngwEw1b7ZT1zd+NT9uP6r+u/b3ybflBytORopVpXU2eqH+rmjG3pXMkpG6qTtmU6lpYqjlXz41U/XrSr8/MNNStzQ6n5muU4alYaWrYaWq9qvdZQ875ZqqhhGDqUEuynsDQ1Zea6TJ494sngmNRqObNPRAZ2RQpLPZkQAADoqaD+b1X70WZJ3039H+tY/y//tVYfvLEyHNT/q4lm/S/SVv/f2/qsbfV/UkSOvf7fXRGdL6774/ih6n+cEc36PxX8/Xqe31ke9TrU/wAAAAAAAAAAAAAAAAAAAAAAnAWbrpt2XTcdtuFXv4gkvSdI/O97PU8cD67/xbb14o7YsIj9YqGwUPDbYMCaiNhiyaik5av3+xBo9hOi3iBtyshbezHIX1wo9HmRXFFKXv6YpCWzM991J67kx8fUtz0/Lqn2/Kyk5ZfO+dmd+fFmm5B//m7LNyQt72alKrbMBU/GhflPx1QvX8vvOP6ANw4AAAAAgPPA0JbW/r2/PW7sjvv7Yz/e2l93vD/g769HO+7vY/JHrFerBgAAAADgYnEaj8umbVu1c9cJV3jQrPC9xnuMiUhkr9ARdMKDn4JTFz/QGYt2NdWRxE9elI6d8LbRXmNksptPdtMihz2Hv716/eXorsX/K8l9VtptJ7HfSuMn9x8IAAAAwEnZKvrDn1zq7YQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALiATuLFcr1eIwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHBafA8AAP//ohEIjg==") truncate(&(0x7f0000000000)='./file1\x00', 0xd105) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x80080, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xffd, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) fchdir(0xffffffffffffffff) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r7}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r6}, &(0x7f0000000040), &(0x7f0000000080)=r7}, 0x20) truncate(&(0x7f0000000040)='./file1\x00', 0x8de4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) 1m50.680516071s ago: executing program 47 (id=2952): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000600)='./file0\x00', 0xc8d0, &(0x7f0000000140)=ANY=[@ANYRES8=0x0], 0x1, 0x2e3, &(0x7f0000000280)="$eJzs3M9LG2kYwPEnMYkxoslh2WUXFh92L7uXQbP3paEolAYq1pT+gNJRJ23INJFMsKSU2p56Lf0jehCP3oTWf8BLbz310puXQg/1UDol8yNGjdXGH/HH9wPyvvq8T+Z9Z1Sed2Bm4+bLh+WiYxTNukSTKhERkU2RjEQlFAnaqNdPSLtn8u/g5/d/Xr91+2ounx+fUp3ITf+XVdXhkTePngwEw1b7ZT1zd+NT9uP6r+u/b3ybflBytORopVpXU2eqH+rmjG3pXMkpG6qTtmU6lpYqjlXz41U/XrSr8/MNNStzQ6n5muU4alYaWrYaWq9qvdZQ875ZqqhhGDqUEuynsDQ1Zea6TJ494sngmNRqObNPRAZ2RQpLPZkQAADoqaD+b1X70WZJ3039H+tY/y//tVYfvLEyHNT/q4lm/S/SVv/f2/qsbfV/UkSOvf7fXRGdL6774/ih6n+cEc36PxX8/Xqe31ke9TrU/wAAAAAAAAAAAAAAAAAAAAAAnAWbrpt2XTcdtuFXv4gkvSdI/O97PU8cD67/xbb14o7YsIj9YqGwUPDbYMCaiNhiyaik5av3+xBo9hOi3iBtyshbezHIX1wo9HmRXFFKXv6YpCWzM991J67kx8fUtz0/Lqn2/Kyk5ZfO+dmd+fFmm5B//m7LNyQt72alKrbMBU/GhflPx1QvX8vvOP6ANw4AAAAAgPPA0JbW/r2/PW7sjvv7Yz/e2l93vD/g769HO+7vY/JHrFerBgAAAADgYnEaj8umbVu1c9cJV3jQrPC9xnuMiUhkr9ARdMKDn4JTFz/QGYt2NdWRxE9elI6d8LbRXmNksptPdtMihz2Hv716/eXorsX/K8l9VtptJ7HfSuMn9x8IAAAAwEnZKvrDn1zq7YQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALiATuLFcr1eIwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHBafA8AAP//ohEIjg==") truncate(&(0x7f0000000000)='./file1\x00', 0xd105) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x80080, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xffd, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) fchdir(0xffffffffffffffff) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r7}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r6}, &(0x7f0000000040), &(0x7f0000000080)=r7}, 0x20) truncate(&(0x7f0000000040)='./file1\x00', 0x8de4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) 1m43.040178948s ago: executing program 8 (id=3094): syz_mount_image$ext4(&(0x7f0000000880)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x21000e, &(0x7f0000000380), 0xde, 0x52d, &(0x7f0000001500)="$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") prctl$PR_SET_SECUREBITS(0x1c, 0x1d) setuid(0xee01) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x800, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x8004587d, &(0x7f00000001c0)={@id={0x2, 0x0, @b}}) renameat2(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, &(0x7f0000001240)='./file1\x00', 0x4) 1m42.656531584s ago: executing program 8 (id=3098): syz_open_dev$usbmon(&(0x7f00000000c0), 0xcfae, 0x84102) 1m33.740096979s ago: executing program 8 (id=3100): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000400)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000600)='./file0\x00', 0xc8d0, &(0x7f0000000140)=ANY=[@ANYRES8=0x0], 0x1, 0x2e3, &(0x7f0000000280)="$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") fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x80080, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xffd, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r4}, &(0x7f0000000040), &(0x7f0000000080)=r5}, 0x20) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, &(0x7f0000bbdffc)) 1m32.798942602s ago: executing program 8 (id=3165): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xb8af, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000600)='kfree\x00', r0}, 0x18) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x1, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x3, 0x800000000003}, 0x1100, 0xcfe, 0x0, 0x5, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x30, &(0x7f0000000180)={&(0x7f00000008c0)=ANY=[@ANYBLOB="24000000190001000000000000c3b2000a0000000003c8000000000008000600ffffffff"], 0x24}, 0x1, 0x0, 0x0, 0x40080}, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/drivers\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000001140)='ext4\x00', &(0x7f00000007c0)='./file1\x00', 0x410c84, &(0x7f0000000340), 0x1, 0x775, &(0x7f0000001900)="$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") r2 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x88882, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./bus\x00', 0x1c5902, 0x2d) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x6, 0x9, 0x6, 0x40000, 0x1, 0x547c2e39, '\x00', 0x0, r3, 0x0, 0x4, 0x2, 0x1, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1ff}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x600}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}, 0x1, 0x2}, 0x0) write(r4, &(0x7f0000004200)='t', 0x1) sendfile(r4, r3, 0x0, 0x7ffff000) fallocate(r2, 0x4a, 0xffffffffffffffff, 0x80000005) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="001d000000ebf1537e2aa76fb058920000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) read$rfkill(r1, &(0x7f0000000040), 0x8) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r7}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40001, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000000000000000000000100000850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) getpgrp(0x0) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_GET(0xffffffffffffffff, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000a00), 0x2003, 0x0) 1m31.868779056s ago: executing program 8 (id=3169): perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0x0, 0xffffffffffffffff, 0x9) syz_open_pts(0xffffffffffffffff, 0x0) syz_io_uring_setup(0x4b5, &(0x7f0000010400)={0x0, 0x86e1, 0x1, 0x8}, &(0x7f0000010080), &(0x7f0000000000)) socket$vsock_stream(0x28, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r3, 0x24, &(0x7f00000000c0)={0x2, 0x0, 0x402, 0x200000000000}) bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xc, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) 1m27.736588324s ago: executing program 8 (id=3226): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000180)={r0, 0xffffffffffffffff}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000a40)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa4000000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x68, r4, 0x401, 0x0, 0x0, {{}, {}, {0x4c, 0x18, {0xffffffff, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 1m27.718090424s ago: executing program 48 (id=3226): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000180)={r0, 0xffffffffffffffff}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000a40)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa4000000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_PRI(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x68, r4, 0x401, 0x0, 0x0, {{}, {}, {0x4c, 0x18, {0xffffffff, @link='broadcast-link\x00'}}}}, 0x68}}, 0x0) 1m0.849937933s ago: executing program 3 (id=3741): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_mount_image$vfat(&(0x7f0000000880), &(0x7f0000003200)='./file2\x00', 0x4204, &(0x7f0000003240)=ANY=[], 0x3, 0x335, &(0x7f0000000a40)="$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") r0 = creat(&(0x7f0000000300)='./bus\x00', 0x72) dup3(0xffffffffffffffff, r0, 0x0) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r1, 0x3f0a, &(0x7f0000000540)=[&(0x7f00000000c0)={0xf04aef, 0x3d8, 0x4, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) socket$nl_netfilter(0x10, 0x3, 0xc) 1m0.721823034s ago: executing program 3 (id=3748): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000180)='kfree\x00', r1, 0x0, 0xa26}, 0x18) r2 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x0, 0x1, 0x7, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') 1m0.651372015s ago: executing program 3 (id=3751): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000600)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000600)='./file0\x00', 0xc8d0, &(0x7f0000000140)=ANY=[@ANYRES8=0x0], 0x1, 0x2e3, &(0x7f0000000280)="$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") truncate(&(0x7f0000000000)='./file1\x00', 0xd105) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x80080, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xffd, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r3}, &(0x7f0000000040), &(0x7f0000000080)=r4}, 0x20) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, &(0x7f0000bbdffc)) 59.734901238s ago: executing program 3 (id=3757): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x8041) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000200)='sched_switch\x00', r1}, 0x10) r2 = socket$inet6(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000190001000000000000000000021800"], 0x2c}}, 0x0) sendto$inet6(r2, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file2\x00', 0x2208017, &(0x7f0000000040), 0x1, 0x520, &(0x7f0000000240)="$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") r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r5 = openat$cgroup_devices(r4, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r5, &(0x7f00000003c0)={'b', ' *:* ', 'r\x00'}, 0x8) write$cgroup_devices(r5, &(0x7f00000009c0)=ANY=[@ANYRES32=r1, @ANYRESHEX=r4], 0xffffffa3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'tunl0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=@newqdisc={0x58, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x1, {0xc, 0x6, 0xc934, 0x0, 0x10001, 0x3, 0x0, 0x42b, 0x8001}}}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40000}, 0x4004010) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000980)={0xffffffffffffffff, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000003c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, &(0x7f0000000400)=[0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x72, &(0x7f0000000600)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0x76, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="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", @ANYRESOCT=r6], &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) r10 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_mtu(r10, 0x0, 0xa, &(0x7f0000000380), &(0x7f0000000680)=0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r9, 0x0, 0x100}, 0x18) r11 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r11, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/156, 0x9c}], 0x1, &(0x7f0000001d80)=[{&(0x7f0000001cc0)=""/116, 0x74}], 0x1, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) 59.580241291s ago: executing program 3 (id=3764): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000006c59850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='inode_foreign_history\x00', r0}, 0x18) r1 = socket$inet(0x2, 0x2, 0x1) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x14}, 0x4010) sendmsg$inet(r1, &(0x7f0000000600)={&(0x7f0000000040)={0x2, 0xffff, @multicast2}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000400)='\b\x00', 0x2}, {&(0x7f00000004c0)}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000007000000890b040a0101027f00000100000000001c000000000000000000000008"], 0x40}, 0x20000000) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, &(0x7f00000002c0), 0x1, 0x237, &(0x7f0000000300)="$eJzs281qo1UYB/D/dKozduyHX6PTjQfd6CZovYIyzIBYUOpE/ADhHZpqaExK3oCNuOjalTfhZnDpThBvoHfhrggyq1kZaVM7bWdEFNow5PfbnCf8STiH5014Fjn7H3//1dZm3disBpm5VDKb7OZBspSZXM7YpaN15rB+Oift5s0fNu5/9+Enn763urZ2a72U26t33lkppSy8+svX3/742q+Dax/9tPDzlewtfb7/x8pve9f3buz/eefLdl3aden2BqUqd3u9QXW30yob7XqrUcoHnVZVt0q7W7f6p/LNTm97e1iq7sb83Ha/Vdel6g7LVmtYBr0y6A9L9UXV7pZGo1Hm58K/ad5bX69WJ70Lzle/v1rdTLL8SNK8N5ENAQATZf6fZub/aXAw/3929P09zfwPAAAAAAAAAAAAAABPggej0eJoNFr8e30qObzhMzp6/UySuSTXkjybZD7JQpLFJEtJnkvyfJIXkryY5KUk15O8nOSVJDdOfNakz8qj9H+66f900//pduLi7tXk992d5k5zvI7z2++u3XqrHFp6+K77OzvNy8f52+O8nM6vHD43B/nKY/OreeP1cX6Q3Xx/7Uy+nI3zP/7Ua5Rjj+1vo/FP+bg68Xyc6d9slmcv7Bj8T/Xwm62q02n1FQqF4riY9C8TF+Fh0ye9EwAAAAAAAAAAAP6Li/g74aTPCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGf9FQAA//8oagdq") openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) r2 = inotify_init() socket$inet6_icmp_raw(0xa, 0x3, 0x3a) inotify_add_watch(r2, &(0x7f0000000000)='.\x00', 0x400017e) mkdir(&(0x7f0000000100)='./control\x00', 0x184) r3 = open(&(0x7f0000022ff6)='./control\x00', 0x50500, 0x0) getdents64(r3, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000740)='ext3\x00', &(0x7f0000000140)='./bus\x00', 0x2000000, &(0x7f0000000380)={[{@bsdgroups}, {@nodiscard}, {@noblock_validity}, {@usrjquota}, {@grpquota}, {@jqfmt_vfsv1}, {@quota}, {@data_err_ignore}, {@noload}]}, 0x0, 0x51e, &(0x7f0000000940)="$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") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={0x0}, 0x2402, 0x0, 0x800000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r4) socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r4, 0x9) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) sendmmsg(r5, &(0x7f0000002840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20044000) connect$inet(r5, &(0x7f0000000000)={0x2, 0x4e22, @loopback}, 0x49) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000002c0)={0xa, 0x4e24, 0x4, @local, 0x6}, 0x1c, &(0x7f0000000580)}, 0x2000c800) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="02000000040000000800000101"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000100)={{r6}, 0x0, &(0x7f0000000300)='%pS \x00'}, 0x20) 59.335230904s ago: executing program 3 (id=3770): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001400000000000000ff000000850000000e000000850000000700000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4e, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r0, 0x3f0a, &(0x7f0000000540)=[&(0x7f00000000c0)={0xf04aef, 0x3d8, 0x4, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x200a00}]) 59.268652235s ago: executing program 49 (id=3770): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001400000000000000ff000000850000000e000000850000000700000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4e, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r0, 0x3f0a, &(0x7f0000000540)=[&(0x7f00000000c0)={0xf04aef, 0x3d8, 0x4, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x200a00}]) 18.864994114s ago: executing program 5 (id=4623): r0 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0xa) fchdir(r1) mkdir(&(0x7f0000000000)='./file0\x00', 0x26) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) lseek(r2, 0x2, 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000040)={@link_local, @local, @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x2f, 0x0, @private, @empty}, {{0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x4, 0x6558, 0x0, 0x0, [0x0]}, {0x0, 0x0, 0x0, 0x0, 0x11}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86dd, [0xffff]}, {0x8, 0x88be, 0x0, {{}, 0x1, {0x3600}}}}}}}}, 0x0) setreuid(0x0, 0xee00) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x146) getdents64(r3, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) rename(&(0x7f0000000180)='./file0\x00', &(0x7f0000000200)='./file2\x00') write$qrtrtun(r2, &(0x7f0000000080)="f618953af737cb785cf54faac85b20a955af82c7b9c1fc98d1e93b66513e2dc7b213837bf65e4fabb2131e79c6cba96f2300d618bcccbe3b0d55ec56203f58d42685fc2d64683f75", 0x48) 18.833812845s ago: executing program 5 (id=4624): accept4$x25(0xffffffffffffffff, 0x0, 0x0, 0x40800) socket$inet6(0xa, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='kfree\x00', r0}, 0x18) open(0x0, 0x0, 0x100) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000400), r2, 0x0, 0x3, 0x1}}, 0x20) 18.832297595s ago: executing program 5 (id=4625): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000600)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000600)='./file0\x00', 0xc8d0, &(0x7f0000000140)=ANY=[@ANYRES8=0x0], 0x1, 0x2e3, &(0x7f0000000280)="$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") truncate(&(0x7f0000000000)='./file1\x00', 0xd105) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x80080, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xffd, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r3}, &(0x7f0000000040), &(0x7f0000000080)=r4}, 0x20) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, &(0x7f0000bbdffc)) 17.874053758s ago: executing program 5 (id=4637): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="09000000060000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xd, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002a00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r1}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x800000, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00', r5}, 0x10) openat$cgroup_procs(r4, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) openat$cgroup_procs(r4, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) rmdir(&(0x7f0000000540)='./cgroup/../file0\x00') ioctl$TUNSETIFF(r3, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00'}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x121840, 0x0) ioctl$TUNSETIFF(r6, 0x400454da, &(0x7f0000000140)={'bond0\x00'}) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) fchdir(r2) syz_emit_ethernet(0x66, &(0x7f0000000580)={@broadcast, @random="6487a2bed3d6", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x300, 0x0, 0x0, 0x6c, 0x0, @private}}}}}, 0x0) 17.753692s ago: executing program 5 (id=4640): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000007"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='kfree\x00', r1, 0x0, 0x8000000000000}, 0x18) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'lo\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="18212a903cb9672e14b11659fa3eeb3ec1684c4c1cf42ed000001000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = socket(0x10, 0x5, 0x5) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) bind$inet(r2, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x57) r3 = socket(0x2c, 0x803, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f0000000500)={'tunl0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x3, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f2, &(0x7f0000000500)={'syztnl1\x00', 0x0}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) 14.996351089s ago: executing program 5 (id=4643): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000600)='./file0\x00', 0xc8d0, &(0x7f0000000140)=ANY=[@ANYRES8=0x0], 0x1, 0x2e3, &(0x7f0000000280)="$eJzs3M9LG2kYwPEnMYkxoslh2WUXFh92L7uXQbP3paEolAYq1pT+gNJRJ23INJFMsKSU2p56Lf0jehCP3oTWf8BLbz310puXQg/1UDol8yNGjdXGH/HH9wPyvvq8T+Z9Z1Sed2Bm4+bLh+WiYxTNukSTKhERkU2RjEQlFAnaqNdPSLtn8u/g5/d/Xr91+2ounx+fUp3ITf+XVdXhkTePngwEw1b7ZT1zd+NT9uP6r+u/b3ybflBytORopVpXU2eqH+rmjG3pXMkpG6qTtmU6lpYqjlXz41U/XrSr8/MNNStzQ6n5muU4alYaWrYaWq9qvdZQ875ZqqhhGDqUEuynsDQ1Zea6TJ494sngmNRqObNPRAZ2RQpLPZkQAADoqaD+b1X70WZJ3039H+tY/y//tVYfvLEyHNT/q4lm/S/SVv/f2/qsbfV/UkSOvf7fXRGdL6774/ih6n+cEc36PxX8/Xqe31ke9TrU/wAAAAAAAAAAAAAAAAAAAAAAnAWbrpt2XTcdtuFXv4gkvSdI/O97PU8cD67/xbb14o7YsIj9YqGwUPDbYMCaiNhiyaik5av3+xBo9hOi3iBtyshbezHIX1wo9HmRXFFKXv6YpCWzM991J67kx8fUtz0/Lqn2/Kyk5ZfO+dmd+fFmm5B//m7LNyQt72alKrbMBU/GhflPx1QvX8vvOP6ANw4AAAAAgPPA0JbW/r2/PW7sjvv7Yz/e2l93vD/g769HO+7vY/JHrFerBgAAAADgYnEaj8umbVu1c9cJV3jQrPC9xnuMiUhkr9ARdMKDn4JTFz/QGYt2NdWRxE9elI6d8LbRXmNksptPdtMihz2Hv716/eXorsX/K8l9VtptJ7HfSuMn9x8IAAAAwEnZKvrDn1zq7YQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALiATuLFcr1eIwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHBafA8AAP//ohEIjg==") truncate(&(0x7f0000000000)='./file1\x00', 0xd105) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, 0x0, 0x0, 0x0) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xffd, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) fchdir(0xffffffffffffffff) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r3}, &(0x7f0000000040), &(0x7f0000000080)=r4}, 0x20) truncate(&(0x7f0000000040)='./file1\x00', 0x8de4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00'}, 0x10) 9.90931573s ago: executing program 1 (id=4700): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000028c0)=@newtaction={0x354, 0x30, 0x100, 0x70bd29, 0x25dfdbff, {}, [{0x340, 0x1, [@m_skbedit={0x1f0, 0x19, 0x0, 0x0, {{0xc}, {0x34, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0x10, 0xa}}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0xd}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x1}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x1, 0x1, 0xffffffffeffffffb, 0x6, 0x101}}]}, {0x191, 0x6, "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"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x2}}}}, @m_skbedit={0xf8, 0x1c, 0x0, 0x0, {{0xc}, {0x34, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x2}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x72fb2a6b, 0x10001, 0x5, 0x2, 0x3}}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0x3, 0x5}}, @TCA_SKBEDIT_MARK={0x8, 0x5, 0x4}]}, {0x99, 0x6, "204e37c2d15c63412c7f66fe2acf0bb797ed23aa24ee8ab020d4097fb5b3a095adc698c5a51a2adf95464f6046f220c06b96d9e346f26daad12b430b8f7c5b44248e61a1e6afaaa60895a2f04cbf924518e2733cbe959c55a0cc8c9fca72f089af5a2f4c6611c732500d9680bbeb646c245580829949e63c094d4621102d95be9340d77360121a647fe123aa3a0222379326227c19"}, {0xc}, {0xc, 0x8, {0x3, 0x2}}}}, @m_sample={0x54, 0x10, 0x0, 0x0, {{0xb}, {0x4}, {0x25, 0x6, "5c284c3a3976241974df53e1d3b1cccfebd3f123dec3f372dd21566159734af29c"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x2}}}}]}]}, 0x354}}, 0x0) r1 = syz_clone(0x0, 0x0, 0x9, 0x0, 0x0, 0x0) kcmp(r1, r1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) r2 = socket(0x10, 0x803, 0x0) sendto(r2, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x365}, {&(0x7f0000000280)=""/85, 0x7c}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000400)=""/106, 0x645}, {&(0x7f0000000980)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x334}, {&(0x7f00000007c0)=""/154, 0x2c}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xc, &(0x7f0000000800)=ANY=[@ANYRESOCT=r0, @ANYRESHEX=0x0, @ANYRESHEX=r3, @ANYRES64=r4], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffff97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) socket$nl_netfilter(0x10, 0x3, 0xc) gettid() timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) pipe(&(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r5, 0x0, r6, 0x0, 0x7, 0x9) write$P9_RWRITE(r6, &(0x7f0000000040)={0xb, 0x77, 0x87}, 0x10c00) 7.594387263s ago: executing program 4 (id=4705): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000340)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x12, 0xffffffffffffffff, 0x6770c000) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r3) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x1b, 0xc, &(0x7f0000000b40)=ANY=[@ANYRES64=r0, @ANYBLOB="9c2ba4432885954a0998a9f0da88a609ebe35b618d885b4df3f4fc05f450881c0f85a397d43fcf2030831fc22644de5d73b5f23042b90f7a4a82f791b3b98ab3876ae6b50b2536503594e3b34e1eeb00878f87663fb2562a917306fb6af62bb39bad03ca86ffd66f4ff653b8ef26211d71f721c222c8e17bf658994e98e09002ffeb0dae36b97b782b20b01b59457c59b3f3ffa60d2045f53d9c01ed8978a7aa9fad45", @ANYRESDEC=r0], 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x10000010, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x400000, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) timer_create(0x7, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRES32=r4, @ANYRES32, @ANYRESHEX], &(0x7f0000002240)='GPL\x00', 0x0, 0xfffffffffffffeac, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0xfffffffffffffd6e, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r7}, 0x18) ioctl$TIOCVHANGUP(r6, 0x5437, 0x2) connect$pppl2tp(0xffffffffffffffff, 0x0, 0x0) lgetxattr(0x0, &(0x7f0000000040)=@known='system.advise\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x2c9a4080, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) 7.593013293s ago: executing program 2 (id=4707): r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000380)={0x10, 0x0, 0x25dfdbff, 0x200}, 0x54) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbff, 0x6da24b7ebfdfaf83}, 0xc) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8993, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_read_part_table(0x5c8, &(0x7f0000000600)="$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") socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000080)) r2 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000040)='./bus\x00', 0x143142, 0x80) ftruncate(r4, 0x2007ffb) sendfile(r4, r4, 0x0, 0x1000000201005) openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x88882, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x20000040) syz_mount_image$ext4(&(0x7f0000000540)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x88, &(0x7f0000000280), 0x3, 0x44a, &(0x7f0000000600)="$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") rename(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 6.278822352s ago: executing program 4 (id=4708): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = fsopen(0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000200)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) syz_emit_ethernet(0x0, 0x0, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f0000000140)={0x0, 0x989680}, 0x0) unshare(0x40000000) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)=ANY=[@ANYBLOB="6c000000000101040000000000000000020000002c0001801400018008000100e000000108000200ac1414000c000280050001"], 0x6c}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001780)={&(0x7f0000000500)=ANY=[@ANYBLOB="cc020000210a0108fdffffff0000000000000000630003"], 0x2cc}}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0xb7b8d9a8ffd19e75, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000380), &(0x7f00000003c0)=r5}, 0x20) r6 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x34) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0xc, &(0x7f0000000040)=@framed={{0x18, 0x8}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r6}}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, @exit], {0x95, 0x0, 0xff85}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r7}, 0x10) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r10 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r10, 0x40045431, &(0x7f0000000140)={0x0, 0x0, 0x1, 0x0, 0x0, "810000cc2b000000000000fa25ffff00ffffff"}) syz_open_pts(r10, 0x141601) ioctl$PIO_FONTX(r8, 0x4b6c, &(0x7f00000004c0)={0xd3, 0x9, &(0x7f0000000a00)="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"}) close_range(r9, 0xffffffffffffffff, 0x0) 6.278386022s ago: executing program 9 (id=4709): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000700)='oom_adj\x00') write$cgroup_int(r0, &(0x7f0000001300)=0xfffffffeffffffff, 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_int(r2, 0x0, 0x8, &(0x7f0000000080), &(0x7f0000000000)=0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r1}, 0x0, &(0x7f0000000840)=r3}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = msgget$private(0x0, 0x20) fstat(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) msgctl$IPC_SET(r7, 0x1, &(0x7f00000005c0)={{0x3, 0x0, 0x0, r8, 0x0, 0x100, 0x7}, 0x0, 0x0, 0x6, 0xfff, 0x5, 0x0, 0xa6b6, 0x9, 0x3, 0xd}) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000580)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@uname={'uname', 0x3d, 'GPL\x00'}}], [{@seclabel}, {@uid_eq={'uid', 0x3d, r8}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'kmem_cache_free\x00'}}]}}) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r6, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x34, r9, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_COALESCE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}, @ETHTOOL_A_COALESCE_RATE_SAMPLE_INTERVAL={0x8, 0x17, 0x8}]}, 0x34}}, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r5, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="dfffffd92020a380f66b69b304ff", @ANYRES16=r9, @ANYBLOB="00082dbd7000fddbdf25130000004c00018008000100", @ANYRES32=0x0, @ANYBLOB="140002006d6163766c616e3000000000000000000800030003000000080003000200000008000300010000001400020069703667726574617030000000000000"], 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0x800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x600002, 0x600002, 0x7, &(0x7f0000a00000/0x600000)=nil) r10 = socket$inet6(0xa, 0x80003, 0x6) socket$inet6(0xa, 0x803, 0x6) connect$inet6(r10, &(0x7f0000000040)={0xa, 0x4624, 0x0, @local, 0x3}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./bus\x00', 0x20081e, &(0x7f0000000040)={[{@nodelalloc}, {@orlov}, {@auto_da_alloc}]}, 0x1, 0x4ef, &(0x7f00000003c0)="$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") 6.273958411s ago: executing program 1 (id=4710): bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001", @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) write$P9_RWRITE(0xffffffffffffffff, &(0x7f0000000040)={0xb, 0x77, 0x87}, 0x10c00) sendmsg$NFT_BATCH(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="140000001000010006000000000000000500000a14000000020a0101000000000000000000000006140000001100010000"], 0x3c}, 0x1, 0x0, 0x0, 0x4048000}, 0x880) 6.273276771s ago: executing program 2 (id=4711): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000006c59850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000140)='inode_foreign_history\x00', r0}, 0x18) r1 = socket$inet(0x2, 0x2, 0x1) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x14}, 0x4010) sendmsg$inet(r1, &(0x7f0000000600)={&(0x7f0000000040)={0x2, 0xffff, @multicast2}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000400)='\b\x00', 0x2}, {&(0x7f00000004c0)="1ed8b7f9d457", 0x6}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000007000000890b040a0101027f00000100000000001c000000000000000000000008"], 0x40}, 0x20000000) syz_mount_image$msdos(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, &(0x7f00000002c0), 0x1, 0x237, &(0x7f0000000300)="$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") openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) r2 = inotify_init() socket$inet6_icmp_raw(0xa, 0x3, 0x3a) inotify_add_watch(r2, &(0x7f0000000000)='.\x00', 0x400017e) mkdir(&(0x7f0000000100)='./control\x00', 0x184) r3 = open(&(0x7f0000022ff6)='./control\x00', 0x50500, 0x0) getdents64(r3, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000740)='ext3\x00', &(0x7f0000000140)='./bus\x00', 0x2000000, &(0x7f0000000380)={[{@bsdgroups}, {@nodiscard}, {@noblock_validity}, {@usrjquota}, {@grpquota}, {@jqfmt_vfsv1}, {@quota}, {@data_err_ignore}, {@noload}]}, 0x0, 0x51e, &(0x7f0000000940)="$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") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_bp={0x0}, 0x2402, 0x0, 0x800000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r4) socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r4, 0x9) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) sendmmsg(r5, 0x0, 0x0, 0x20044000) connect$inet(r5, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f00000002c0)={0xa, 0x4e24, 0x4, @local, 0x6}, 0x1c, &(0x7f0000000580)}, 0x2000c800) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="02000000040000000800000101"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000100)={{r6}, 0x0, &(0x7f0000000300)='%pS \x00'}, 0x20) 4.865707591s ago: executing program 4 (id=4712): r0 = syz_open_dev$loop(&(0x7f00000005c0), 0x9, 0x12d600) prctl$PR_SET_SECUREBITS(0x1c, 0x1d) setuid(0xee01) fsetxattr$security_selinux(r0, &(0x7f0000000000), &(0x7f0000000040)='system_u:object_r:dhcpd_state_t:s0\x00', 0x23, 0x2) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0x25, 0x0}, 0x8) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0x8004587d, &(0x7f00000001c0)={@id={0x2, 0x0, @b}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'tunl0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x15, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000440)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000002000f000000050030000000000005002f000000000008000300", @ANYRES32=r5], 0x2c}, 0x1, 0x0, 0x0, 0x81}, 0x0) 4.864656731s ago: executing program 9 (id=4713): semget$private(0x0, 0x6, 0x3b1) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0xad3c3b, 0xffffffffffffffff, 0x7, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xc0041, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0xb76e}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r4}, 0x10) write$tun(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="034886dd09032800050030000000600000000028290081e949b93897bc3b0000000000007d01ff020000000000000000000000000001"], 0xfdef) 4.864325781s ago: executing program 1 (id=4714): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r0}, 0x10) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000300)='4', 0x1}], 0x1) 4.863676051s ago: executing program 2 (id=4715): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000600)=ANY=[], 0x50) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000600)='./file0\x00', 0xc8d0, &(0x7f0000000140)=ANY=[@ANYRES8=0x0], 0x1, 0x2e3, &(0x7f0000000280)="$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") truncate(&(0x7f0000000000)='./file1\x00', 0xd105) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x3, 0x800000000003}, 0x1100, 0x5dd8, 0x0, 0x5, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xffd, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) truncate(&(0x7f0000000040)='./file1\x00', 0x8de4) 3.353007483s ago: executing program 4 (id=4716): r0 = gettid() r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x100000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) getpgid(0x0) pidfd_send_signal(0xffffffffffffffff, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x2}, 0x4) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = msgget(0x2, 0x10) msgctl$IPC_RMID(r3, 0x0) r4 = syz_genetlink_get_family_id$nfc(&(0x7f0000000940), r2) sendmsg$NFC_CMD_START_POLL(r2, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000980)={0x14, r4, 0x1, 0x70bd29, 0x25dfdbfd}, 0x14}}, 0x0) timer_create(0x8, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000040), 0x68, 0x40) ioctl$HDIO_GETGEO(r6, 0x301, 0x0) ioctl$TIOCMIWAIT(r5, 0x545c, 0x3000000) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0xc90}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r7}, 0x10) 3.352599193s ago: executing program 9 (id=4717): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1, 0x0, 0x2}, 0x18) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/user\x00') r2 = openat$pidfd(0xffffffffffffff9c, 0x0, 0x688200, 0x0) fchdir(r2) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/211, 0xd3) 3.352064583s ago: executing program 1 (id=4718): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000"], 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xa00000, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$inet(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x2, 0x4001, @loopback}, 0x10, 0x0}, 0x34004000) 3.351697333s ago: executing program 2 (id=4719): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000340)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x12, 0xffffffffffffffff, 0x6770c000) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r3) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x1b, 0xc, &(0x7f0000000b40)=ANY=[@ANYRES64=r0, @ANYBLOB="9c2ba4432885954a0998a9f0da88a609ebe35b618d885b4df3f4fc05f450881c0f85a397d43fcf2030831fc22644de5d73b5f23042b90f7a4a82f791b3b98ab3876ae6b50b2536503594e3b34e1eeb00878f87663fb2562a917306fb6af62bb39bad03ca86ffd66f4ff653b8ef26211d71f721c222c8e17bf658994e98e09002ffeb0dae36b97b782b20b01b59457c59b3f3ffa60d2045f53d9c01ed8978a7aa9fad45", @ANYRESDEC=r0], 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x10000010, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x400000, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) timer_create(0x7, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRES32=r4, @ANYRES32, @ANYRESHEX], &(0x7f0000002240)='GPL\x00', 0x0, 0xfffffffffffffeac, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0xfffffffffffffd6e, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r7}, 0x18) ioctl$TIOCVHANGUP(r6, 0x5437, 0x2) connect$pppl2tp(0xffffffffffffffff, 0x0, 0x0) lgetxattr(0x0, &(0x7f0000000040)=@known='system.advise\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x2c9a4080, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) 3.327819473s ago: executing program 9 (id=4720): r0 = syz_open_dev$loop(&(0x7f00000005c0), 0x9, 0x12d600) prctl$PR_SET_SECUREBITS(0x1c, 0x1d) setuid(0xee01) fsetxattr$security_selinux(r0, &(0x7f0000000000), &(0x7f0000000040)='system_u:object_r:dhcpd_state_t:s0\x00', 0x23, 0x2) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0x25, 0x0}, 0x8) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0x8004587d, &(0x7f00000001c0)={@id={0x2, 0x0, @b}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'tunl0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x15, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000440)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000002000f000000050030000000000005002f000000000008000300", @ANYRES32=r5], 0x2c}, 0x1, 0x0, 0x0, 0x81}, 0x0) 1.718562516s ago: executing program 4 (id=4721): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000080008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r1, 0x0, 0xfffffffffffffffe}, 0x18) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000009f910000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$NFT_BATCH(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000180a0500000000000000000002000000300003802c00038014000100776732000000000000000000000000001400010076657468315f746f5f627269646765000900020073797a30000000000900010073797a30"], 0x84}, 0x1, 0x0, 0x0, 0x24040089}, 0x20008000) 1.718117336s ago: executing program 9 (id=4722): r0 = socket$netlink(0x10, 0x3, 0xb) bind$netlink(r0, &(0x7f0000000380)={0x10, 0x0, 0x25dfdbff, 0x200}, 0x54) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbff, 0x6da24b7ebfdfaf83}, 0xc) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8993, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_read_part_table(0x5c8, &(0x7f0000000600)="$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") socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000080)) r2 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x0) fchdir(r3) r4 = open(&(0x7f0000000040)='./bus\x00', 0x143142, 0x80) ftruncate(r4, 0x2007ffb) sendfile(r4, r4, 0x0, 0x1000000201005) openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x88882, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x20000040) syz_mount_image$ext4(&(0x7f0000000540)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x88, &(0x7f0000000280), 0x3, 0x44a, &(0x7f0000000600)="$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") rename(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='./file0/file0\x00') 1.717538426s ago: executing program 1 (id=4723): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3000000"], 0x0, 0x7a, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) unshare(0x2c020400) r2 = syz_io_uring_setup(0xe43, &(0x7f0000000380)={0x0, 0x5f39, 0x0, 0x3, 0xfffffffd}, &(0x7f0000000340)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000002c0)=@IORING_OP_RENAMEAT={0x23, 0x2, 0x0, 0xffffffffffffffff, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='./file0\x00'}) io_uring_enter(r2, 0x3516, 0x0, 0x0, 0x0, 0x0) 1.716890246s ago: executing program 2 (id=4724): mknod(&(0x7f0000000280)='./file0\x00', 0x1ffa, 0xfffffffc) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff0000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r1}, 0x18) faccessat2(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x2, 0x0) 1.27899ms ago: executing program 4 (id=4725): bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='itimer_state\x00', r1}, 0x10) setitimer(0x1, 0x0, 0x0) 567.35µs ago: executing program 9 (id=4726): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x2}, 0x0, 0x1, 0x7, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') 229.5µs ago: executing program 1 (id=4727): r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x17, 0x200000000000012d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2, 0x0, 0x2}, 0x18) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000004c0)={0xffffffffffffffff, 0x0, 0x25, 0x4, @void}, 0x10) syz_read_part_table(0x60d, &(0x7f0000002240)="$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") bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f00000008c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105002, 0xdf) writev(r3, &(0x7f0000000140)=[{&(0x7f0000001200)="10", 0x100000}], 0x1) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x80000001, 0xe}, 0x45ff5eb5c5b446aa, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x68, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x2804, 0x0, 0x0, 0x0, 0x400, 0x10001, 0x1, 0x0, 0x0, 0x0, 0x1c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket(0x10, 0x803, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x3, &(0x7f0000000400)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fffffa}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000540)='kfree\x00', r5}, 0x18) sendmsg$IPVS_CMD_SET_INFO(r4, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r6, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010005"], 0x3c}}, 0x0) r7 = getpgrp(0xffffffffffffffff) kcmp(0xffffffffffffffff, r7, 0x3, r5, 0xffffffffffffffff) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@getchain={0xfffffffffffffec5, 0x11, 0x43d, 0x70bd2b, 0x25dfdbfc, {0x0, 0x0, 0x0, r6, {0x1, 0x10}, {0x0, 0xa}, {0xb, 0xffff}}}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x0) 0s ago: executing program 2 (id=4728): semget$private(0x0, 0x6, 0x3b1) syz_mount_image$vfat(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0xad3c3b, 0xffffffffffffffff, 0x7, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0xc0041, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0xb76e}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r4}, 0x10) write$tun(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="034886dd09032800050030000000600000000028290081e949b93897bc3b0000000000007d01ff020000000000000000000000000001"], 0xfdef) kernel console output (not intermixed with test programs): 000000000000 R09: 0000000000000000 [ 333.028850][T19105] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 333.028866][T19105] R13: 0000000000000000 R14: 00007fd7e7085fa0 R15: 00007ffce8458ec8 [ 333.028890][T19105] [ 333.251744][ T29] audit: type=1400 audit(2000000041.400:11000): avc: denied { create } for pid=19104 comm="syz.4.3805" name="control" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 333.283481][ T29] audit: type=1326 audit(2000000041.680:11001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19113 comm="syz.5.3808" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f314e87e969 code=0x7ffc0000 [ 333.285381][T16796] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 333.316597][ T29] audit: type=1326 audit(2000000041.710:11002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19113 comm="syz.5.3808" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f314e87e969 code=0x7ffc0000 [ 333.340295][ T29] audit: type=1326 audit(2000000041.710:11003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19113 comm="syz.5.3808" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f314e87e969 code=0x7ffc0000 [ 333.364041][ T29] audit: type=1326 audit(2000000041.710:11004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19113 comm="syz.5.3808" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f314e87e969 code=0x7ffc0000 [ 333.387705][ T29] audit: type=1326 audit(2000000041.710:11005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19113 comm="syz.5.3808" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f314e87e969 code=0x7ffc0000 [ 333.411379][ T29] audit: type=1326 audit(2000000041.710:11006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19113 comm="syz.5.3808" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f314e87e969 code=0x7ffc0000 [ 333.435022][ T29] audit: type=1326 audit(2000000041.710:11007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19113 comm="syz.5.3808" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f314e87e969 code=0x7ffc0000 [ 333.487534][T19122] loop9: detected capacity change from 0 to 512 [ 333.494755][T19122] EXT4-fs (loop9): ext4_check_descriptors: Checksum for group 0 failed (17031!=33349) [ 333.505441][T19120] loop4: detected capacity change from 0 to 256 [ 333.513062][T19120] FAT-fs (loop4): Directory bread(block 76) failed [ 333.517424][T19122] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=e842e12c, mo2=0002] [ 333.527828][T19120] FAT-fs (loop4): Directory bread(block 77) failed [ 333.528349][T19122] System zones: 1-12 [ 333.536565][T19120] FAT-fs (loop4): Directory bread(block 78) failed [ 333.545295][T19122] EXT4-fs (loop9): orphan cleanup on readonly fs [ 333.545524][T19120] FAT-fs (loop4): Directory bread(block 72) failed [ 333.558557][T19122] EXT4-fs error (device loop9): ext4_validate_block_bitmap:441: comm syz.9.3811: bg 0: block 361: padding at end of block bitmap is not set [ 333.574388][T19122] EXT4-fs (loop9): Remounting filesystem read-only [ 333.575176][T19011] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 333.581202][T19122] EXT4-fs (loop9): 1 truncate cleaned up [ 333.594270][T19122] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000007 ro without journal. Quota mode: none. [ 333.606990][T19120] FAT-fs (loop4): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 333.623007][T19120] FAT-fs (loop4): Directory bread(block 76) failed [ 333.624297][T19011] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 333.638583][T19120] FAT-fs (loop4): Directory bread(block 77) failed [ 333.646390][T19120] FAT-fs (loop4): Directory bread(block 78) failed [ 333.653048][T19120] FAT-fs (loop4): Directory bread(block 72) failed [ 333.657300][T17610] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000007. [ 333.672499][T19011] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 333.673536][T19120] FAT-fs (loop4): Directory bread(block 76) failed [ 333.685917][T19120] FAT-fs (loop4): Directory bread(block 77) failed [ 333.695652][T19011] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 333.744214][T19134] loop5: detected capacity change from 0 to 128 [ 333.765843][T19011] 8021q: adding VLAN 0 to HW filter on device bond0 [ 333.786049][T19011] 8021q: adding VLAN 0 to HW filter on device team0 [ 333.795327][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.802508][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 333.822621][T19011] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 333.833129][T19011] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 333.849597][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.856803][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 333.906387][T19143] loop9: detected capacity change from 0 to 128 [ 333.913780][T19143] FAT-fs (loop9): Invalid FSINFO signature: 0x41615200, 0x61417272 (sector = 1) [ 333.927979][T19143] FAT-fs (loop9): error, invalid access to FAT (entry 0x00000100) [ 333.936013][T19143] FAT-fs (loop9): Filesystem has been set read-only [ 333.943436][T19143] syz.9.3818: attempt to access beyond end of device [ 333.943436][T19143] loop9: rw=0, sector=2065, nr_sectors = 8 limit=128 [ 333.977021][T19011] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 334.458847][T19011] veth0_vlan: entered promiscuous mode [ 334.522026][T19011] veth1_vlan: entered promiscuous mode [ 334.573375][T19011] veth0_macvtap: entered promiscuous mode [ 334.580803][T19011] veth1_macvtap: entered promiscuous mode [ 334.590804][T19011] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 334.601301][T19011] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 334.611174][T19011] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 334.621649][T19011] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 334.631535][T19011] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 334.642033][T19011] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 334.651891][T19011] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 334.662380][T19011] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 334.674312][T19011] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 334.689924][T19011] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 334.700727][T19011] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 334.710612][T19011] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 334.721135][T19011] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 334.731059][T19011] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 334.741604][T19011] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 334.751570][T19011] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 334.762145][T19011] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 334.774626][T19011] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 334.783032][T19011] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 334.791835][T19011] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 334.800596][T19011] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 334.809385][T19011] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 334.825022][T19172] __nla_validate_parse: 125 callbacks suppressed [ 334.825037][T19172] netlink: 40 bytes leftover after parsing attributes in process `syz.2.3826'. [ 334.958313][T19186] loop2: detected capacity change from 0 to 512 [ 334.984552][T19186] EXT4-fs (loop2): too many log groups per flexible block group [ 334.992447][T19186] EXT4-fs (loop2): failed to initialize mballoc (-12) [ 334.999790][T19186] EXT4-fs (loop2): mount failed [ 335.083815][T19197] loop5: detected capacity change from 0 to 2048 [ 335.114935][T19203] binfmt_misc: register: failed to install interpreter file ./file2 [ 335.131287][T19197] loop5: p1 < > p4 [ 335.135807][T19205] FAULT_INJECTION: forcing a failure. [ 335.135807][T19205] name fail_futex, interval 1, probability 0, space 0, times 0 [ 335.148727][T19205] CPU: 0 UID: 0 PID: 19205 Comm: syz.2.3837 Not tainted 6.15.0-rc6-syzkaller-00047-ge9565e23cd89 #0 PREEMPT(voluntary) [ 335.148830][T19205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 335.148845][T19205] Call Trace: [ 335.148853][T19205] [ 335.148861][T19205] __dump_stack+0x1d/0x30 [ 335.148887][T19205] dump_stack_lvl+0xe8/0x140 [ 335.148918][T19205] dump_stack+0x15/0x1b [ 335.148935][T19205] should_fail_ex+0x265/0x280 [ 335.148973][T19205] should_fail+0xb/0x20 [ 335.149051][T19205] get_futex_key+0x516/0x750 [ 335.149140][T19205] futex_requeue+0x148/0xe90 [ 335.149176][T19205] ? kstrtouint_from_user+0x9f/0xf0 [ 335.149211][T19205] do_futex+0x2ec/0x380 [ 335.149240][T19205] __se_sys_futex+0x2ed/0x360 [ 335.149362][T19205] __x64_sys_futex+0x78/0x90 [ 335.149393][T19205] x64_sys_call+0x1331/0x2fb0 [ 335.149422][T19205] do_syscall_64+0xd0/0x1a0 [ 335.149445][T19205] ? clear_bhb_loop+0x40/0x90 [ 335.149544][T19205] ? clear_bhb_loop+0x40/0x90 [ 335.149571][T19205] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 335.149597][T19205] RIP: 0033:0x7f0f43dae969 [ 335.149615][T19205] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 335.149633][T19205] RSP: 002b:00007f0f423f6038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 335.149651][T19205] RAX: ffffffffffffffda RBX: 00007f0f43fd6080 RCX: 00007f0f43dae969 [ 335.149728][T19205] RDX: 0000000000000001 RSI: 000000000000000c RDI: 000020000000cffc [ 335.149741][T19205] RBP: 00007f0f423f6090 R08: 0000200000048000 R09: 0000000000000000 [ 335.149753][T19205] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 335.149768][T19205] R13: 0000000000000001 R14: 00007f0f43fd6080 R15: 00007ffceaa9b168 [ 335.149791][T19205] [ 335.329419][T19197] loop5: p4 size 8388608 extends beyond EOD, truncated [ 335.340677][T19209] netlink: 'syz.5.3836': attribute type 1 has an invalid length. [ 335.359295][T19209] 8021q: adding VLAN 0 to HW filter on device bond1 [ 335.418341][T19220] 9pnet_fd: Insufficient options for proto=fd [ 335.529291][T19231] FAULT_INJECTION: forcing a failure. [ 335.529291][T19231] name failslab, interval 1, probability 0, space 0, times 0 [ 335.542115][T19231] CPU: 0 UID: 0 PID: 19231 Comm: syz.1.3847 Not tainted 6.15.0-rc6-syzkaller-00047-ge9565e23cd89 #0 PREEMPT(voluntary) [ 335.542145][T19231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 335.542159][T19231] Call Trace: [ 335.542167][T19231] [ 335.542176][T19231] __dump_stack+0x1d/0x30 [ 335.542197][T19231] dump_stack_lvl+0xe8/0x140 [ 335.542217][T19231] dump_stack+0x15/0x1b [ 335.542285][T19231] should_fail_ex+0x265/0x280 [ 335.542326][T19231] should_failslab+0x8c/0xb0 [ 335.542358][T19231] kmem_cache_alloc_noprof+0x50/0x310 [ 335.542407][T19231] ? security_file_alloc+0x32/0x100 [ 335.542439][T19231] security_file_alloc+0x32/0x100 [ 335.542470][T19231] init_file+0x5c/0x1d0 [ 335.542504][T19231] alloc_empty_file+0x8b/0x200 [ 335.542525][T19231] alloc_file_pseudo+0xc6/0x160 [ 335.542552][T19231] __shmem_file_setup+0x1b9/0x1f0 [ 335.542583][T19231] shmem_file_setup+0x3b/0x50 [ 335.542657][T19231] __se_sys_memfd_create+0x2c3/0x590 [ 335.542691][T19231] __x64_sys_memfd_create+0x31/0x40 [ 335.542795][T19231] x64_sys_call+0x122f/0x2fb0 [ 335.542826][T19231] do_syscall_64+0xd0/0x1a0 [ 335.542849][T19231] ? clear_bhb_loop+0x40/0x90 [ 335.542907][T19231] ? clear_bhb_loop+0x40/0x90 [ 335.542934][T19231] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 335.542954][T19231] RIP: 0033:0x7f5d5811e969 [ 335.542969][T19231] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 335.542990][T19231] RSP: 002b:00007f5d56786e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 335.543063][T19231] RAX: ffffffffffffffda RBX: 000000000000052e RCX: 00007f5d5811e969 [ 335.543074][T19231] RDX: 00007f5d56786ef0 RSI: 0000000000000000 RDI: 00007f5d581a1444 [ 335.543086][T19231] RBP: 0000200000000640 R08: 00007f5d56786bb7 R09: 00007f5d56786e40 [ 335.543098][T19231] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000000 [ 335.543193][T19231] R13: 00007f5d56786ef0 R14: 00007f5d56786eb0 R15: 00002000000001c0 [ 335.543216][T19231] [ 335.774443][T19233] loop1: detected capacity change from 0 to 512 [ 335.802899][T19233] EXT4-fs (loop1): too many log groups per flexible block group [ 335.810954][T19233] EXT4-fs (loop1): failed to initialize mballoc (-12) [ 335.818221][T19233] EXT4-fs (loop1): mount failed [ 335.938596][T19246] FAULT_INJECTION: forcing a failure. [ 335.938596][T19246] name failslab, interval 1, probability 0, space 0, times 0 [ 335.951344][T19246] CPU: 1 UID: 0 PID: 19246 Comm: syz.2.3852 Not tainted 6.15.0-rc6-syzkaller-00047-ge9565e23cd89 #0 PREEMPT(voluntary) [ 335.951473][T19246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 335.951489][T19246] Call Trace: [ 335.951538][T19246] [ 335.951547][T19246] __dump_stack+0x1d/0x30 [ 335.951571][T19246] dump_stack_lvl+0xe8/0x140 [ 335.951595][T19246] dump_stack+0x15/0x1b [ 335.951615][T19246] should_fail_ex+0x265/0x280 [ 335.951647][T19246] ? nsim_fib_event_nb+0x1a0/0xcb0 [ 335.951738][T19246] should_failslab+0x8c/0xb0 [ 335.951798][T19246] __kmalloc_cache_noprof+0x4c/0x320 [ 335.951827][T19246] nsim_fib_event_nb+0x1a0/0xcb0 [ 335.951935][T19246] ? __rcu_read_unlock+0x34/0x70 [ 335.951964][T19246] ? __pfx_nsim_fib_event_nb+0x10/0x10 [ 335.952016][T19246] atomic_notifier_call_chain+0x76/0x1c0 [ 335.952078][T19246] call_fib_notifiers+0x65/0xa0 [ 335.952134][T19246] call_fib6_notifiers+0x30/0x40 [ 335.952162][T19246] fib6_del+0x734/0x8a0 [ 335.952199][T19246] ? fib6_del+0x291/0x8a0 [ 335.952309][T19246] fib6_clean_node+0x167/0x280 [ 335.952335][T19246] fib6_walk_continue+0x39f/0x440 [ 335.952414][T19246] fib6_walk+0xc5/0x180 [ 335.952436][T19246] ? __pfx_fib6_ifdown+0x10/0x10 [ 335.952487][T19246] fib6_clean_all+0xca/0x140 [ 335.952530][T19246] ? __pfx_fib6_clean_node+0x10/0x10 [ 335.952553][T19246] ? __pfx_fib6_ifdown+0x10/0x10 [ 335.952583][T19246] rt6_disable_ip+0xa6/0x580 [ 335.952624][T19246] ? consume_skb+0x71/0x150 [ 335.952668][T19246] addrconf_ifdown+0xa6/0xf30 [ 335.952728][T19246] ? tun_device_event+0x49/0x980 [ 335.952758][T19246] ? __pfx_cbs_dev_notifier+0x10/0x10 [ 335.952784][T19246] ? tls_dev_event+0x3d7/0x910 [ 335.952855][T19246] addrconf_notify+0x222/0x930 [ 335.952882][T19246] ? __pfx_addrconf_notify+0x10/0x10 [ 335.952911][T19246] raw_notifier_call_chain+0x6c/0x1b0 [ 335.952937][T19246] ? call_netdevice_notifiers_info+0x9c/0x100 [ 335.952975][T19246] call_netdevice_notifiers_info+0xae/0x100 [ 335.953010][T19246] netif_set_mtu_ext+0x296/0x370 [ 335.953129][T19246] do_setlink+0x6ab/0x27f0 [ 335.953239][T19246] ? avc_has_perm_noaudit+0x1b1/0x200 [ 335.953274][T19246] ? security_capable+0x83/0x90 [ 335.953318][T19246] ? ns_capable+0x7d/0xb0 [ 335.953344][T19246] ? netlink_ns_capable+0x86/0xa0 [ 335.953457][T19246] rtnl_newlink+0xe75/0x12d0 [ 335.953495][T19246] ? xas_load+0x413/0x430 [ 335.953601][T19246] ? xas_load+0x413/0x430 [ 335.953626][T19246] ? cgroup_rstat_updated+0xa3/0x510 [ 335.953743][T19246] ? strlen+0x19/0x40 [ 335.953771][T19246] ? perf_trace_kmem_cache_free+0x55/0x160 [ 335.953797][T19246] ? __memcg_slab_free_hook+0xb7/0x1c0 [ 335.953918][T19246] ? __kfree_skb+0x109/0x150 [ 335.953940][T19246] ? __rcu_read_unlock+0x4f/0x70 [ 335.953964][T19246] ? avc_has_perm_noaudit+0x1b1/0x200 [ 335.953986][T19246] ? selinux_capable+0x1f9/0x270 [ 335.954025][T19246] ? security_capable+0x83/0x90 [ 335.954067][T19246] ? ns_capable+0x7d/0xb0 [ 335.954087][T19246] ? __pfx_rtnl_newlink+0x10/0x10 [ 335.954112][T19246] rtnetlink_rcv_msg+0x5fb/0x6d0 [ 335.954141][T19246] netlink_rcv_skb+0x120/0x220 [ 335.954198][T19246] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 335.954230][T19246] rtnetlink_rcv+0x1c/0x30 [ 335.954252][T19246] netlink_unicast+0x5a1/0x670 [ 335.954301][T19246] netlink_sendmsg+0x58b/0x6b0 [ 335.954323][T19246] ? __pfx_netlink_sendmsg+0x10/0x10 [ 335.954342][T19246] __sock_sendmsg+0x142/0x180 [ 335.954369][T19246] ____sys_sendmsg+0x31e/0x4e0 [ 335.954446][T19246] ___sys_sendmsg+0x17b/0x1d0 [ 335.954482][T19246] __x64_sys_sendmsg+0xd4/0x160 [ 335.954507][T19246] x64_sys_call+0x2999/0x2fb0 [ 335.954540][T19246] do_syscall_64+0xd0/0x1a0 [ 335.954564][T19246] ? clear_bhb_loop+0x40/0x90 [ 335.954585][T19246] ? clear_bhb_loop+0x40/0x90 [ 335.954672][T19246] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 335.954694][T19246] RIP: 0033:0x7f0f43dae969 [ 335.954710][T19246] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 335.954813][T19246] RSP: 002b:00007f0f42417038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 335.954832][T19246] RAX: ffffffffffffffda RBX: 00007f0f43fd5fa0 RCX: 00007f0f43dae969 [ 335.954844][T19246] RDX: 0000000000000080 RSI: 0000200000000140 RDI: 0000000000000004 [ 335.954857][T19246] RBP: 00007f0f42417090 R08: 0000000000000000 R09: 0000000000000000 [ 335.954869][T19246] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 335.954881][T19246] R13: 0000000000000000 R14: 00007f0f43fd5fa0 R15: 00007ffceaa9b168 [ 335.954902][T19246] [ 336.001585][T19246] net_ratelimit: 50 callbacks suppressed [ 336.001623][T19246] A link change request failed with some changes committed already. Interface gre0 may have been left with an inconsistent configuration, please check. [ 336.484650][T19262] loop9: detected capacity change from 0 to 2048 [ 336.511145][T19268] loop2: detected capacity change from 0 to 512 [ 336.522054][T19262] Alternate GPT is invalid, using primary GPT. [ 336.528375][T19262] loop9: p1 p2 p3 [ 336.533448][T19268] EXT4-fs (loop2): too many log groups per flexible block group [ 336.541543][T19268] EXT4-fs (loop2): failed to initialize mballoc (-12) [ 336.548615][T19268] EXT4-fs (loop2): mount failed [ 336.589294][T19276] binfmt_misc: register: failed to install interpreter file ./file2 [ 336.599446][T19277] loop4: detected capacity change from 0 to 128 [ 336.615364][T19279] loop2: detected capacity change from 0 to 128 [ 336.623399][T19277] FAT-fs (loop4): Invalid FSINFO signature: 0x41615200, 0x61417272 (sector = 1) [ 336.657741][T19277] FAT-fs (loop4): error, invalid access to FAT (entry 0x00000100) [ 336.665660][T19277] FAT-fs (loop4): Filesystem has been set read-only [ 336.668292][T19282] 9pnet_fd: Insufficient options for proto=fd [ 336.672605][T19277] syz.4.3865: attempt to access beyond end of device [ 336.672605][T19277] loop4: rw=0, sector=2065, nr_sectors = 8 limit=128 [ 336.891753][T19290] binfmt_misc: register: failed to install interpreter file ./file2 [ 336.958550][T19295] 9pnet_fd: Insufficient options for proto=fd [ 337.256971][T19308] loop9: detected capacity change from 0 to 128 [ 337.493309][T19318] loop1: detected capacity change from 0 to 2048 [ 337.510191][T19316] FAULT_INJECTION: forcing a failure. [ 337.510191][T19316] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 337.523388][T19316] CPU: 0 UID: 0 PID: 19316 Comm: syz.5.3879 Not tainted 6.15.0-rc6-syzkaller-00047-ge9565e23cd89 #0 PREEMPT(voluntary) [ 337.523424][T19316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 337.523444][T19316] Call Trace: [ 337.523451][T19316] [ 337.523459][T19316] __dump_stack+0x1d/0x30 [ 337.523479][T19316] dump_stack_lvl+0xe8/0x140 [ 337.523497][T19316] dump_stack+0x15/0x1b [ 337.523516][T19316] should_fail_ex+0x265/0x280 [ 337.523608][T19316] should_fail+0xb/0x20 [ 337.523636][T19316] should_fail_usercopy+0x1a/0x20 [ 337.523657][T19316] _copy_to_user+0x20/0xa0 [ 337.523687][T19316] simple_read_from_buffer+0xb5/0x130 [ 337.523723][T19316] proc_fail_nth_read+0x100/0x140 [ 337.523835][T19316] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 337.523890][T19316] vfs_read+0x1a0/0x6f0 [ 337.523917][T19316] ? __rcu_read_unlock+0x4f/0x70 [ 337.523938][T19316] ? __fget_files+0x184/0x1c0 [ 337.523966][T19316] ksys_read+0xda/0x1a0 [ 337.524100][T19316] __x64_sys_read+0x40/0x50 [ 337.524130][T19316] x64_sys_call+0x2d77/0x2fb0 [ 337.524159][T19316] do_syscall_64+0xd0/0x1a0 [ 337.524190][T19316] ? clear_bhb_loop+0x40/0x90 [ 337.524237][T19316] ? clear_bhb_loop+0x40/0x90 [ 337.524328][T19316] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 337.524391][T19316] RIP: 0033:0x7f314e87d37c [ 337.524411][T19316] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 337.524434][T19316] RSP: 002b:00007f314cee7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 337.524452][T19316] RAX: ffffffffffffffda RBX: 00007f314eaa5fa0 RCX: 00007f314e87d37c [ 337.524482][T19316] RDX: 000000000000000f RSI: 00007f314cee70a0 RDI: 0000000000000004 [ 337.524494][T19316] RBP: 00007f314cee7090 R08: 0000000000000000 R09: 0000000000000000 [ 337.524510][T19316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 337.524527][T19316] R13: 0000000000000000 R14: 00007f314eaa5fa0 R15: 00007ffef6fb3198 [ 337.524630][T19316] [ 337.772663][T19318] Alternate GPT is invalid, using primary GPT. [ 337.779047][T19318] loop1: p1 p2 p3 [ 338.004520][ T29] kauditd_printk_skb: 324 callbacks suppressed [ 338.004604][ T29] audit: type=1400 audit(2000000046.400:11332): avc: denied { create } for pid=19335 comm="syz.2.3886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 338.079882][ T29] audit: type=1400 audit(2000000046.430:11333): avc: denied { setopt } for pid=19335 comm="syz.2.3886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 338.099945][ T29] audit: type=1326 audit(2000000046.450:11334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19337 comm="syz.2.3887" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0f43dae969 code=0x7ffc0000 [ 338.123807][ T29] audit: type=1326 audit(2000000046.450:11335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19337 comm="syz.2.3887" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0f43dae969 code=0x7ffc0000 [ 338.147449][ T29] audit: type=1326 audit(2000000046.450:11336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19337 comm="syz.2.3887" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0f43dae969 code=0x7ffc0000 [ 338.171257][ T29] audit: type=1326 audit(2000000046.450:11337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19337 comm="syz.2.3887" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0f43dae969 code=0x7ffc0000 [ 338.194960][ T29] audit: type=1326 audit(2000000046.450:11338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19337 comm="syz.2.3887" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0f43dae969 code=0x7ffc0000 [ 338.218593][ T29] audit: type=1326 audit(2000000046.450:11339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19337 comm="syz.2.3887" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0f43dae969 code=0x7ffc0000 [ 338.242287][ T29] audit: type=1326 audit(2000000046.450:11340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19337 comm="syz.2.3887" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0f43dae969 code=0x7ffc0000 [ 338.266211][ T29] audit: type=1326 audit(2000000046.450:11341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19337 comm="syz.2.3887" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0f43dae969 code=0x7ffc0000 [ 338.406519][T19343] FAULT_INJECTION: forcing a failure. [ 338.406519][T19343] name failslab, interval 1, probability 0, space 0, times 0 [ 338.419209][T19343] CPU: 1 UID: 0 PID: 19343 Comm: syz.2.3889 Not tainted 6.15.0-rc6-syzkaller-00047-ge9565e23cd89 #0 PREEMPT(voluntary) [ 338.419281][T19343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 338.419359][T19343] Call Trace: [ 338.419366][T19343] [ 338.419375][T19343] __dump_stack+0x1d/0x30 [ 338.419398][T19343] dump_stack_lvl+0xe8/0x140 [ 338.419424][T19343] dump_stack+0x15/0x1b [ 338.419442][T19343] should_fail_ex+0x265/0x280 [ 338.419476][T19343] should_failslab+0x8c/0xb0 [ 338.419506][T19343] __kmalloc_noprof+0xa5/0x3e0 [ 338.419619][T19343] ? iovec_from_user+0x84/0x210 [ 338.419653][T19343] iovec_from_user+0x84/0x210 [ 338.419681][T19343] __import_iovec+0xf3/0x540 [ 338.419709][T19343] ? _parse_integer_limit+0x170/0x190 [ 338.419820][T19343] import_iovec+0x61/0x80 [ 338.419851][T19343] ___sys_sendmsg+0x146/0x1d0 [ 338.419971][T19343] __x64_sys_sendmsg+0xd4/0x160 [ 338.420006][T19343] x64_sys_call+0x2999/0x2fb0 [ 338.420040][T19343] do_syscall_64+0xd0/0x1a0 [ 338.420070][T19343] ? clear_bhb_loop+0x40/0x90 [ 338.420096][T19343] ? clear_bhb_loop+0x40/0x90 [ 338.420174][T19343] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 338.420206][T19343] RIP: 0033:0x7f0f43dae969 [ 338.420222][T19343] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 338.420241][T19343] RSP: 002b:00007f0f42417038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 338.420262][T19343] RAX: ffffffffffffffda RBX: 00007f0f43fd5fa0 RCX: 00007f0f43dae969 [ 338.420280][T19343] RDX: 0000000000020001 RSI: 0000200000000d40 RDI: 0000000000000003 [ 338.420292][T19343] RBP: 00007f0f42417090 R08: 0000000000000000 R09: 0000000000000000 [ 338.420369][T19343] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 338.420381][T19343] R13: 0000000000000000 R14: 00007f0f43fd5fa0 R15: 00007ffceaa9b168 [ 338.420456][T19343] [ 338.621814][T19345] netlink: 'syz.5.3888': attribute type 4 has an invalid length. [ 338.652826][T14540] kworker/u8:13: attempt to access beyond end of device [ 338.652826][T14540] loop9: rw=1, sector=159, nr_sectors = 1 limit=128 [ 338.666372][T14540] Buffer I/O error on dev loop9, logical block 159, lost async page write [ 338.677269][T19351] loop1: detected capacity change from 0 to 128 [ 338.685236][T19352] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=26216 sclass=netlink_route_socket pid=19352 comm=syz.5.3888 [ 338.698787][T19350] netlink: 28 bytes leftover after parsing attributes in process `syz.2.3892'. [ 338.707962][T19350] netlink: 32 bytes leftover after parsing attributes in process `syz.2.3892'. [ 338.716992][T19350] netlink: 28 bytes leftover after parsing attributes in process `syz.2.3892'. [ 338.727238][T19350] netlink: 32 bytes leftover after parsing attributes in process `syz.2.3892'. [ 338.767926][T19350] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3892'. [ 338.920003][T19371] loop9: detected capacity change from 0 to 8192 [ 338.978166][T19375] loop4: detected capacity change from 0 to 128 [ 338.996928][T19377] loop2: detected capacity change from 0 to 512 [ 339.033285][T19377] EXT4-fs (loop2): too many log groups per flexible block group [ 339.041226][T19377] EXT4-fs (loop2): failed to initialize mballoc (-12) [ 339.092140][T19377] EXT4-fs (loop2): mount failed [ 339.221250][T19341] loop5: detected capacity change from 0 to 8192 [ 339.282372][T19341] loop5: p1 p3 p4 [ 339.287787][T19341] loop5: p1 size 8390912 extends beyond EOD, truncated [ 339.349256][T19341] loop5: p3 size 589824 extends beyond EOD, truncated [ 339.884250][T19401] netlink: 28 bytes leftover after parsing attributes in process `syz.2.3910'. [ 339.921029][ T12] kworker/u8:0: attempt to access beyond end of device [ 339.921029][ T12] loop4: rw=1, sector=159, nr_sectors = 1 limit=128 [ 339.934617][ T12] Buffer I/O error on dev loop4, logical block 159, lost async page write [ 340.335145][T19417] uprobe: syz.9.3915:19417 failed to unregister, leaking uprobe [ 340.460907][T19420] loop9: detected capacity change from 0 to 2048 [ 340.491095][T19420] Alternate GPT is invalid, using primary GPT. [ 340.497428][T19420] loop9: p1 p2 p3 [ 340.532392][ T36] hid-generic 0000:0000:0000.0014: unknown main item tag 0x0 [ 340.552542][ T36] hid-generic 0000:0000:0000.0014: hidraw0: HID v0.00 Device [syz0] on syz0 [ 340.975827][T19450] loop4: detected capacity change from 0 to 128 [ 341.025698][T19452] netlink: 'syz.2.3929': attribute type 1 has an invalid length. [ 341.033656][T19452] netlink: 224 bytes leftover after parsing attributes in process `syz.2.3929'. [ 341.117709][T19457] loop9: detected capacity change from 0 to 128 [ 341.146831][T19457] FAT-fs (loop9): Invalid FSINFO signature: 0x41615200, 0x61417272 (sector = 1) [ 341.223580][T19469] loop9: detected capacity change from 0 to 128 [ 341.331697][T19475] loop4: detected capacity change from 0 to 128 [ 341.461716][T19488] loop5: detected capacity change from 0 to 1024 [ 341.508005][T19488] EXT4-fs error (device loop5): ext4_acquire_dquot:6935: comm syz.5.3945: Failed to acquire dquot type 0 [ 341.525237][T19488] EXT4-fs error (device loop5): mb_free_blocks:1948: group 0, inode 13: block 144:freeing already freed block (bit 9); block bitmap corrupt. [ 341.544736][T19488] EXT4-fs error (device loop5): ext4_do_update_inode:5211: inode #13: comm syz.5.3945: corrupted inode contents [ 341.558824][T19496] loop4: detected capacity change from 0 to 128 [ 341.581766][T19496] FAT-fs (loop4): Invalid FSINFO signature: 0x41615200, 0x61417272 (sector = 1) [ 341.621994][T19488] EXT4-fs error (device loop5): ext4_dirty_inode:6103: inode #13: comm syz.5.3945: mark_inode_dirty error [ 341.658380][T19488] EXT4-fs error (device loop5): ext4_do_update_inode:5211: inode #13: comm syz.5.3945: corrupted inode contents [ 341.684595][T19488] EXT4-fs error (device loop5): __ext4_ext_dirty:207: inode #13: comm syz.5.3945: mark_inode_dirty error [ 341.701270][T19488] EXT4-fs error (device loop5): ext4_do_update_inode:5211: inode #13: comm syz.5.3945: corrupted inode contents [ 341.722130][T19488] EXT4-fs error (device loop5) in ext4_orphan_del:305: Corrupt filesystem [ 341.732766][T19488] EXT4-fs error (device loop5): ext4_do_update_inode:5211: inode #13: comm syz.5.3945: corrupted inode contents [ 341.747116][T19507] loop2: detected capacity change from 0 to 128 [ 341.764469][T19488] EXT4-fs error (device loop5): ext4_truncate:4255: inode #13: comm syz.5.3945: mark_inode_dirty error [ 341.777300][T19488] EXT4-fs error (device loop5) in ext4_process_orphan:347: Corrupt filesystem [ 341.786861][T19488] EXT4-fs (loop5): 1 truncate cleaned up [ 341.804330][T19488] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 341.850982][T19488] EXT4-fs: Ignoring removed orlov option [ 341.858358][T19488] EXT4-fs: Remounting file system with no journal so ignoring journalled data option [ 341.867922][T19488] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 341.877863][T19488] EXT4-fs (loop5): can't enable nombcache during remount [ 341.898619][T12396] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 341.938916][T19524] IPVS: sync thread started: state = MASTER, mcast_ifn = bridge_slave_0, syncid = 0, id = 0 [ 341.972751][T19529] loop4: detected capacity change from 0 to 164 [ 342.037518][T19539] loop2: detected capacity change from 0 to 128 [ 342.210272][T19562] binfmt_misc: register: failed to install interpreter file ./file2 [ 342.278757][T19570] 9pnet_fd: Insufficient options for proto=fd [ 342.304195][T19572] loop2: detected capacity change from 0 to 128 [ 342.458241][T19579] netlink: 4 bytes leftover after parsing attributes in process `syz.9.3977'. [ 342.467234][T19579] netlink: 4 bytes leftover after parsing attributes in process `syz.9.3977'. [ 342.476893][T19579] netlink: 4 bytes leftover after parsing attributes in process `syz.9.3977'. [ 342.485798][T19579] netlink: 4 bytes leftover after parsing attributes in process `syz.9.3977'. [ 342.495389][T19579] netlink: 4 bytes leftover after parsing attributes in process `syz.9.3977'. [ 342.504294][T19579] netlink: 4 bytes leftover after parsing attributes in process `syz.9.3977'. [ 342.513914][T19579] netlink: 4 bytes leftover after parsing attributes in process `syz.9.3977'. [ 342.522809][T19579] netlink: 4 bytes leftover after parsing attributes in process `syz.9.3977'. [ 342.564759][T19579] syz.9.3977: attempt to access beyond end of device [ 342.564759][T19579] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 342.588697][T19579] loop9: detected capacity change from 0 to 1024 [ 342.595706][T19579] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 342.703402][T19581] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 342.710721][T19581] IPv6: NLM_F_CREATE should be set when creating new route [ 342.733946][T19581] team0 (unregistering): Port device team_slave_0 removed [ 342.768106][T19581] team0 (unregistering): Port device team_slave_1 removed [ 343.380060][T19594] loop1: detected capacity change from 0 to 128 [ 343.387078][ T29] kauditd_printk_skb: 397 callbacks suppressed [ 343.387095][ T29] audit: type=1400 audit(2000000051.780:11737): avc: denied { unmount } for pid=17610 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 343.417641][T19594] FAT-fs (loop1): Invalid FSINFO signature: 0x41615200, 0x61417272 (sector = 1) [ 343.444701][T19601] loop9: detected capacity change from 0 to 128 [ 343.460987][T19601] FAULT_INJECTION: forcing a failure. [ 343.460987][T19601] name failslab, interval 1, probability 0, space 0, times 0 [ 343.473721][T19601] CPU: 0 UID: 0 PID: 19601 Comm: syz.9.3990 Not tainted 6.15.0-rc6-syzkaller-00047-ge9565e23cd89 #0 PREEMPT(voluntary) [ 343.473819][T19601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 343.473836][T19601] Call Trace: [ 343.473844][T19601] [ 343.473853][T19601] __dump_stack+0x1d/0x30 [ 343.473877][T19601] dump_stack_lvl+0xe8/0x140 [ 343.473898][T19601] dump_stack+0x15/0x1b [ 343.473915][T19601] should_fail_ex+0x265/0x280 [ 343.474009][T19601] should_failslab+0x8c/0xb0 [ 343.474047][T19601] kmem_cache_alloc_noprof+0x50/0x310 [ 343.474069][T19601] ? fat_cache_add+0x1ef/0x4a0 [ 343.474114][T19601] fat_cache_add+0x1ef/0x4a0 [ 343.474140][T19601] fat_get_cluster+0x5de/0x7b0 [ 343.474191][T19601] ? fat_mirror_bhs+0x2eb/0x320 [ 343.474225][T19601] fat_get_mapped_cluster+0xe4/0x240 [ 343.474253][T19601] fat_bmap+0x254/0x280 [ 343.474278][T19601] fat_get_block+0x3b1/0x5e0 [ 343.474367][T19601] __block_write_begin_int+0x419/0xf70 [ 343.474405][T19601] ? __pfx_fat_get_block+0x10/0x10 [ 343.474444][T19601] cont_write_begin+0x5a3/0x8e0 [ 343.474544][T19601] ? fault_in_readable+0xfe/0x1b0 [ 343.474583][T19601] fat_write_begin+0x4f/0xe0 [ 343.474601][T19601] ? __pfx_fat_get_block+0x10/0x10 [ 343.474677][T19601] generic_perform_write+0x184/0x490 [ 343.474750][T19601] __generic_file_write_iter+0x9e/0x120 [ 343.474782][T19601] generic_file_write_iter+0x8d/0x2f0 [ 343.474855][T19601] ? cgroup_rstat_updated+0xa3/0x510 [ 343.474920][T19601] ? __count_memcg_events+0xcd/0x210 [ 343.474952][T19601] ? __rcu_read_unlock+0x4f/0x70 [ 343.475025][T19601] ? handle_mm_fault+0xb4c/0x2ae0 [ 343.475082][T19601] ? avc_policy_seqno+0x15/0x30 [ 343.475105][T19601] ? selinux_file_permission+0x213/0x360 [ 343.475164][T19601] ? security_file_permission+0x22/0x80 [ 343.475193][T19601] aio_write+0x2e5/0x410 [ 343.475226][T19601] io_submit_one+0xac8/0x11b0 [ 343.475267][T19601] __se_sys_io_submit+0xfb/0x280 [ 343.475369][T19601] __x64_sys_io_submit+0x43/0x50 [ 343.475393][T19601] x64_sys_call+0xfc4/0x2fb0 [ 343.475419][T19601] do_syscall_64+0xd0/0x1a0 [ 343.475449][T19601] ? clear_bhb_loop+0x40/0x90 [ 343.475488][T19601] ? clear_bhb_loop+0x40/0x90 [ 343.475516][T19601] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 343.475542][T19601] RIP: 0033:0x7f35ac8ae969 [ 343.475559][T19601] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 343.475576][T19601] RSP: 002b:00007f35aaf17038 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 343.475650][T19601] RAX: ffffffffffffffda RBX: 00007f35acad5fa0 RCX: 00007f35ac8ae969 [ 343.475667][T19601] RDX: 0000200000000540 RSI: 000000000000003b RDI: 00007f35aaeee000 [ 343.475682][T19601] RBP: 00007f35aaf17090 R08: 0000000000000000 R09: 0000000000000000 [ 343.475695][T19601] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 343.475711][T19601] R13: 0000000000000000 R14: 00007f35acad5fa0 R15: 00007ffc25159798 [ 343.475806][T19601] [ 343.477001][T19601] syz.9.3990: attempt to access beyond end of device [ 343.477001][T19601] loop9: rw=2049, sector=145, nr_sectors = 8 limit=128 [ 343.599225][ T29] audit: type=1400 audit(2000000051.990:11738): avc: denied { create } for pid=19602 comm="syz.2.3992" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 343.615563][T19601] syz.9.3990: attempt to access beyond end of device [ 343.615563][T19601] loop9: rw=2049, sector=161, nr_sectors = 8 limit=128 [ 343.633547][ T29] audit: type=1400 audit(2000000052.010:11739): avc: denied { setopt } for pid=19602 comm="syz.2.3992" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 343.636060][T19601] syz.9.3990: attempt to access beyond end of device [ 343.636060][T19601] loop9: rw=2049, sector=177, nr_sectors = 1 limit=128 [ 343.639835][ T29] audit: type=1400 audit(2000000052.020:11740): avc: denied { unmount } for pid=19011 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 343.881395][T19599] syz.4.3991: attempt to access beyond end of device [ 343.881395][T19599] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 343.885328][ T29] audit: type=1400 audit(2000000052.270:11741): avc: denied { perfmon } for pid=19602 comm="syz.2.3992" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 343.921894][T19599] loop4: detected capacity change from 0 to 1024 [ 343.928626][T19599] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 343.938471][ T29] audit: type=1400 audit(2000000052.320:11742): avc: denied { read write } for pid=19598 comm="syz.4.3991" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 343.962713][ T29] audit: type=1400 audit(2000000052.320:11744): avc: denied { open } for pid=19598 comm="syz.4.3991" path="/dev/loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 343.987101][ T29] audit: type=1400 audit(2000000052.320:11743): avc: denied { read write } for pid=19011 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 344.011627][ T29] audit: type=1400 audit(2000000052.320:11745): avc: denied { ioctl } for pid=19598 comm="syz.4.3991" path="/dev/loop4" dev="devtmpfs" ino=104 ioctlcmd=0x4c00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 344.037585][ T29] audit: type=1400 audit(2000000052.320:11746): avc: denied { mounton } for pid=19598 comm="syz.4.3991" path="/216/bus" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 344.135777][T19621] binfmt_misc: register: failed to install interpreter file ./file2 [ 344.213641][T19630] 9pnet_fd: Insufficient options for proto=fd [ 344.339710][T19643] Cannot find add_set index 0 as target [ 344.419367][T19646] loop5: detected capacity change from 0 to 128 [ 344.476336][T19646] syz.5.4007: attempt to access beyond end of device [ 344.476336][T19646] loop5: rw=2049, sector=145, nr_sectors = 8 limit=128 [ 344.493847][T19646] syz.5.4007: attempt to access beyond end of device [ 344.493847][T19646] loop5: rw=2049, sector=161, nr_sectors = 8 limit=128 [ 344.509778][T19646] syz.5.4007: attempt to access beyond end of device [ 344.509778][T19646] loop5: rw=2049, sector=177, nr_sectors = 1 limit=128 [ 344.638842][T19668] loop5: detected capacity change from 0 to 128 [ 344.649527][T19668] FAT-fs (loop5): Invalid FSINFO signature: 0x41615200, 0x61417272 (sector = 1) [ 344.669971][T19670] loop2: detected capacity change from 0 to 164 [ 344.788122][T19682] loop5: detected capacity change from 0 to 2048 [ 344.855940][T19683] netlink: 'syz.9.4013': attribute type 4 has an invalid length. [ 344.872420][T19682] loop5: p1 < > p4 [ 344.874276][T19683] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=26216 sclass=netlink_route_socket pid=19683 comm=syz.9.4013 [ 344.893478][T19682] loop5: p4 size 8388608 extends beyond EOD, truncated [ 344.912681][T19682] netlink: 'syz.5.4021': attribute type 1 has an invalid length. [ 344.929425][T19682] 8021q: adding VLAN 0 to HW filter on device bond2 [ 345.014971][T19659] loop9: detected capacity change from 0 to 8192 [ 345.073185][T19659] loop9: p1 p3 p4 [ 345.081542][T19659] loop9: p1 size 8390912 extends beyond EOD, truncated [ 345.100889][T19659] loop9: p3 size 589824 extends beyond EOD, truncated [ 345.299015][T19715] loop5: detected capacity change from 0 to 128 [ 345.328722][T19717] netlink: 'syz.1.4036': attribute type 1 has an invalid length. [ 345.402944][T19722] __nla_validate_parse: 60 callbacks suppressed [ 345.403020][T19722] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4036'. [ 345.422153][T19717] 8021q: adding VLAN 0 to HW filter on device bond1 [ 345.448931][T19725] netlink: 8 bytes leftover after parsing attributes in process `syz.2.4039'. [ 345.469187][T19722] bond1 (unregistering): Released all slaves [ 345.506467][T19728] xt_CT: You must specify a L4 protocol and not use inversions on it [ 345.690745][T19752] new mount options do not match the existing superblock, will be ignored [ 345.701798][T19752] cgroup: option or name mismatch, new: 0x4 "", old: 0x0 "" [ 345.730344][T19756] loop4: detected capacity change from 0 to 512 [ 345.737786][T19756] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 345.750449][T19756] EXT4-fs (loop4): 1 truncate cleaned up [ 345.756619][T19756] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 345.869638][T16796] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 345.886638][T19760] netlink: 28 bytes leftover after parsing attributes in process `syz.4.4052'. [ 345.895699][T19760] netlink: 32 bytes leftover after parsing attributes in process `syz.4.4052'. [ 345.904851][T19760] netlink: 28 bytes leftover after parsing attributes in process `syz.4.4052'. [ 345.935264][T19760] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4052'. [ 346.064954][T19766] FAULT_INJECTION: forcing a failure. [ 346.064954][T19766] name failslab, interval 1, probability 0, space 0, times 0 [ 346.077746][T19766] CPU: 0 UID: 0 PID: 19766 Comm: syz.4.4054 Not tainted 6.15.0-rc6-syzkaller-00047-ge9565e23cd89 #0 PREEMPT(voluntary) [ 346.077782][T19766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 346.077800][T19766] Call Trace: [ 346.077809][T19766] [ 346.077818][T19766] __dump_stack+0x1d/0x30 [ 346.077877][T19766] dump_stack_lvl+0xe8/0x140 [ 346.077902][T19766] dump_stack+0x15/0x1b [ 346.077924][T19766] should_fail_ex+0x265/0x280 [ 346.077965][T19766] should_failslab+0x8c/0xb0 [ 346.078044][T19766] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 346.078075][T19766] ? sidtab_sid2str_get+0xa0/0x130 [ 346.078111][T19766] kmemdup_noprof+0x2b/0x70 [ 346.078193][T19766] sidtab_sid2str_get+0xa0/0x130 [ 346.078222][T19766] security_sid_to_context_core+0x1eb/0x2e0 [ 346.078252][T19766] security_sid_to_context+0x27/0x40 [ 346.078289][T19766] avc_audit_post_callback+0x10f/0x520 [ 346.078418][T19766] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 346.078452][T19766] common_lsm_audit+0x1b8/0x230 [ 346.078540][T19766] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 346.078592][T19766] slow_avc_audit+0x104/0x140 [ 346.078675][T19766] avc_has_perm+0x128/0x150 [ 346.078705][T19766] selinux_socket_create+0xff/0x180 [ 346.078727][T19766] security_socket_create+0x50/0x90 [ 346.078769][T19766] __sock_create+0xe0/0x5b0 [ 346.078799][T19766] ? fput+0x8f/0xc0 [ 346.078823][T19766] __sys_socket+0xb0/0x180 [ 346.078855][T19766] __x64_sys_socket+0x3f/0x50 [ 346.078880][T19766] x64_sys_call+0x285a/0x2fb0 [ 346.078943][T19766] do_syscall_64+0xd0/0x1a0 [ 346.078965][T19766] ? clear_bhb_loop+0x40/0x90 [ 346.078983][T19766] ? clear_bhb_loop+0x40/0x90 [ 346.079117][T19766] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 346.079139][T19766] RIP: 0033:0x7fd7e6e5e969 [ 346.079154][T19766] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 346.079173][T19766] RSP: 002b:00007fd7e54c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 346.079262][T19766] RAX: ffffffffffffffda RBX: 00007fd7e7085fa0 RCX: 00007fd7e6e5e969 [ 346.079310][T19766] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000008 [ 346.079321][T19766] RBP: 00007fd7e54c7090 R08: 0000000000000000 R09: 0000000000000000 [ 346.079331][T19766] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 346.079342][T19766] R13: 0000000000000000 R14: 00007fd7e7085fa0 R15: 00007ffce8458ec8 [ 346.079397][T19766] [ 346.446699][T19774] IPv6: Can't replace route, no match found [ 346.469643][T19774] netlink: 132 bytes leftover after parsing attributes in process `syz.9.4057'. [ 346.581094][T19787] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4056'. [ 346.590132][T19787] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4056'. [ 346.599647][T19787] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4056'. [ 346.624315][T19787] syz.4.4056: attempt to access beyond end of device [ 346.624315][T19787] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 346.652268][T19787] loop4: detected capacity change from 0 to 1024 [ 346.659222][T19787] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 347.086058][T19802] loop5: detected capacity change from 0 to 512 [ 347.105630][T19804] loop9: detected capacity change from 0 to 512 [ 347.112343][T19802] EXT4-fs (loop5): too many log groups per flexible block group [ 347.120433][T19802] EXT4-fs (loop5): failed to initialize mballoc (-12) [ 347.127447][T19802] EXT4-fs (loop5): mount failed [ 347.135814][T19804] EXT4-fs (loop9): too many log groups per flexible block group [ 347.143683][T19804] EXT4-fs (loop9): failed to initialize mballoc (-12) [ 347.150682][T19804] EXT4-fs (loop9): mount failed [ 347.195114][T19812] loop9: detected capacity change from 0 to 128 [ 347.212385][T19812] FAT-fs (loop9): Invalid FSINFO signature: 0x41615200, 0x61417272 (sector = 1) [ 347.326028][T19820] loop9: detected capacity change from 0 to 1024 [ 347.333021][T19820] EXT4-fs: Ignoring removed orlov option [ 347.339361][T19820] EXT4-fs (loop9): stripe (5) is not aligned with cluster size (16), stripe is disabled [ 347.366026][T19820] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 347.400655][T19820] EXT4-fs error (device loop9): ext4_check_all_de:659: inode #12: block 7: comm syz.9.4076: bad entry in directory: rec_len is too small for name_len - offset=16, inode=14, rec_len=40, size=108 fake=0 [ 347.434660][T17610] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 347.474182][T19837] loop9: detected capacity change from 0 to 128 [ 347.524077][T19841] loop2: detected capacity change from 0 to 128 [ 347.526427][T19843] loop4: detected capacity change from 0 to 512 [ 347.550759][T19841] FAT-fs (loop2): Invalid FSINFO signature: 0x41615200, 0x61417272 (sector = 1) [ 347.578735][T19843] EXT4-fs (loop4): too many log groups per flexible block group [ 347.586692][T19843] EXT4-fs (loop4): failed to initialize mballoc (-12) [ 347.594103][T19843] EXT4-fs (loop4): mount failed [ 347.625121][T19845] SELinux: failed to load policy [ 347.643397][T19848] netlink: 'syz.5.4081': attribute type 4 has an invalid length. [ 347.651886][T19848] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=26216 sclass=netlink_route_socket pid=19848 comm=syz.5.4081 [ 347.786230][T19860] loop9: detected capacity change from 0 to 512 [ 347.796930][T19862] loop2: detected capacity change from 0 to 2048 [ 347.842293][T19860] EXT4-fs (loop9): too many log groups per flexible block group [ 347.850579][T19860] EXT4-fs (loop9): failed to initialize mballoc (-12) [ 347.860576][T19862] Alternate GPT is invalid, using primary GPT. [ 347.867017][T19862] loop2: p1 p2 p3 [ 347.870149][T19860] EXT4-fs (loop9): mount failed [ 347.952345][T19831] loop5: detected capacity change from 0 to 8192 [ 347.989464][T19875] loop9: detected capacity change from 0 to 128 [ 348.005395][T19831] loop5: p1 p3 p4 [ 348.071925][T19831] loop5: p1 size 8390912 extends beyond EOD, truncated [ 348.112340][T19831] loop5: p3 size 589824 extends beyond EOD, truncated [ 348.167066][T19875] FAT-fs (loop9): Invalid FSINFO signature: 0x41615200, 0x61417272 (sector = 1) [ 348.367391][T19904] netlink: zone id is out of range [ 348.372778][T19904] netlink: zone id is out of range [ 348.384663][T19904] netlink: zone id is out of range [ 348.395051][T19904] netlink: zone id is out of range [ 348.400302][T19904] netlink: zone id is out of range [ 348.406457][T19904] netlink: zone id is out of range [ 348.412089][T19904] netlink: zone id is out of range [ 348.418524][T19904] netlink: zone id is out of range [ 348.427276][T19904] netlink: del zone limit has 8 unknown bytes [ 348.478139][ T29] kauditd_printk_skb: 726 callbacks suppressed [ 348.478165][ T29] audit: type=1400 audit(2000000056.870:12473): avc: denied { create } for pid=19918 comm="syz.1.4116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 348.512607][ T29] audit: type=1400 audit(2000000056.900:12474): avc: denied { bind } for pid=19918 comm="syz.1.4116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 348.531185][T19921] loop5: detected capacity change from 0 to 128 [ 348.544841][T19919] loop1: detected capacity change from 0 to 2048 [ 348.550946][T19921] FAT-fs (loop5): Invalid FSINFO signature: 0x41615200, 0x61417272 (sector = 1) [ 348.574398][T19923] loop2: detected capacity change from 0 to 2048 [ 348.580899][ T29] audit: type=1326 audit(2000000056.930:12475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19918 comm="syz.1.4116" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5d5811e969 code=0x7ffc0000 [ 348.604728][ T29] audit: type=1326 audit(2000000056.930:12476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19918 comm="syz.1.4116" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5d5811e969 code=0x7ffc0000 [ 348.628377][ T29] audit: type=1326 audit(2000000056.930:12477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19918 comm="syz.1.4116" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5d5811e969 code=0x7ffc0000 [ 348.652181][ T29] audit: type=1326 audit(2000000056.930:12478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19918 comm="syz.1.4116" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f5d5811e969 code=0x7ffc0000 [ 348.675909][ T29] audit: type=1326 audit(2000000056.930:12479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19918 comm="syz.1.4116" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f5d5811e9a3 code=0x7ffc0000 [ 348.699350][ T29] audit: type=1326 audit(2000000056.930:12480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19918 comm="syz.1.4116" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5d5811d41f code=0x7ffc0000 [ 348.722840][ T29] audit: type=1326 audit(2000000056.940:12481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19918 comm="syz.1.4116" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7f5d5811e9f7 code=0x7ffc0000 [ 348.746394][ T29] audit: type=1326 audit(2000000056.940:12482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19918 comm="syz.1.4116" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f5d5811d2d0 code=0x7ffc0000 [ 348.792035][T19919] Alternate GPT is invalid, using primary GPT. [ 348.798436][T19919] loop1: p1 p2 p3 [ 348.803618][T19923] Alternate GPT is invalid, using primary GPT. [ 348.809909][T19923] loop2: p1 p2 p3 [ 349.182348][T19954] loop9: detected capacity change from 0 to 128 [ 349.191826][T19954] FAT-fs (loop9): Invalid FSINFO signature: 0x41615200, 0x61417272 (sector = 1) [ 349.267044][T19955] syz.5.4131: attempt to access beyond end of device [ 349.267044][T19955] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 349.292622][T19955] loop5: detected capacity change from 0 to 1024 [ 349.299667][T19955] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 349.665121][T19971] loop9: detected capacity change from 0 to 512 [ 349.694439][T19971] EXT4-fs (loop9): too many log groups per flexible block group [ 349.702308][T19971] EXT4-fs (loop9): failed to initialize mballoc (-12) [ 349.711676][T19971] EXT4-fs (loop9): mount failed [ 349.759316][T19985] loop2: detected capacity change from 0 to 128 [ 349.768026][T19987] loop4: detected capacity change from 0 to 128 [ 349.802927][T19991] loop9: detected capacity change from 0 to 128 [ 349.809912][T19991] FAT-fs (loop9): Invalid FSINFO signature: 0x41615200, 0x61417272 (sector = 1) [ 349.837559][T19993] loop1: detected capacity change from 0 to 2048 [ 349.961940][T19993] Alternate GPT is invalid, using primary GPT. [ 349.968459][T19993] loop1: p1 p2 p3 [ 350.011608][ T31] kworker/u8:1: attempt to access beyond end of device [ 350.011608][ T31] loop4: rw=1, sector=159, nr_sectors = 1 limit=128 [ 350.025079][ T31] Buffer I/O error on dev loop4, logical block 159, lost async page write [ 350.079514][T20007] loop9: detected capacity change from 0 to 128 [ 350.244891][T20024] loop4: detected capacity change from 0 to 128 [ 350.446364][ T57] kworker/u8:4: attempt to access beyond end of device [ 350.446364][ T57] loop4: rw=1, sector=159, nr_sectors = 1 limit=128 [ 350.459889][ T57] Buffer I/O error on dev loop4, logical block 159, lost async page write [ 350.660788][T20048] binfmt_misc: register: failed to install interpreter file ./file2 [ 350.684620][T20050] loop9: detected capacity change from 0 to 1024 [ 350.721179][T20058] SELinux: syz.4.4178 (20058) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 350.739488][T20050] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 350.754770][T20050] ext4 filesystem being mounted at /179/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 350.768400][T20061] loop1: detected capacity change from 0 to 128 [ 350.776826][T20062] 9pnet_fd: Insufficient options for proto=fd [ 350.790154][T20059] EXT4-fs error (device loop9): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 21 vs 268369941 free clusters [ 350.892423][ T296] EXT4-fs error (device loop9): ext4_map_blocks:709: inode #15: block 1: comm kworker/u8:5: lblock 1 mapped to illegal pblock 1 (length 15) [ 350.922071][ T296] EXT4-fs (loop9): Delayed block allocation failed for inode 15 at logical offset 1 with max blocks 15 with error 117 [ 350.934649][ T296] EXT4-fs (loop9): This should not happen!! Data will be lost [ 350.934649][ T296] [ 350.990670][ T296] EXT4-fs (loop9): Delayed block allocation failed for inode 15 at logical offset 2050 with max blocks 1 with error 28 [ 351.003416][ T296] EXT4-fs (loop9): This should not happen!! Data will be lost [ 351.003416][ T296] [ 351.013191][ T296] EXT4-fs (loop9): Total free blocks count 0 [ 351.019183][ T296] EXT4-fs (loop9): Free/Dirty block details [ 351.025200][ T296] EXT4-fs (loop9): free_blocks=4293918720 [ 351.031057][ T296] EXT4-fs (loop9): dirty_blocks=32 [ 351.036224][ T296] EXT4-fs (loop9): Block reservation details [ 351.042416][ T57] kworker/u8:4: attempt to access beyond end of device [ 351.042416][ T57] loop2: rw=1, sector=159, nr_sectors = 1 limit=128 [ 351.055951][ T57] Buffer I/O error on dev loop2, logical block 159, lost async page write [ 351.075898][T20068] loop4: detected capacity change from 0 to 2048 [ 351.121277][T20068] loop4: p1 < > p4 [ 351.125838][T20068] loop4: p4 size 8388608 extends beyond EOD, truncated [ 351.148944][T20068] netlink: 'syz.4.4183': attribute type 1 has an invalid length. [ 351.193694][T20080] loop9: detected capacity change from 0 to 512 [ 351.196785][T20068] 8021q: adding VLAN 0 to HW filter on device bond1 [ 351.221934][T20080] EXT4-fs (loop9): too many log groups per flexible block group [ 351.229853][T20080] EXT4-fs (loop9): failed to initialize mballoc (-12) [ 351.236992][T20080] EXT4-fs (loop9): mount failed [ 351.375902][T20098] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=26216 sclass=netlink_route_socket pid=20098 comm=syz.2.4184 [ 351.433097][T20102] loop1: detected capacity change from 0 to 128 [ 351.478488][T20099] loop9: detected capacity change from 0 to 128 [ 351.698235][T20122] loop4: detected capacity change from 0 to 2048 [ 351.743858][T20073] loop2: detected capacity change from 0 to 8192 [ 351.760954][T20122] loop4: p1 < > p4 [ 351.766918][T20122] loop4: p4 size 8388608 extends beyond EOD, truncated [ 351.792043][T20073] loop2: p1 p3 p4 [ 351.803900][T20122] netlink: 'syz.4.4205': attribute type 1 has an invalid length. [ 351.821775][T20073] loop2: p1 size 8390912 extends beyond EOD, truncated [ 351.835887][T20135] binfmt_misc: register: failed to install interpreter file ./file2 [ 351.871741][T20073] loop2: p3 size 589824 extends beyond EOD, truncated [ 351.884662][T20122] 8021q: adding VLAN 0 to HW filter on device bond2 [ 351.913802][T20141] loop1: detected capacity change from 0 to 128 [ 351.932000][T20144] 9pnet_fd: Insufficient options for proto=fd [ 352.045481][T20159] loop2: detected capacity change from 0 to 128 [ 352.198622][T20169] loop5: detected capacity change from 0 to 512 [ 352.234794][T20169] EXT4-fs (loop5): too many log groups per flexible block group [ 352.242757][T20169] EXT4-fs (loop5): failed to initialize mballoc (-12) [ 352.254978][T20169] EXT4-fs (loop5): mount failed [ 352.557884][T20182] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=26216 sclass=netlink_route_socket pid=20182 comm=syz.1.4226 [ 352.749261][T20175] loop1: detected capacity change from 0 to 8192 [ 352.812387][T20175] loop1: p1 p3 p4 [ 352.818414][T20175] loop1: p1 size 8390912 extends beyond EOD, truncated [ 352.830301][T20175] loop1: p3 size 589824 extends beyond EOD, truncated [ 353.143947][T20208] syz.5.4238: attempt to access beyond end of device [ 353.143947][T20208] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 353.170293][T20208] loop5: detected capacity change from 0 to 1024 [ 353.177188][T20208] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 353.483198][ T29] kauditd_printk_skb: 167 callbacks suppressed [ 353.483212][ T29] audit: type=1400 audit(2000000061.880:12650): avc: denied { prog_load } for pid=20214 comm="syz.4.4244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 353.508923][ T29] audit: type=1400 audit(2000000061.880:12651): avc: denied { bpf } for pid=20214 comm="syz.4.4244" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 353.536993][ T29] audit: type=1326 audit(2000000061.910:12652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20218 comm="syz.1.4246" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5d5811e969 code=0x7ffc0000 [ 353.560708][ T29] audit: type=1326 audit(2000000061.910:12653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20218 comm="syz.1.4246" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f5d5811e969 code=0x7ffc0000 [ 353.584352][ T29] audit: type=1400 audit(2000000061.910:12654): avc: denied { open } for pid=20218 comm="syz.1.4246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 353.603959][ T29] audit: type=1400 audit(2000000061.910:12655): avc: denied { kernel } for pid=20218 comm="syz.1.4246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 353.623661][ T29] audit: type=1326 audit(2000000061.910:12656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20218 comm="syz.1.4246" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5d5811e969 code=0x7ffc0000 [ 353.633179][T20224] loop2: detected capacity change from 0 to 128 [ 353.647436][ T29] audit: type=1326 audit(2000000061.910:12657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20218 comm="syz.1.4246" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5d5811e969 code=0x7ffc0000 [ 353.677382][ T29] audit: type=1400 audit(2000000061.910:12658): avc: denied { prog_run } for pid=20218 comm="syz.1.4246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 353.696749][ T29] audit: type=1326 audit(2000000061.910:12659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20218 comm="syz.1.4246" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5d5811e969 code=0x7ffc0000 [ 353.746533][T20230] IPv6: Can't replace route, no match found [ 353.835943][T20234] loop4: detected capacity change from 0 to 128 [ 353.863994][T20236] loop5: detected capacity change from 0 to 128 [ 353.983617][T20248] loop9: detected capacity change from 0 to 128 [ 354.136948][T14540] kworker/u8:13: attempt to access beyond end of device [ 354.136948][T14540] loop4: rw=1, sector=159, nr_sectors = 1 limit=128 [ 354.150463][T14540] Buffer I/O error on dev loop4, logical block 159, lost async page write [ 354.373528][T20292] binfmt_misc: register: failed to install interpreter file ./file2 [ 354.440885][T20301] 9pnet_fd: Insufficient options for proto=fd [ 354.566341][T20313] loop1: detected capacity change from 0 to 164 [ 354.694515][T20314] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=26216 sclass=netlink_route_socket pid=20314 comm=syz.4.4281 [ 354.871321][T20299] loop4: detected capacity change from 0 to 8192 [ 354.897886][ T31] kworker/u8:1: attempt to access beyond end of device [ 354.897886][ T31] loop9: rw=1, sector=159, nr_sectors = 1 limit=128 [ 354.911348][ T31] Buffer I/O error on dev loop9, logical block 159, lost async page write [ 354.943665][T20299] loop4: p1 p3 p4 [ 354.949534][T20299] loop4: p1 size 8390912 extends beyond EOD, truncated [ 354.953301][T20332] loop2: detected capacity change from 0 to 128 [ 354.973273][T20299] loop4: p3 size 589824 extends beyond EOD, truncated [ 355.058537][T20334] loop9: detected capacity change from 0 to 2048 [ 355.090101][T20339] loop4: detected capacity change from 0 to 128 [ 355.100892][T20334] loop9: p1 < > p4 [ 355.105344][T20334] loop9: p4 size 8388608 extends beyond EOD, truncated [ 355.134393][T20334] netlink: 'syz.9.4298': attribute type 1 has an invalid length. [ 355.149604][T20334] 8021q: adding VLAN 0 to HW filter on device bond1 [ 355.255937][T20353] loop5: detected capacity change from 0 to 128 [ 355.514274][T20369] __nla_validate_parse: 28 callbacks suppressed [ 355.514318][T20369] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4306'. [ 355.529526][T20369] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4306'. [ 355.539456][T20369] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4306'. [ 355.548425][T20369] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4306'. [ 355.557966][T20369] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4306'. [ 355.566859][T20369] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4306'. [ 355.576420][T20369] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4306'. [ 355.585312][T20369] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4306'. [ 355.594854][T20369] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4306'. [ 355.603736][T20369] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4306'. [ 355.630388][T20369] syz.4.4306: attempt to access beyond end of device [ 355.630388][T20369] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 355.656398][T20369] loop4: detected capacity change from 0 to 1024 [ 355.663579][T20369] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 355.752448][T20373] binfmt_misc: register: failed to install interpreter file ./file2 [ 355.837764][T20374] 9pnet_fd: Insufficient options for proto=fd [ 356.078351][T20388] loop1: detected capacity change from 0 to 2048 [ 356.129586][ T31] kworker/u8:1: attempt to access beyond end of device [ 356.129586][ T31] loop5: rw=1, sector=159, nr_sectors = 1 limit=128 [ 356.130617][T20388] loop1: p1 < > p4 [ 356.143008][ T31] Buffer I/O error on dev loop5, logical block 159, lost async page write [ 356.156599][T20388] loop1: p4 size 8388608 extends beyond EOD, truncated [ 356.175799][T20388] netlink: 'syz.1.4319': attribute type 1 has an invalid length. [ 356.192334][T20388] 8021q: adding VLAN 0 to HW filter on device bond1 [ 356.266266][T20392] SELinux: syz.5.4320 (20392) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 356.636230][T20410] loop1: detected capacity change from 0 to 2048 [ 356.703044][T20410] Alternate GPT is invalid, using primary GPT. [ 356.709471][T20410] loop1: p1 p2 p3 [ 356.998148][T20423] syz.5.4332: attempt to access beyond end of device [ 356.998148][T20423] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 357.025359][T20423] loop5: detected capacity change from 0 to 1024 [ 357.032237][T20423] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 357.481186][T20439] loop2: detected capacity change from 0 to 128 [ 357.602243][T20447] loop4: detected capacity change from 0 to 8192 [ 357.675862][T20449] loop5: detected capacity change from 0 to 128 [ 357.863604][T20467] loop1: detected capacity change from 0 to 164 [ 357.990268][T20475] loop9: detected capacity change from 0 to 8192 [ 358.038477][T20479] SELinux: syz.2.4357 (20479) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 358.492616][ T29] kauditd_printk_skb: 435 callbacks suppressed [ 358.492633][ T29] audit: type=1400 audit(2000000066.890:13095): avc: denied { create } for pid=20483 comm="syz.4.4358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 358.530469][ T29] audit: type=1400 audit(2000000066.930:13096): avc: denied { write } for pid=20483 comm="syz.4.4358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 358.550833][ T29] audit: type=1400 audit(2000000066.930:13097): avc: denied { nlmsg_write } for pid=20483 comm="syz.4.4358" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 358.661183][ T29] audit: type=1400 audit(2000000067.060:13098): avc: denied { unmount } for pid=19011 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:iso9660_t tclass=filesystem permissive=1 [ 358.758338][T20492] loop4: detected capacity change from 0 to 128 [ 358.870415][ T29] audit: type=1326 audit(2000000067.270:13099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20495 comm="syz.1.4364" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5d5811e969 code=0x7ffc0000 [ 358.924734][ T29] audit: type=1326 audit(2000000067.270:13100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20495 comm="syz.1.4364" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5d5811e969 code=0x7ffc0000 [ 358.948423][ T29] audit: type=1326 audit(2000000067.300:13101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20495 comm="syz.1.4364" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f5d5811e969 code=0x7ffc0000 [ 358.972121][ T29] audit: type=1326 audit(2000000067.300:13102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20495 comm="syz.1.4364" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5d5811e969 code=0x7ffc0000 [ 358.995823][ T29] audit: type=1326 audit(2000000067.300:13103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20495 comm="syz.1.4364" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5d5811e969 code=0x7ffc0000 [ 359.019427][ T29] audit: type=1326 audit(2000000067.300:13104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20495 comm="syz.1.4364" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f5d5811e969 code=0x7ffc0000 [ 359.137785][T20507] loop2: detected capacity change from 0 to 2048 [ 359.213941][T20507] Alternate GPT is invalid, using primary GPT. [ 359.220344][T20507] loop2: p1 p2 p3 [ 359.398447][T20524] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=26216 sclass=netlink_route_socket pid=20524 comm=syz.1.4368 [ 359.411460][T20522] loop9: detected capacity change from 0 to 8192 [ 359.533515][T14540] kworker/u8:13: attempt to access beyond end of device [ 359.533515][T14540] loop5: rw=1, sector=159, nr_sectors = 1 limit=128 [ 359.547115][T14540] Buffer I/O error on dev loop5, logical block 159, lost async page write [ 359.696693][T20531] IPv6: Can't replace route, no match found [ 359.907795][T20502] loop1: detected capacity change from 0 to 8192 [ 359.946912][T20540] loop4: detected capacity change from 0 to 128 [ 359.962130][T20502] loop1: p1 p3 p4 [ 360.012536][T20502] loop1: p1 size 8390912 extends beyond EOD, truncated [ 360.081026][T20502] loop1: p3 size 589824 extends beyond EOD, truncated [ 360.126809][T20549] loop5: detected capacity change from 0 to 128 [ 360.432445][T20557] IPv6: Can't replace route, no match found [ 360.952297][T20583] syz.9.4400: attempt to access beyond end of device [ 360.952297][T20583] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 360.979205][T20583] loop9: detected capacity change from 0 to 1024 [ 360.986216][T20583] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 361.478313][T14538] kworker/u8:12: attempt to access beyond end of device [ 361.478313][T14538] loop5: rw=1, sector=159, nr_sectors = 1 limit=128 [ 361.491931][T14538] Buffer I/O error on dev loop5, logical block 159, lost async page write [ 361.575513][T20604] IPv6: Can't replace route, no match found [ 361.677105][T20608] loop9: detected capacity change from 0 to 128 [ 361.851209][T20626] loop2: detected capacity change from 0 to 128 [ 361.941815][T14538] kworker/u8:12: attempt to access beyond end of device [ 361.941815][T14538] loop2: rw=2049, sector=129, nr_sectors = 8 limit=128 [ 361.969099][T20623] __nla_validate_parse: 24 callbacks suppressed [ 361.969118][T20623] netlink: 28 bytes leftover after parsing attributes in process `syz.5.4419'. [ 361.970803][T20626] syz.2.4420: attempt to access beyond end of device [ 361.970803][T20626] loop2: rw=2049, sector=137, nr_sectors = 57 limit=128 [ 362.273901][T14540] kworker/u8:13: attempt to access beyond end of device [ 362.273901][T14540] loop2: rw=1, sector=159, nr_sectors = 1 limit=128 [ 362.287459][T14540] Buffer I/O error on dev loop2, logical block 159, lost async page write [ 362.334928][T20644] loop1: detected capacity change from 0 to 512 [ 362.353044][T20644] EXT4-fs (loop1): too many log groups per flexible block group [ 362.360881][T20644] EXT4-fs (loop1): failed to initialize mballoc (-12) [ 362.367964][T20644] EXT4-fs (loop1): mount failed [ 362.393661][T20654] IPv6: Can't replace route, no match found [ 362.480702][T20667] loop5: detected capacity change from 0 to 128 [ 362.743073][T20687] loop2: detected capacity change from 0 to 512 [ 362.749864][T14540] kworker/u8:13: attempt to access beyond end of device [ 362.749864][T14540] loop5: rw=1, sector=159, nr_sectors = 1 limit=128 [ 362.763404][T14540] Buffer I/O error on dev loop5, logical block 159, lost async page write [ 362.792151][T20687] EXT4-fs (loop2): too many log groups per flexible block group [ 362.800064][T20687] EXT4-fs (loop2): failed to initialize mballoc (-12) [ 362.813848][T20695] IPv6: Can't replace route, no match found [ 362.846386][T20697] loop5: detected capacity change from 0 to 128 [ 362.879347][T20703] FAULT_INJECTION: forcing a failure. [ 362.879347][T20703] name failslab, interval 1, probability 0, space 0, times 0 [ 362.892101][T20703] CPU: 1 UID: 0 PID: 20703 Comm: syz.9.4451 Not tainted 6.15.0-rc6-syzkaller-00047-ge9565e23cd89 #0 PREEMPT(voluntary) [ 362.892137][T20703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 362.892239][T20703] Call Trace: [ 362.892246][T20703] [ 362.892254][T20703] __dump_stack+0x1d/0x30 [ 362.892275][T20703] dump_stack_lvl+0xe8/0x140 [ 362.892294][T20703] dump_stack+0x15/0x1b [ 362.892378][T20703] should_fail_ex+0x265/0x280 [ 362.892412][T20703] ? ip_ra_control+0xd6/0x2c0 [ 362.892438][T20703] should_failslab+0x8c/0xb0 [ 362.892482][T20703] __kmalloc_cache_noprof+0x4c/0x320 [ 362.892510][T20703] ip_ra_control+0xd6/0x2c0 [ 362.892542][T20703] do_ip_setsockopt+0xbbb/0x2240 [ 362.892638][T20703] ip_setsockopt+0x58/0x110 [ 362.892710][T20703] raw_setsockopt+0xbd/0x150 [ 362.892743][T20703] sock_common_setsockopt+0x66/0x80 [ 362.892777][T20703] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 362.892806][T20703] __sys_setsockopt+0x181/0x200 [ 362.892884][T20703] __x64_sys_setsockopt+0x64/0x80 [ 362.892948][T20703] x64_sys_call+0x2bd5/0x2fb0 [ 362.893024][T20703] do_syscall_64+0xd0/0x1a0 [ 362.893071][T20703] ? clear_bhb_loop+0x40/0x90 [ 362.893098][T20703] ? clear_bhb_loop+0x40/0x90 [ 362.893125][T20703] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 362.893233][T20703] RIP: 0033:0x7f35ac8ae969 [ 362.893253][T20703] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 362.893275][T20703] RSP: 002b:00007f35aaf17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 362.893296][T20703] RAX: ffffffffffffffda RBX: 00007f35acad5fa0 RCX: 00007f35ac8ae969 [ 362.893310][T20703] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000006 [ 362.893404][T20703] RBP: 00007f35aaf17090 R08: 0000000000000004 R09: 0000000000000000 [ 362.893420][T20703] R10: 0000200000000080 R11: 0000000000000246 R12: 0000000000000001 [ 362.893435][T20703] R13: 0000000000000000 R14: 00007f35acad5fa0 R15: 00007ffc25159798 [ 362.893453][T20703] [ 362.959709][T20687] EXT4-fs (loop2): mount failed [ 363.235875][T20732] netlink: 16 bytes leftover after parsing attributes in process `syz.9.4465'. [ 363.245058][T20732] netlink: 16 bytes leftover after parsing attributes in process `syz.9.4465'. [ 363.399948][T20743] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4462'. [ 363.408932][T20743] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4462'. [ 363.418401][T20743] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4462'. [ 363.427299][T20743] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4462'. [ 363.436943][T20743] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4462'. [ 363.445844][T20743] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4462'. [ 363.455349][T20743] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4462'. [ 363.480599][T20743] syz.4.4462: attempt to access beyond end of device [ 363.480599][T20743] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 363.505873][T20743] loop4: detected capacity change from 0 to 1024 [ 363.512809][T20743] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 363.539217][T20742] loop2: detected capacity change from 0 to 2048 [ 363.550243][ T29] kauditd_printk_skb: 215 callbacks suppressed [ 363.550313][ T29] audit: type=1326 audit(2000000071.780:13320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20741 comm="syz.2.4469" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0f43dae969 code=0x7ffc0000 [ 363.580230][ T29] audit: type=1326 audit(2000000071.780:13321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20741 comm="syz.2.4469" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0f43dae969 code=0x7ffc0000 [ 363.604373][ T29] audit: type=1326 audit(2000000071.780:13322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20741 comm="syz.2.4469" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0f43dae969 code=0x7ffc0000 [ 363.628227][ T29] audit: type=1326 audit(2000000071.780:13323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20741 comm="syz.2.4469" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0f43dae969 code=0x7ffc0000 [ 363.651960][ T29] audit: type=1326 audit(2000000071.780:13324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20741 comm="syz.2.4469" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0f43dae969 code=0x7ffc0000 [ 363.675654][ T29] audit: type=1326 audit(2000000071.780:13325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20741 comm="syz.2.4469" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f0f43dae969 code=0x7ffc0000 [ 363.699373][ T29] audit: type=1326 audit(2000000071.780:13326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20741 comm="syz.2.4469" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f0f43dae9a3 code=0x7ffc0000 [ 363.722807][ T29] audit: type=1400 audit(2000000071.910:13327): avc: denied { mounton } for pid=20725 comm="syz.4.4462" path="/316/bus" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 363.747162][ T29] audit: type=1326 audit(2000000071.920:13328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20741 comm="syz.2.4469" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f0f43dad41f code=0x7ffc0000 [ 363.770732][ T29] audit: type=1326 audit(2000000071.930:13329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20741 comm="syz.2.4469" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7f0f43dae9f7 code=0x7ffc0000 [ 363.824794][T20746] Alternate GPT is invalid, using primary GPT. [ 363.831247][T20746] loop2: p1 p2 p3 [ 363.844407][ T31] kworker/u8:1: attempt to access beyond end of device [ 363.844407][ T31] loop5: rw=1, sector=159, nr_sectors = 1 limit=128 [ 363.858141][ T31] Buffer I/O error on dev loop5, logical block 159, lost async page write [ 363.882591][T20745] loop9: detected capacity change from 0 to 512 [ 363.925644][T20742] Alternate GPT is invalid, using primary GPT. [ 363.932171][T20742] loop2: p1 p2 p3 [ 363.937928][T20745] EXT4-fs (loop9): failed to open journal device unknown-block(0,0) -6 [ 364.127964][T20766] loop4: detected capacity change from 0 to 2048 [ 364.157767][T20773] loop9: detected capacity change from 0 to 128 [ 364.185080][T20766] Alternate GPT is invalid, using primary GPT. [ 364.192352][T20766] loop4: p1 p2 p3 [ 364.232285][T20777] loop2: detected capacity change from 0 to 512 [ 364.283157][T20777] EXT4-fs (loop2): too many log groups per flexible block group [ 364.290961][T20777] EXT4-fs (loop2): failed to initialize mballoc (-12) [ 364.305464][T20777] EXT4-fs (loop2): mount failed [ 364.440306][T20798] loop2: detected capacity change from 0 to 128 [ 364.456194][T20794] loop1: detected capacity change from 0 to 128 [ 364.513521][T20801] FAULT_INJECTION: forcing a failure. [ 364.513521][T20801] name failslab, interval 1, probability 0, space 0, times 0 [ 364.526335][T20801] CPU: 1 UID: 0 PID: 20801 Comm: syz.9.4492 Not tainted 6.15.0-rc6-syzkaller-00047-ge9565e23cd89 #0 PREEMPT(voluntary) [ 364.526364][T20801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 364.526380][T20801] Call Trace: [ 364.526388][T20801] [ 364.526399][T20801] __dump_stack+0x1d/0x30 [ 364.526426][T20801] dump_stack_lvl+0xe8/0x140 [ 364.526465][T20801] dump_stack+0x15/0x1b [ 364.526487][T20801] should_fail_ex+0x265/0x280 [ 364.526527][T20801] should_failslab+0x8c/0xb0 [ 364.526557][T20801] kmem_cache_alloc_noprof+0x50/0x310 [ 364.526576][T20801] ? security_inode_alloc+0x37/0x100 [ 364.526681][T20801] security_inode_alloc+0x37/0x100 [ 364.526709][T20801] inode_init_always_gfp+0x4b7/0x500 [ 364.526802][T20801] ? __pfx_hugetlbfs_alloc_inode+0x10/0x10 [ 364.526875][T20801] alloc_inode+0x58/0x170 [ 364.526906][T20801] new_inode+0x1d/0xe0 [ 364.526974][T20801] hugetlbfs_get_inode+0x7b/0x370 [ 364.526993][T20801] ? trace_reschedule_exit+0xd/0xc0 [ 364.527032][T20801] hugetlb_file_setup+0x192/0x3d0 [ 364.527136][T20801] ksys_mmap_pgoff+0x157/0x310 [ 364.527164][T20801] x64_sys_call+0x1602/0x2fb0 [ 364.527189][T20801] do_syscall_64+0xd0/0x1a0 [ 364.527219][T20801] ? clear_bhb_loop+0x40/0x90 [ 364.527276][T20801] ? clear_bhb_loop+0x40/0x90 [ 364.527297][T20801] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 364.527323][T20801] RIP: 0033:0x7f35ac8ae969 [ 364.527368][T20801] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 364.527420][T20801] RSP: 002b:00007f35aaf17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 364.527445][T20801] RAX: ffffffffffffffda RBX: 00007f35acad5fa0 RCX: 00007f35ac8ae969 [ 364.527504][T20801] RDX: 0000000000000002 RSI: 0000000000ff5000 RDI: 0000200000000000 [ 364.527521][T20801] RBP: 00007f35aaf17090 R08: ffffffffffffffff R09: 0000000000000000 [ 364.527537][T20801] R10: 000000000004c831 R11: 0000000000000246 R12: 0000000000000001 [ 364.527554][T20801] R13: 0000000000000000 R14: 00007f35acad5fa0 R15: 00007ffc25159798 [ 364.527649][T20801] [ 364.740106][T20802] syz.5.4488: attempt to access beyond end of device [ 364.740106][T20802] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 364.766468][T20802] loop5: detected capacity change from 0 to 1024 [ 364.773313][T20802] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 364.863656][T20804] loop9: detected capacity change from 0 to 2048 [ 364.931659][T20804] Alternate GPT is invalid, using primary GPT. [ 364.938058][T20804] loop9: p1 p2 p3 [ 365.034233][T20824] IPv6: Can't replace route, no match found [ 365.173822][T20843] loop2: detected capacity change from 0 to 128 [ 365.184393][T20842] loop1: detected capacity change from 0 to 128 [ 365.250303][T20845] loop4: detected capacity change from 0 to 128 [ 365.259408][T20842] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=16, mo=a842c018, mo2=0002] [ 365.276519][T20848] FAULT_INJECTION: forcing a failure. [ 365.276519][T20848] name failslab, interval 1, probability 0, space 0, times 0 [ 365.289233][T20848] CPU: 1 UID: 0 PID: 20848 Comm: syz.5.4511 Not tainted 6.15.0-rc6-syzkaller-00047-ge9565e23cd89 #0 PREEMPT(voluntary) [ 365.289268][T20848] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 365.289283][T20848] Call Trace: [ 365.289289][T20848] [ 365.289297][T20848] __dump_stack+0x1d/0x30 [ 365.289318][T20848] dump_stack_lvl+0xe8/0x140 [ 365.289336][T20848] dump_stack+0x15/0x1b [ 365.289357][T20848] should_fail_ex+0x265/0x280 [ 365.289399][T20848] should_failslab+0x8c/0xb0 [ 365.289437][T20848] kmem_cache_alloc_noprof+0x50/0x310 [ 365.289481][T20848] ? vm_area_alloc+0x2c/0xb0 [ 365.289508][T20848] vm_area_alloc+0x2c/0xb0 [ 365.289528][T20848] mmap_region+0x81f/0x1470 [ 365.289582][T20848] do_mmap+0x9de/0xc20 [ 365.289616][T20848] vm_mmap_pgoff+0x17a/0x2e0 [ 365.289648][T20848] ksys_mmap_pgoff+0xc2/0x310 [ 365.289679][T20848] ? __x64_sys_mmap+0x49/0x70 [ 365.289704][T20848] x64_sys_call+0x1602/0x2fb0 [ 365.289726][T20848] do_syscall_64+0xd0/0x1a0 [ 365.289748][T20848] ? clear_bhb_loop+0x40/0x90 [ 365.289773][T20848] ? clear_bhb_loop+0x40/0x90 [ 365.289797][T20848] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 365.289829][T20848] RIP: 0033:0x7f314e87e9a3 [ 365.289849][T20848] Code: f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 41 89 ca 41 f7 c1 ff 0f 00 00 75 14 b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 25 c3 0f 1f 40 00 48 c7 c0 a8 ff ff ff 64 c7 [ 365.289872][T20848] RSP: 002b:00007f314cee6e18 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 365.289893][T20848] RAX: ffffffffffffffda RBX: 000000000000048b RCX: 00007f314e87e9a3 [ 365.289908][T20848] RDX: 0000000000000003 RSI: 0000000008400000 RDI: 0000000000000000 [ 365.289924][T20848] RBP: 0000200000002482 R08: 00000000ffffffff R09: 0000000000000000 [ 365.289939][T20848] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000000004 [ 365.289950][T20848] R13: 00007f314cee6ef0 R14: 00007f314cee6eb0 R15: 0000200000002940 [ 365.289973][T20848] [ 365.295936][T20842] System zones: 1-3, 19-19, 35-36 [ 365.490749][T20842] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 365.520819][T20842] ext4 filesystem being mounted at /127/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 365.621528][T19011] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 365.658918][T20864] loop9: detected capacity change from 0 to 512 [ 365.685795][T20864] EXT4-fs (loop9): too many log groups per flexible block group [ 365.693755][T20864] EXT4-fs (loop9): failed to initialize mballoc (-12) [ 365.701550][T20864] EXT4-fs (loop9): mount failed [ 365.830809][T20884] loop9: detected capacity change from 0 to 2048 [ 365.931077][T20891] syz.1.4522: attempt to access beyond end of device [ 365.931077][T20891] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 365.956331][T20891] loop1: detected capacity change from 0 to 1024 [ 365.963259][T20891] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 366.025315][T20884] Alternate GPT is invalid, using primary GPT. [ 366.031745][T20884] loop9: p1 p2 p3 [ 366.248936][T14538] kworker/u8:12: attempt to access beyond end of device [ 366.248936][T14538] loop2: rw=1, sector=159, nr_sectors = 1 limit=128 [ 366.262658][T14538] Buffer I/O error on dev loop2, logical block 159, lost async page write [ 366.338467][T20904] loop4: detected capacity change from 0 to 512 [ 366.371805][T20904] EXT4-fs (loop4): too many log groups per flexible block group [ 366.379586][T20904] EXT4-fs (loop4): failed to initialize mballoc (-12) [ 366.403751][T20904] EXT4-fs (loop4): mount failed [ 366.430703][T20914] binfmt_misc: register: failed to install interpreter file ./file2 [ 366.469805][T20916] binfmt_misc: register: failed to install interpreter file ./file2 [ 366.503629][T20918] loop4: detected capacity change from 0 to 128 [ 366.652590][T20929] IPv6: Can't replace route, no match found [ 366.757046][T20939] loop1: detected capacity change from 0 to 256 [ 366.768851][T20939] FAT-fs (loop1): error, corrupted file size (i_pos 196, 2097162) [ 366.776755][T20939] FAT-fs (loop1): Filesystem has been set read-only [ 367.195206][T20972] loop1: detected capacity change from 0 to 512 [ 367.221596][T20972] EXT4-fs (loop1): too many log groups per flexible block group [ 367.229520][T20972] EXT4-fs (loop1): failed to initialize mballoc (-12) [ 367.236588][T20972] EXT4-fs (loop1): mount failed [ 367.304272][T20982] loop5: detected capacity change from 0 to 128 [ 367.316810][T20984] FAULT_INJECTION: forcing a failure. [ 367.316810][T20984] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 367.330117][T20984] CPU: 1 UID: 0 PID: 20984 Comm: syz.1.4568 Not tainted 6.15.0-rc6-syzkaller-00047-ge9565e23cd89 #0 PREEMPT(voluntary) [ 367.330178][T20984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 367.330215][T20984] Call Trace: [ 367.330221][T20984] [ 367.330237][T20984] __dump_stack+0x1d/0x30 [ 367.330264][T20984] dump_stack_lvl+0xe8/0x140 [ 367.330290][T20984] dump_stack+0x15/0x1b [ 367.330312][T20984] should_fail_ex+0x265/0x280 [ 367.330352][T20984] should_fail+0xb/0x20 [ 367.330424][T20984] should_fail_usercopy+0x1a/0x20 [ 367.330448][T20984] _copy_from_user+0x1c/0xb0 [ 367.330478][T20984] do_ipv6_setsockopt+0x220/0x22e0 [ 367.330508][T20984] ? kstrtoull+0x111/0x140 [ 367.330595][T20984] ? __rcu_read_unlock+0x4f/0x70 [ 367.330630][T20984] ? avc_has_perm_noaudit+0x1b1/0x200 [ 367.330658][T20984] ? selinux_netlbl_socket_setsockopt+0x1f9/0x2d0 [ 367.330712][T20984] ipv6_setsockopt+0x59/0x130 [ 367.330736][T20984] tcp_setsockopt+0x98/0xb0 [ 367.330791][T20984] sock_common_setsockopt+0x66/0x80 [ 367.330828][T20984] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 367.330863][T20984] __sys_setsockopt+0x181/0x200 [ 367.330883][T20984] __x64_sys_setsockopt+0x64/0x80 [ 367.330917][T20984] x64_sys_call+0x2bd5/0x2fb0 [ 367.330944][T20984] do_syscall_64+0xd0/0x1a0 [ 367.330974][T20984] ? clear_bhb_loop+0x40/0x90 [ 367.330997][T20984] ? clear_bhb_loop+0x40/0x90 [ 367.331030][T20984] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 367.331131][T20984] RIP: 0033:0x7f5d5811e969 [ 367.331149][T20984] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 367.331208][T20984] RSP: 002b:00007f5d56787038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 367.331231][T20984] RAX: ffffffffffffffda RBX: 00007f5d58345fa0 RCX: 00007f5d5811e969 [ 367.331316][T20984] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000006 [ 367.331331][T20984] RBP: 00007f5d56787090 R08: 0000000000000440 R09: 0000000000000000 [ 367.331347][T20984] R10: 0000200000000740 R11: 0000000000000246 R12: 0000000000000001 [ 367.331362][T20984] R13: 0000000000000000 R14: 00007f5d58345fa0 R15: 00007ffcfdee2f68 [ 367.331386][T20984] [ 367.589913][T20986] loop2: detected capacity change from 0 to 128 [ 367.756681][T21000] loop4: detected capacity change from 0 to 512 [ 367.783382][T21000] EXT4-fs (loop4): too many log groups per flexible block group [ 367.791298][T21000] EXT4-fs (loop4): failed to initialize mballoc (-12) [ 367.794635][T21006] binfmt_misc: register: failed to install interpreter file ./file2 [ 367.799157][T21000] EXT4-fs (loop4): mount failed [ 367.971558][T21018] loop4: detected capacity change from 0 to 128 [ 368.190582][T14538] kworker/u8:12: attempt to access beyond end of device [ 368.190582][T14538] loop5: rw=1, sector=159, nr_sectors = 1 limit=128 [ 368.204141][T14538] Buffer I/O error on dev loop5, logical block 159, lost async page write [ 368.297119][T21025] loop5: detected capacity change from 0 to 2048 [ 368.361227][T21025] Alternate GPT is invalid, using primary GPT. [ 368.367599][T21025] loop5: p1 p2 p3 [ 368.568543][ T29] kauditd_printk_skb: 405 callbacks suppressed [ 368.568640][ T29] audit: type=1326 audit(2000000076.960:13735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21024 comm="syz.5.4585" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f314e87e969 code=0x7ffc0000 [ 368.598998][ T29] audit: type=1326 audit(2000000076.960:13736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21024 comm="syz.5.4585" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f314e87e969 code=0x7ffc0000 [ 368.658619][ T29] audit: type=1400 audit(2000000077.050:13737): avc: denied { create } for pid=21027 comm="syz.1.4586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 368.680237][T21028] __nla_validate_parse: 55 callbacks suppressed [ 368.680317][T21028] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4586'. [ 368.698882][ T29] audit: type=1400 audit(2000000077.060:13738): avc: denied { bind } for pid=21027 comm="syz.1.4586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 368.718498][ T29] audit: type=1400 audit(2000000077.070:13739): avc: denied { create } for pid=21027 comm="syz.1.4586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 368.739334][ T29] audit: type=1400 audit(2000000077.080:13740): avc: denied { write } for pid=21027 comm="syz.1.4586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 368.760166][ T29] audit: type=1400 audit(2000000077.130:13741): avc: denied { write } for pid=21027 comm="syz.1.4586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 368.780029][ T29] audit: type=1400 audit(2000000077.140:13742): avc: denied { create } for pid=21027 comm="syz.1.4586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 368.799776][ T29] audit: type=1400 audit(2000000077.140:13743): avc: denied { mount } for pid=21027 comm="syz.1.4586" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 368.822639][ T29] audit: type=1400 audit(2000000077.140:13744): avc: denied { search } for pid=21027 comm="syz.1.4586" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=dir permissive=1 [ 368.858620][ T31] kworker/u8:1: attempt to access beyond end of device [ 368.858620][ T31] loop2: rw=1, sector=159, nr_sectors = 1 limit=128 [ 368.872104][ T31] Buffer I/O error on dev loop2, logical block 159, lost async page write [ 368.998791][T21043] loop2: detected capacity change from 0 to 128 [ 369.055385][T21048] syz.5.4588: attempt to access beyond end of device [ 369.055385][T21048] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 369.079714][T21048] loop5: detected capacity change from 0 to 1024 [ 369.086696][T21048] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 369.216695][T21052] binfmt_misc: register: failed to install interpreter file ./file2 [ 369.673961][T21062] loop4: detected capacity change from 0 to 128 [ 369.742808][T21065] IPv6: Can't replace route, no match found [ 369.833080][T21075] loop9: detected capacity change from 0 to 512 [ 369.863309][T21075] EXT4-fs (loop9): too many log groups per flexible block group [ 369.871243][T21075] EXT4-fs (loop9): failed to initialize mballoc (-12) [ 369.879686][T21083] loop5: detected capacity change from 0 to 128 [ 369.883661][T21084] loop2: detected capacity change from 0 to 1024 [ 369.893133][T21084] EXT4-fs: Ignoring removed nobh option [ 369.898938][T21084] EXT4-fs: Ignoring removed bh option [ 369.905073][T21075] EXT4-fs (loop9): mount failed [ 369.920173][T21083] FAT-fs (loop5): error, invalid access to FAT (entry 0x00000100) [ 369.928060][T21083] FAT-fs (loop5): Filesystem has been set read-only [ 369.932877][T21084] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 369.934724][T21083] syz.5.4608: attempt to access beyond end of device [ 369.934724][T21083] loop5: rw=524288, sector=2065, nr_sectors = 8 limit=128 [ 369.961072][T21083] FAT-fs (loop5): error, invalid access to FAT (entry 0x00000100) [ 369.968915][T21083] FAT-fs (loop5): error, invalid access to FAT (entry 0x00000100) [ 369.978397][T21083] syz.5.4608: attempt to access beyond end of device [ 369.978397][T21083] loop5: rw=0, sector=2065, nr_sectors = 8 limit=128 [ 370.015459][T21093] loop9: detected capacity change from 0 to 128 [ 370.068655][T21096] loop1: detected capacity change from 0 to 2048 [ 370.090542][T21094] SELinux: Context system_u:object_r:mouse_device_t:s0 is not valid (left unmapped). [ 370.111633][T21096] Alternate GPT is invalid, using primary GPT. [ 370.118003][T21096] loop1: p1 p2 p3 [ 370.191801][T21084] 8021q: VLANs not supported on nlmon0 [ 370.362189][T21105] syz.5.4613: attempt to access beyond end of device [ 370.362189][T21105] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 370.386968][T21105] loop5: detected capacity change from 0 to 1024 [ 370.393791][T21105] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 370.463762][T16604] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 370.731334][T21111] loop2: detected capacity change from 0 to 128 [ 370.887658][T14540] kworker/u8:13: attempt to access beyond end of device [ 370.887658][T14540] loop9: rw=1, sector=159, nr_sectors = 1 limit=128 [ 370.901492][T14540] Buffer I/O error on dev loop9, logical block 159, lost async page write [ 370.919865][T21121] IPv6: Can't replace route, no match found [ 370.940942][T21123] FAULT_INJECTION: forcing a failure. [ 370.940942][T21123] name failslab, interval 1, probability 0, space 0, times 0 [ 370.953788][T21123] CPU: 0 UID: 0 PID: 21123 Comm: syz.9.4620 Not tainted 6.15.0-rc6-syzkaller-00047-ge9565e23cd89 #0 PREEMPT(voluntary) [ 370.953824][T21123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 370.953908][T21123] Call Trace: [ 370.953915][T21123] [ 370.953925][T21123] __dump_stack+0x1d/0x30 [ 370.953952][T21123] dump_stack_lvl+0xe8/0x140 [ 370.953977][T21123] dump_stack+0x15/0x1b [ 370.953998][T21123] should_fail_ex+0x265/0x280 [ 370.954112][T21123] should_failslab+0x8c/0xb0 [ 370.954151][T21123] kmem_cache_alloc_node_noprof+0x57/0x320 [ 370.954176][T21123] ? __alloc_skb+0x101/0x320 [ 370.954247][T21123] __alloc_skb+0x101/0x320 [ 370.954283][T21123] ? audit_log_start+0x365/0x6c0 [ 370.954343][T21123] audit_log_start+0x380/0x6c0 [ 370.954383][T21123] audit_seccomp+0x48/0x100 [ 370.954457][T21123] ? __seccomp_filter+0x68c/0x10d0 [ 370.954550][T21123] __seccomp_filter+0x69d/0x10d0 [ 370.954579][T21123] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 370.954697][T21123] ? vfs_write+0x75e/0x8d0 [ 370.954733][T21123] ? __rcu_read_unlock+0x4f/0x70 [ 370.954761][T21123] ? __fget_files+0x184/0x1c0 [ 370.954858][T21123] __secure_computing+0x82/0x150 [ 370.954933][T21123] syscall_trace_enter+0xcf/0x1e0 [ 370.954964][T21123] do_syscall_64+0xaa/0x1a0 [ 370.954994][T21123] ? clear_bhb_loop+0x40/0x90 [ 370.955020][T21123] ? clear_bhb_loop+0x40/0x90 [ 370.955047][T21123] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 370.955112][T21123] RIP: 0033:0x7f35ac8ae969 [ 370.955130][T21123] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 370.955177][T21123] RSP: 002b:00007f35aaf17038 EFLAGS: 00000246 ORIG_RAX: 00000000000000d2 [ 370.955200][T21123] RAX: ffffffffffffffda RBX: 00007f35acad5fa0 RCX: 00007f35ac8ae969 [ 370.955215][T21123] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 370.955238][T21123] RBP: 00007f35aaf17090 R08: 0000000000000000 R09: 0000000000000000 [ 370.955252][T21123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 370.955267][T21123] R13: 0000000000000000 R14: 00007f35acad5fa0 R15: 00007ffc25159798 [ 370.955302][T21123] [ 371.260647][T21133] loop5: detected capacity change from 0 to 128 [ 371.491253][T21146] loop9: detected capacity change from 0 to 128 [ 371.609488][ T4557] kworker/u8:9: attempt to access beyond end of device [ 371.609488][ T4557] loop2: rw=1, sector=159, nr_sectors = 1 limit=128 [ 371.623274][ T4557] Buffer I/O error on dev loop2, logical block 159, lost async page write [ 371.666571][T21151] loop1: detected capacity change from 0 to 512 [ 371.666581][ T4557] kworker/u8:9: attempt to access beyond end of device [ 371.666581][ T4557] loop9: rw=1, sector=159, nr_sectors = 1 limit=128 [ 371.666610][ T4557] Buffer I/O error on dev loop9, logical block 159, lost async page write [ 371.708194][T21157] FAULT_INJECTION: forcing a failure. [ 371.708194][T21157] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 371.721410][T21157] CPU: 0 UID: 0 PID: 21157 Comm: syz.9.4635 Not tainted 6.15.0-rc6-syzkaller-00047-ge9565e23cd89 #0 PREEMPT(voluntary) [ 371.721457][T21157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 371.721472][T21157] Call Trace: [ 371.721479][T21157] [ 371.721488][T21157] __dump_stack+0x1d/0x30 [ 371.721508][T21157] dump_stack_lvl+0xe8/0x140 [ 371.721563][T21157] dump_stack+0x15/0x1b [ 371.721596][T21157] should_fail_ex+0x265/0x280 [ 371.721638][T21157] should_fail+0xb/0x20 [ 371.721667][T21157] should_fail_usercopy+0x1a/0x20 [ 371.721698][T21157] _copy_from_iter+0xcf/0xdd0 [ 371.721751][T21157] ? alloc_pages_mpol+0x202/0x250 [ 371.721784][T21157] copy_page_from_iter+0x15a/0x290 [ 371.721885][T21157] tun_get_user+0x5c7/0x24d0 [ 371.721914][T21157] ? ref_tracker_alloc+0x1f2/0x2f0 [ 371.721985][T21157] tun_chr_write_iter+0x15e/0x210 [ 371.722037][T21157] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 371.722065][T21157] vfs_write+0x49d/0x8d0 [ 371.722104][T21157] ksys_write+0xda/0x1a0 [ 371.722134][T21157] __x64_sys_write+0x40/0x50 [ 371.722162][T21157] x64_sys_call+0x2cdd/0x2fb0 [ 371.722187][T21157] do_syscall_64+0xd0/0x1a0 [ 371.722218][T21157] ? clear_bhb_loop+0x40/0x90 [ 371.722261][T21157] ? clear_bhb_loop+0x40/0x90 [ 371.722282][T21157] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 371.722302][T21157] RIP: 0033:0x7f35ac8ad41f [ 371.722317][T21157] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 371.722334][T21157] RSP: 002b:00007f35aaf17000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 371.722401][T21157] RAX: ffffffffffffffda RBX: 00007f35acad5fa0 RCX: 00007f35ac8ad41f [ 371.722417][T21157] RDX: 0000000000000066 RSI: 0000200000000580 RDI: 00000000000000c8 [ 371.722433][T21157] RBP: 00007f35aaf17090 R08: 0000000000000000 R09: 0000000000000000 [ 371.722446][T21157] R10: 0000000000000066 R11: 0000000000000293 R12: 0000000000000001 [ 371.722459][T21157] R13: 0000000000000001 R14: 00007f35acad5fa0 R15: 00007ffc25159798 [ 371.722482][T21157] [ 371.794960][T21151] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 371.829290][T21161] loop9: detected capacity change from 0 to 128 [ 371.830330][T21151] ext4 filesystem being mounted at /165/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 371.969511][T21151] random: crng reseeded on system resumption [ 372.033824][T21155] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4634'. [ 372.042822][T21155] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4634'. [ 372.052466][T21155] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4634'. [ 372.061352][T21155] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4634'. [ 372.070873][T21155] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4634'. [ 372.079792][T21155] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4634'. [ 372.088810][T21155] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4634'. [ 372.097894][T21155] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4634'. [ 372.107352][T21155] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4634'. [ 372.123380][T21155] syz.2.4634: attempt to access beyond end of device [ 372.123380][T21155] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 372.141375][T21155] loop2: detected capacity change from 0 to 1024 [ 372.147988][T21155] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 372.516224][T19011] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 372.608075][T21201] loop9: detected capacity change from 0 to 128 [ 372.630561][T21181] chnl_net:caif_netlink_parms(): no params data found [ 372.659067][T21196] loop1: detected capacity change from 0 to 1764 [ 372.693091][T14536] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 372.719768][T21181] bridge0: port 1(bridge_slave_0) entered blocking state [ 372.727014][T21181] bridge0: port 1(bridge_slave_0) entered disabled state [ 372.737597][T21181] bridge_slave_0: entered allmulticast mode [ 372.745072][T21181] bridge_slave_0: entered promiscuous mode [ 372.753737][T14536] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 372.773296][T21181] bridge0: port 2(bridge_slave_1) entered blocking state [ 372.780484][T21181] bridge0: port 2(bridge_slave_1) entered disabled state [ 372.787826][T21181] bridge_slave_1: entered allmulticast mode [ 372.794506][T21181] bridge_slave_1: entered promiscuous mode [ 372.818502][T21181] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 372.830995][T21181] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 372.880913][T21212] syz.9.4650: attempt to access beyond end of device [ 372.880913][T21212] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 372.908569][T21212] loop9: detected capacity change from 0 to 1024 [ 372.915460][T21212] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 372.929152][T21211] IPv6: Can't replace route, no match found [ 373.037299][T14536] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 373.081323][T21181] team0: Port device team_slave_0 added [ 373.105338][T21181] team0: Port device team_slave_1 added [ 373.133651][T14536] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 373.221798][T21181] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 373.228821][T21181] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 373.254873][T21181] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 373.269565][T21181] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 373.276835][T21181] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 373.302920][T21181] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 373.353925][T21220] FAULT_INJECTION: forcing a failure. [ 373.353925][T21220] name failslab, interval 1, probability 0, space 0, times 0 [ 373.366744][T21220] CPU: 1 UID: 0 PID: 21220 Comm: syz.2.4655 Not tainted 6.15.0-rc6-syzkaller-00047-ge9565e23cd89 #0 PREEMPT(voluntary) [ 373.366772][T21220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 373.366788][T21220] Call Trace: [ 373.366847][T21220] [ 373.366854][T21220] __dump_stack+0x1d/0x30 [ 373.366875][T21220] dump_stack_lvl+0xe8/0x140 [ 373.366894][T21220] dump_stack+0x15/0x1b [ 373.366909][T21220] should_fail_ex+0x265/0x280 [ 373.366959][T21220] should_failslab+0x8c/0xb0 [ 373.366998][T21220] kmem_cache_alloc_noprof+0x50/0x310 [ 373.367017][T21220] ? getname_flags+0x80/0x3b0 [ 373.367110][T21220] getname_flags+0x80/0x3b0 [ 373.367142][T21220] __x64_sys_lgetxattr+0xfd/0x140 [ 373.367224][T21220] x64_sys_call+0x1b0e/0x2fb0 [ 373.367251][T21220] do_syscall_64+0xd0/0x1a0 [ 373.367277][T21220] ? clear_bhb_loop+0x40/0x90 [ 373.367356][T21220] ? clear_bhb_loop+0x40/0x90 [ 373.367382][T21220] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 373.367405][T21220] RIP: 0033:0x7f0f43dae969 [ 373.367439][T21220] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 373.367456][T21220] RSP: 002b:00007f0f42417038 EFLAGS: 00000246 ORIG_RAX: 00000000000000c0 [ 373.367474][T21220] RAX: ffffffffffffffda RBX: 00007f0f43fd5fa0 RCX: 00007f0f43dae969 [ 373.367485][T21220] RDX: 00002000000002c0 RSI: 0000200000000280 RDI: 0000200000000000 [ 373.367497][T21220] RBP: 00007f0f42417090 R08: 0000000000000000 R09: 0000000000000000 [ 373.367509][T21220] R10: fffffffffffffe5f R11: 0000000000000246 R12: 0000000000000001 [ 373.367563][T21220] R13: 0000000000000000 R14: 00007f0f43fd5fa0 R15: 00007ffceaa9b168 [ 373.367582][T21220] [ 373.621573][T14536] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 373.632254][T14536] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 373.642324][T14536] bond0 (unregistering): Released all slaves [ 373.659680][T14536] bond1 (unregistering): Released all slaves [ 373.671627][T14536] bond2 (unregistering): Released all slaves [ 373.679957][ T29] kauditd_printk_skb: 248 callbacks suppressed [ 373.686210][ T29] audit: type=1400 audit(2000000082.070:13991): avc: denied { create } for pid=21221 comm="syz.2.4656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 373.703548][T21233] loop9: detected capacity change from 0 to 2048 [ 373.714708][ T29] audit: type=1326 audit(2000000082.080:13992): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21231 comm="syz.9.4660" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f35ac8ae969 code=0x7ffc0000 [ 373.718421][T21235] binfmt_misc: register: failed to install interpreter file ./file2 [ 373.738364][ T29] audit: type=1326 audit(2000000082.080:13993): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21231 comm="syz.9.4660" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f35ac8ae969 code=0x7ffc0000 [ 373.770164][ T29] audit: type=1326 audit(2000000082.080:13994): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21231 comm="syz.9.4660" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f35ac8ae969 code=0x7ffc0000 [ 373.793853][ T29] audit: type=1326 audit(2000000082.080:13995): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21231 comm="syz.9.4660" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f35ac8ae969 code=0x7ffc0000 [ 373.817521][ T29] audit: type=1326 audit(2000000082.080:13996): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21231 comm="syz.9.4660" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f35ac8ae969 code=0x7ffc0000 [ 373.841207][ T29] audit: type=1326 audit(2000000082.080:13997): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21231 comm="syz.9.4660" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f35ac8ae969 code=0x7ffc0000 [ 373.864884][ T29] audit: type=1326 audit(2000000082.080:13998): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21231 comm="syz.9.4660" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f35ac8ae9a3 code=0x7ffc0000 [ 373.888396][ T29] audit: type=1326 audit(2000000082.090:13999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21231 comm="syz.9.4660" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f35ac8ad41f code=0x7ffc0000 [ 373.897148][T21238] FAULT_INJECTION: forcing a failure. [ 373.897148][T21238] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 373.912045][ T29] audit: type=1326 audit(2000000082.100:14000): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21231 comm="syz.9.4660" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7f35ac8ae9f7 code=0x7ffc0000 [ 373.925175][T21238] CPU: 0 UID: 0 PID: 21238 Comm: syz.4.4662 Not tainted 6.15.0-rc6-syzkaller-00047-ge9565e23cd89 #0 PREEMPT(voluntary) [ 373.925208][T21238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 373.925266][T21238] Call Trace: [ 373.925276][T21238] [ 373.925285][T21238] __dump_stack+0x1d/0x30 [ 373.925311][T21238] dump_stack_lvl+0xe8/0x140 [ 373.925335][T21238] dump_stack+0x15/0x1b [ 373.925355][T21238] should_fail_ex+0x265/0x280 [ 373.925473][T21238] should_fail_alloc_page+0xf2/0x100 [ 373.925517][T21238] __alloc_frozen_pages_noprof+0xff/0x360 [ 373.925627][T21238] alloc_pages_mpol+0xb3/0x250 [ 373.925659][T21238] vma_alloc_folio_noprof+0x1aa/0x300 [ 373.925694][T21238] handle_mm_fault+0x1056/0x2ae0 [ 373.925789][T21238] ? mas_walk+0xf2/0x120 [ 373.925860][T21238] do_user_addr_fault+0x636/0x1090 [ 373.925907][T21238] exc_page_fault+0x54/0xc0 [ 373.925933][T21238] asm_exc_page_fault+0x26/0x30 [ 373.926022][T21238] RIP: 0033:0x7fd7e6e0bf6b [ 373.926043][T21238] Code: c0 8b 87 c0 00 00 00 66 0f 6c c0 85 c0 0f 85 44 01 00 00 c7 87 c0 00 00 00 ff ff ff ff 48 8d 84 24 20 21 00 00 48 8d 7c 24 20 <0f> 29 44 24 40 49 89 e4 48 89 44 24 50 8b 43 74 48 89 9c 24 00 01 [ 373.926068][T21238] RSP: 002b:00007fd7e54c4e10 EFLAGS: 00010246 [ 373.926088][T21238] RAX: 00007fd7e54c6f30 RBX: 00007fd7e7053620 RCX: 0000000000000000 [ 373.926105][T21238] RDX: 00007fd7e54c6f78 RSI: 00007fd7e6ebdbf8 RDI: 00007fd7e54c4e30 [ 373.926135][T21238] RBP: 0000000000000009 R08: 0000000000000000 R09: 0000000000000000 [ 373.926151][T21238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 373.926167][T21238] R13: 0000000000000000 R14: 00007fd7e7085fa0 R15: 00007ffce8458ec8 [ 373.926206][T21238] [ 373.926234][T21238] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 373.964450][T21181] hsr_slave_0: entered promiscuous mode [ 374.031123][T21233] Alternate GPT is invalid, using primary GPT. [ 374.032941][T21181] hsr_slave_1: entered promiscuous mode [ 374.036287][T21233] loop9: p1 p2 p3 [ 374.042634][T21181] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 374.154705][T21181] Cannot create hsr debugfs directory [ 374.175978][T14536] hsr_slave_0: left promiscuous mode [ 374.182907][T14536] hsr_slave_1: left promiscuous mode [ 374.198781][T14536] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 374.206265][T14536] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 374.214343][T14536] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 374.222305][T14536] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 374.252638][T14536] veth0_macvtap: left promiscuous mode [ 374.266422][T14536] veth1_vlan: left promiscuous mode [ 374.278657][T14536] veth0_vlan: left promiscuous mode [ 374.419692][T21255] __nla_validate_parse: 22 callbacks suppressed [ 374.419708][T21255] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4667'. [ 374.435097][T21255] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4667'. [ 374.444699][T21255] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4667'. [ 374.453628][T21255] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4667'. [ 374.464238][T21260] syz.4.4667: attempt to access beyond end of device [ 374.464238][T21260] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 374.477983][T21255] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4667'. [ 374.487125][T21255] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4667'. [ 374.505518][T21255] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4667'. [ 374.514525][T21255] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4667'. [ 374.524222][T21255] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4667'. [ 374.533153][T21255] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4667'. [ 375.347265][ T31] bridge_slave_1: left allmulticast mode [ 375.353061][ T31] bridge_slave_1: left promiscuous mode [ 375.358902][ T31] bridge0: port 2(bridge_slave_1) entered disabled state [ 375.367088][ T31] bridge_slave_0: left allmulticast mode [ 375.372851][ T31] bridge_slave_0: left promiscuous mode [ 375.378675][ T31] bridge0: port 1(bridge_slave_0) entered disabled state [ 375.422780][ T31] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 375.432431][ T31] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 375.442134][ T31] bond0 (unregistering): Released all slaves [ 375.473778][ T31] hsr_slave_0: left promiscuous mode [ 375.479550][ T31] hsr_slave_1: left promiscuous mode [ 375.485414][ T31] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 375.492938][ T31] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 375.524576][ T31] team0 (unregistering): Port device team_slave_1 removed [ 375.534641][ T31] team0 (unregistering): Port device team_slave_0 removed [ 375.571115][T21290] FAULT_INJECTION: forcing a failure. [ 375.571115][T21290] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 375.576907][T21293] binfmt_misc: register: failed to install interpreter file ./file2 [ 375.584286][T21290] CPU: 0 UID: 0 PID: 21290 Comm: syz.9.4679 Not tainted 6.15.0-rc6-syzkaller-00047-ge9565e23cd89 #0 PREEMPT(voluntary) [ 375.584322][T21290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 375.584339][T21290] Call Trace: [ 375.584348][T21290] [ 375.584360][T21290] __dump_stack+0x1d/0x30 [ 375.584420][T21290] dump_stack_lvl+0xe8/0x140 [ 375.584447][T21290] dump_stack+0x15/0x1b [ 375.584468][T21290] should_fail_ex+0x265/0x280 [ 375.584512][T21290] should_fail+0xb/0x20 [ 375.584556][T21290] should_fail_usercopy+0x1a/0x20 [ 375.584582][T21290] strncpy_from_user+0x25/0x230 [ 375.584656][T21290] ? kmem_cache_alloc_noprof+0x186/0x310 [ 375.584682][T21290] ? getname_flags+0x80/0x3b0 [ 375.584741][T21290] getname_flags+0xae/0x3b0 [ 375.584781][T21290] getname_uflags+0x21/0x30 [ 375.584876][T21290] __x64_sys_execveat+0x5d/0x90 [ 375.584972][T21290] x64_sys_call+0x2dae/0x2fb0 [ 375.585000][T21290] do_syscall_64+0xd0/0x1a0 [ 375.585030][T21290] ? clear_bhb_loop+0x40/0x90 [ 375.585059][T21290] ? clear_bhb_loop+0x40/0x90 [ 375.585088][T21290] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 375.585167][T21290] RIP: 0033:0x7f35ac8ae969 [ 375.585187][T21290] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 375.585236][T21290] RSP: 002b:00007f35aaf17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 375.585260][T21290] RAX: ffffffffffffffda RBX: 00007f35acad5fa0 RCX: 00007f35ac8ae969 [ 375.585277][T21290] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 375.585292][T21290] RBP: 00007f35aaf17090 R08: 0000000000001000 R09: 0000000000000000 [ 375.585372][T21290] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 375.585388][T21290] R13: 0000000000000000 R14: 00007f35acad5fa0 R15: 00007ffc25159798 [ 375.585411][T21290] [ 375.622249][T21294] syz.2.4681: attempt to access beyond end of device [ 375.622249][T21294] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 379.134904][ T29] kauditd_printk_skb: 312 callbacks suppressed [ 379.134922][ T29] audit: type=1400 audit(2000000087.530:14311): avc: denied { execmem } for pid=21325 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 379.168980][T21330] binfmt_misc: register: failed to install interpreter file ./file2 [ 379.180956][ T29] audit: type=1400 audit(2000000087.560:14312): avc: denied { prog_load } for pid=21326 comm="syz.4.4694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 379.200540][ T29] audit: type=1400 audit(2000000087.560:14313): avc: denied { read write } for pid=21326 comm="syz.4.4694" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 379.224866][ T29] audit: type=1400 audit(2000000087.560:14314): avc: denied { map_create } for pid=21327 comm="syz.9.4695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 379.244252][ T29] audit: type=1400 audit(2000000087.560:14315): avc: denied { execmem } for pid=21326 comm="syz.4.4694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 379.263749][ T29] audit: type=1400 audit(2000000087.560:14316): avc: denied { prog_load } for pid=21327 comm="syz.9.4695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 379.283062][ T29] audit: type=1400 audit(2000000087.560:14317): avc: denied { open } for pid=21327 comm="syz.9.4695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 379.302634][ T29] audit: type=1400 audit(2000000087.560:14318): avc: denied { map_create } for pid=21328 comm="syz.1.4696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 379.322199][ T29] audit: type=1400 audit(2000000087.560:14319): avc: denied { prog_load } for pid=21328 comm="syz.1.4696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 379.341461][ T29] audit: type=1400 audit(2000000087.570:14320): avc: denied { map_create } for pid=21326 comm="syz.4.4694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 381.308173][T21352] wg1: entered promiscuous mode [ 381.313187][T21352] wg1: entered allmulticast mode [ 385.229045][ T29] kauditd_printk_skb: 312 callbacks suppressed [ 385.229064][ T29] audit: type=1400 audit(2000000093.620:14633): avc: denied { execmem } for pid=21372 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 385.260418][ T29] audit: type=1400 audit(2000000093.630:14634): avc: denied { read append } for pid=21373 comm="syz.4.4712" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=blk_file permissive=0 trawcon="system_u:object_r:dhcpd_state_t:s0" [ 385.288132][ T29] audit: type=1400 audit(2000000093.630:14635): avc: denied { prog_load } for pid=21373 comm="syz.4.4712" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 385.307525][ T29] audit: type=1400 audit(2000000093.630:14636): avc: denied { prog_load } for pid=21373 comm="syz.4.4712" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 385.326997][ T29] audit: type=1400 audit(2000000093.630:14637): avc: denied { create } for pid=21373 comm="syz.4.4712" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 385.347639][ T29] audit: type=1400 audit(2000000093.630:14638): avc: denied { create } for pid=21373 comm="syz.4.4712" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 385.368352][ T29] audit: type=1400 audit(2000000093.650:14639): avc: denied { read write } for pid=16796 comm="syz-executor" name="loop4" dev="devtmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 385.392848][ T29] audit: type=1400 audit(2000000093.650:14640): avc: denied { map_create } for pid=21378 comm="syz.2.4715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 385.412160][ T29] audit: type=1400 audit(2000000093.650:14641): avc: denied { prog_load } for pid=21375 comm="syz.1.4714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 385.431394][ T29] audit: type=1400 audit(2000000093.650:14642): avc: denied { read write } for pid=21378 comm="syz.2.4715" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 390.089808][ T3304] ================================================================== [ 390.097949][ T3304] BUG: KCSAN: data-race in pipe_poll / pipe_release [ 390.104567][ T3304] [ 390.106902][ T3304] write to 0xffff888118d222a8 of 4 bytes by task 21403 on cpu 0: [ 390.114628][ T3304] pipe_release+0xb6/0x1d0 [ 390.119065][ T3304] __fput+0x29b/0x650 [ 390.123058][ T3304] ____fput+0x1c/0x30 [ 390.127050][ T3304] task_work_run+0x131/0x1a0 [ 390.131654][ T3304] do_exit+0x5dd/0x17c0 [ 390.135827][ T3304] do_group_exit+0x139/0x140 [ 390.140438][ T3304] __x64_sys_exit_group+0x1f/0x20 [ 390.145485][ T3304] x64_sys_call+0x2fa4/0x2fb0 [ 390.150179][ T3304] do_syscall_64+0xd0/0x1a0 [ 390.154699][ T3304] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 390.160628][ T3304] [ 390.162955][ T3304] read to 0xffff888118d222a8 of 4 bytes by task 3304 on cpu 1: [ 390.170591][ T3304] pipe_poll+0x16d/0x250 [ 390.174861][ T3304] do_select+0x8ee/0xf40 [ 390.179121][ T3304] core_sys_select+0x3b2/0x600 [ 390.183902][ T3304] __se_sys_pselect6+0x216/0x280 [ 390.189033][ T3304] __x64_sys_pselect6+0x78/0x90 [ 390.193899][ T3304] x64_sys_call+0x1caa/0x2fb0 [ 390.198590][ T3304] do_syscall_64+0xd0/0x1a0 [ 390.203136][ T3304] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 390.209042][ T3304] [ 390.211374][ T3304] value changed: 0x00000001 -> 0x00000000 [ 390.217092][ T3304] [ 390.219443][ T3304] Reported by Kernel Concurrency Sanitizer on: [ 390.225622][ T3304] CPU: 1 UID: 0 PID: 3304 Comm: syz-executor Not tainted 6.15.0-rc6-syzkaller-00047-ge9565e23cd89 #0 PREEMPT(voluntary) [ 390.238224][ T3304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 390.248290][ T3304] ================================================================== [ 390.256848][ T29] kauditd_printk_skb: 109 callbacks suppressed [ 390.256866][ T29] audit: type=1400 audit(2000000098.480:14752): avc: denied { execmem } for pid=21403 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 390.294501][ T29] audit: type=1400 audit(2000000098.650:14753): avc: denied { prog_load } for pid=21404 comm="syz.4.4725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 390.313926][ T29] audit: type=1400 audit(2000000098.680:14754): avc: denied { map_create } for pid=21404 comm="syz.4.4725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 390.333398][ T29] audit: type=1400 audit(2000000098.680:14755): avc: denied { prog_load } for pid=21404 comm="syz.4.4725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 390.352771][ T29] audit: type=1400 audit(2000000098.680:14756): avc: denied { prog_load } for pid=21404 comm="syz.4.4725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 390.372103][ T29] audit: type=1400 audit(2000000098.680:14757): avc: denied { map_create } for pid=21407 comm="syz.2.4728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 390.391487][ T29] audit: type=1400 audit(2000000098.680:14758): avc: denied { prog_load } for pid=21407 comm="syz.2.4728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 390.410704][ T29] audit: type=1400 audit(2000000098.680:14759): avc: denied { create } for pid=21407 comm="syz.2.4728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 390.430574][ T29] audit: type=1400 audit(2000000098.680:14760): avc: denied { open } for pid=21407 comm="syz.2.4728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=0 [ 390.449993][ T29] audit: type=1400 audit(2000000098.680:14761): avc: denied { map_create } for pid=21407 comm="syz.2.4728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 392.323857][T14540] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 392.383110][T14540] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 392.422914][T14540] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 392.502739][T14540] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 392.562762][T14540] bridge_slave_1: left allmulticast mode [ 392.568451][T14540] bridge_slave_1: left promiscuous mode [ 392.574350][T14540] bridge0: port 2(bridge_slave_1) entered disabled state [ 392.582126][T14540] bridge_slave_0: left allmulticast mode [ 392.587803][T14540] bridge_slave_0: left promiscuous mode [ 392.593546][T14540] bridge0: port 1(bridge_slave_0) entered disabled state [ 392.662285][T14540] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 392.672279][T14540] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 392.681650][T14540] bond0 (unregistering): Released all slaves [ 392.732198][T14540] IPVS: stopping master sync thread 19524 ... [ 392.740282][T14540] hsr_slave_0: left promiscuous mode [ 392.745863][T14540] hsr_slave_1: left promiscuous mode [ 392.752654][T14540] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 392.760190][T14540] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 392.767803][T14540] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 392.775253][T14540] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 392.784676][T14540] veth1_macvtap: left promiscuous mode [ 392.790437][T14540] veth0_macvtap: left promiscuous mode [ 392.796003][T14540] veth1_vlan: left promiscuous mode [ 392.801267][T14540] veth0_vlan: left promiscuous mode [ 393.194275][T14540] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 393.232811][T14540] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 393.272616][T14540] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 393.332395][T14540] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 393.405782][T14540] netdevsim netdevsim9 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 393.462558][T14540] netdevsim netdevsim9 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 393.522353][T14540] netdevsim netdevsim9 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 393.572428][T14540] netdevsim netdevsim9 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 393.636529][T14540] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 393.682706][T14540] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 393.723594][T14540] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 393.772750][T14540] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 393.823888][T14540] bridge_slave_1: left allmulticast mode [ 393.829588][T14540] bridge_slave_1: left promiscuous mode [ 393.835332][T14540] bridge0: port 2(bridge_slave_1) entered disabled state [ 393.843060][T14540] bridge_slave_0: left allmulticast mode [ 393.848761][T14540] bridge_slave_0: left promiscuous mode [ 393.854538][T14540] bridge0: port 1(bridge_slave_0) entered disabled state [ 393.862697][T14540] bridge_slave_1: left allmulticast mode [ 393.868360][T14540] bridge_slave_1: left promiscuous mode [ 393.874061][T14540] bridge0: port 2(bridge_slave_1) entered disabled state [ 393.882081][T14540] bridge_slave_0: left allmulticast mode [ 393.887798][T14540] bridge_slave_0: left promiscuous mode [ 393.893567][T14540] bridge0: port 1(bridge_slave_0) entered disabled state [ 393.901617][T14540] bridge_slave_1: left allmulticast mode [ 393.907333][T14540] bridge_slave_1: left promiscuous mode [ 393.913052][T14540] bridge0: port 2(bridge_slave_1) entered disabled state [ 393.920876][T14540] bridge_slave_0: left allmulticast mode [ 393.926519][T14540] bridge_slave_0: left promiscuous mode [ 393.932473][T14540] bridge0: port 1(bridge_slave_0) entered disabled state [ 394.050872][T14540] bond0 (unregistering): (slave bridge0): Releasing backup interface [ 394.222419][T14540] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 394.232328][T14540] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 394.241927][T14540] bond0 (unregistering): Released all slaves [ 394.250310][T14540] bond1 (unregistering): Released all slaves [ 394.258665][T14540] bond2 (unregistering): Released all slaves [ 394.267627][T14540] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 394.277444][T14540] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 394.287381][T14540] bond0 (unregistering): Released all slaves [ 394.295894][T14540] bond1 (unregistering): Released all slaves [ 394.305016][T14540] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 394.315004][T14540] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 394.324414][T14540] bond0 (unregistering): Released all slaves [ 394.333179][T14540] bond1 (unregistering): Released all slaves [ 394.432876][T14540] hsr_slave_0: left promiscuous mode [ 394.438477][T14540] hsr_slave_1: left promiscuous mode [ 394.444104][T14540] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 394.451529][T14540] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 394.459059][T14540] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 394.466507][T14540] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 394.475243][T14540] hsr_slave_0: left promiscuous mode [ 394.480890][T14540] hsr_slave_1: left promiscuous mode [ 394.486514][T14540] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 394.494041][T14540] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 394.501665][T14540] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 394.509075][T14540] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 394.518351][T14540] hsr_slave_0: left promiscuous mode [ 394.524097][T14540] hsr_slave_1: left promiscuous mode [ 394.529813][T14540] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 394.537280][T14540] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 394.544818][T14540] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 394.552296][T14540] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 394.564975][T14540] veth1_macvtap: left promiscuous mode [ 394.570678][T14540] veth0_macvtap: left promiscuous mode [ 394.576185][T14540] veth1_vlan: left promiscuous mode [ 394.581515][T14540] veth0_vlan: left promiscuous mode [ 394.587230][T14540] veth1_vlan: left promiscuous mode [ 394.592530][T14540] veth0_vlan: left promiscuous mode [ 394.598260][T14540] veth1_macvtap: left promiscuous mode [ 394.603782][T14540] veth0_macvtap: left promiscuous mode [ 394.609351][T14540] veth1_vlan: left promiscuous mode [ 394.614626][T14540] veth0_vlan: left promiscuous mode [ 394.838060][ T1041] infiniband syz1: ib_query_port failed (-19)