last executing test programs: 17m21.001788294s ago: executing program 1 (id=100): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x400084, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e23, 0xbd, @remote, 0x8}}}, 0xffffffffffffff11) close(r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket(0x10, 0x2, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r5, &(0x7f0000000340)={0xa, 0x5, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0xfffffffe}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000480)=@gcm_256={{0x303}, '\x00\b\x00', "e123c5876ff425b1ebe250a8486be34705f4f827ae60ecb65e528248d5552bff", '\x00', "15d0db2c77179e1a"}, 0x38) write$binfmt_script(r5, &(0x7f0000000500)={'#! ', './file0'}, 0xb) close_range(r4, r5, 0x0) 17m20.903873448s ago: executing program 1 (id=102): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x100202, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0xffffffffffffffa0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x33fabe53b73c3a5a}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) syz_mount_image$vfat(&(0x7f00000005c0), &(0x7f0000000100)='./bus\x00', 0x1010000, &(0x7f0000000200)=ANY=[@ANYBLOB="757466383d312c73686f72746e616d653d6d697865642c756e695f786c6174653d302c636865636b3d72656c617865642c73686f72746e616d653d77696e6e742c73686f72746e616d653d6d697865642c726f6469722c756e695f786c6174653d302c756e695f786c6174653d312c73686f72746e616d653d77696e6e742c696f636861727365743d757466382c757466383d312c73686f72746e616d653d77696e39352c696f636861727365743d69736f383835392d312c73686f72746e616d653d6d697865642c73686f72746e616d653d77696e6e742c646973636172642c00512733c8ef1654be3cad5b8bbe4f"], 0x1, 0x369, &(0x7f0000000700)="$eJzs3U1oY1UbAOA3vWnSGfi+dicKQnQnaJnOTje2SAcGu1EJ/izE4HRUkiq0WGwX09aF4lJwqSt3CrpwIS5FUMSdC7eOIKPiQmc34OCR5OYmt0naaQerFJ9nkZy+57znnPtDcntJTp5bjPal6bh8/fq1mJmpRHXxkcW4UYm5yKKwG+NqE2IAwOlwI6X4PeWOmFI54SkBACes9/7/QkQ0Yi6PvP7lYe2Td38AOPX6//+fOazNzEEVr5zIlACAEzZ2///efdW1akQtqsWf1dKnAgCA0+qJp595dGkl4vFGYyZi7c3N5mYzHhrWL12Ol6ITq3EuZuNmRH6h0H2o9B4vXFxZPtdoNHbip7loRsRUP7GZXyksZb38eizEbMz187uXGqlXzi58srK80OiJiN2d3vixVtlsTsfZ/vjfn43V4YVH0UnvKeLiyvL5Rr+D5lqRvxOxN7xv0Z3/fMzGt88Pukmp+ATjyvKVhWLSw/zNZj0uDfbCgXdAAAAAAAAAAAAAAAAAAAAAAADgtsw3BuYG6+ek7nO+Us78/IT63vo4eX5/faC9fH2gVE+R0m+vPdB8K4t96wONrs+zaSFBAAAAAAAAAAAAAAAAAAAAGNjYqkWr01ld39jabpcLO+sbW1MR0Y28/PVHX5yJ8Ta3KFTzIeoRgyEa/WG3262UFY1TFjGennUHLyIffDqYcblNfbAVE6dRP7iq0/nfPT++O4zcnRU9/zlsk8XkDcxK03h4pOe1/+dTOs6OGhTOlyP18dGvppRKkTfK6VeeHe8wKhHV4x+47fZUHNwmdQtfXXvxzmLvtz5Pufvun33y6jvv/9JudbojR+8I1tY3bqZ2q1I0Pt5u6e7qIlKJvFApnwnVw9L39kda2Xe/PnXX298cbfRUjrzaPZ9H2mT55nw8ml7LC91pjlSdGaZP9zeiszo94eS/VeE2jukd7332YUo//HzkIYamxl42Kn/Pqw8AAAAAAAAAAAAAAAAAAFBW+q54X//LvtOHZT342MnPDAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD+OcPf/y8V9nZjJDIo7I5FBoU/diZk1VfXNyJq//ZmAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADwH/dXAAAA//+g5Vir") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) 17m20.727802606s ago: executing program 1 (id=107): setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000001200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="38000000031401002dbd7000000000000900020073797a30000000000800410073697700140033006c6f"], 0xffaf}, 0x1, 0x0, 0x0, 0x854}, 0x804) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000140), 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0xc, &(0x7f0000000380)=ANY=[@ANYRES8=r0, @ANYRESOCT], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) r2 = epoll_create1(0x80000) connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0xa00) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000040)={0x86c9460748f085ce}) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000200)={0xe0000003}) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f00000003c0), 0x0, 0x0, 0x1) listxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000001380)=""/4096, 0x11) poll(&(0x7f00000000c0)=[{r3, 0x1009}], 0x1, 0x8000007) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x1c}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000340)={'netdevsim0\x00', &(0x7f0000000000)=@ethtool_flash={0x33, 0xea6, '.\x00'}}) socket$inet6_udp(0xa, 0x2, 0x0) 17m19.858052704s ago: executing program 1 (id=116): socket$inet6(0xa, 0x80002, 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) mount$bind(&(0x7f0000000340)='./file0/../file0\x00', &(0x7f0000000280)='./file0/file0\x00', 0x0, 0xb101e, 0x0) (async) mount$bind(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x100000, 0x0) (async) r0 = open_tree(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) (async) mount$bind(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x1000, 0x0) mount$bind(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80000, 0x0) (async) mount$bind(&(0x7f0000000440)='./file0\x00', &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x10a5840, 0x0) (async) move_mount(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', r0, &(0x7f0000000240)='./file0/file0\x00', 0x272) socket$netlink(0x10, 0x3, 0x0) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="18010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000380)='kfree\x00', r1}, 0x18) (async) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f00000002c0)={0xa, 0x4e24, 0x0, @rand_addr, 0x8000}, 0x1c) (async) sendmmsg(r3, 0x0, 0x0, 0xfdff) (async) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, 0x0}, 0x0) (async) sendmsg$NFT_BATCH(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a50"], 0x78}, 0x1, 0x0, 0x0, 0x840}, 0x0) (async) socket(0x10, 0x803, 0x0) r5 = socket(0xa, 0x5, 0x0) r6 = syz_io_uring_setup(0x1850, &(0x7f0000000640)={0x0, 0xec25, 0x400, 0x1, 0x45, 0x0, r0}, &(0x7f00000000c0)=0x0, &(0x7f00000001c0)=0x0) r9 = socket$isdn(0x22, 0x2, 0x22) (async) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r7, r8, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r9, 0x0, &(0x7f0000000600)}) (async) io_uring_enter(r6, 0x847ba, 0x0, 0xe, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x19, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17}, 0x94) (async) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f00000011c0)=@mangle={'mangle\x00', 0x64, 0x6, 0x548, 0x1c8, 0x478, 0x1c8, 0x0, 0x368, 0x478, 0x478, 0x478, 0x478, 0x478, 0x6, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00', @private0, [0xff000000], [0xffffff00, 0x0, 0x0, 0x1f9814788dbf7ab2], 'veth1\x00', 'syz_tun\x00', {}, {}, 0x67}, 0x11e, 0xa8, 0xd0, 0x1f000000, {0x0, 0x7}}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0xffffffffffffffff, 0x6, 0xa}, {0x0, 0x5, 0x5}}}}, {{@ipv6={@loopback, @private2={0xfc, 0x2, '\x00', 0x1}, [], [], 'batadv_slave_0\x00', 'macvlan1\x00', {}, {}, 0x2b, 0x0, 0x0, 0x4}, 0x0, 0xd0, 0xf8, 0x7400, {}, [@inet=@rpfilter={{0x28}, {0x8}}]}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@local, @dev={0xfe, 0x80, '\x00', 0x3f}, [0xffffffff, 0xff000000, 0xffffff00, 0xff], [0xffffffff, 0xffffff00, 0xff000000], 'veth1_virt_wifi\x00', 'rose0\x00', {}, {}, 0x5c, 0xb, 0x1, 0x19}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00', 0x0, {0x68}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @inet=@TOS={0x28}}, {{@uncond, 0x0, 0xd0, 0x110, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x8}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x1, @ipv6=@mcast2}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5a8) 17m19.645884883s ago: executing program 1 (id=120): syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000440)='./file0\x00', 0x414, &(0x7f00000000c0)=ANY=[], 0x1, 0x2c7, &(0x7f0000000980)="$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") mknod$loop(0x0, 0x0, 0x1) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040), 0x4) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) rename(&(0x7f0000000300)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000f40)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') 17m19.503439729s ago: executing program 1 (id=126): r0 = syz_genetlink_get_family_id$nl802154(&(0x7f00000006c0), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_INTERFACE(r1, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={&(0x7f0000001040)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01002abd7000df25050000000c0006000100000001000000"], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x8000) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1b, 0xa, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000010c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x23, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="d80000001d0081044e81f782db44b9040a1d080005000000e8fe54a1180015000600142603600e1208000f0000000401a80016002000014003000000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0xd, 0xd, &(0x7f0000000740)=ANY=[@ANYBLOB="180200000000000000000000ffffffff851000000100000095000000000000001800000020646c2500000000002020207b1af8ff00000000bda100000000000007010000f8ffffffb702000008b19200b703000000000000850000008f00000095"], &(0x7f0000000000)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x4e, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) futex(&(0x7f000000cffc)=0x1, 0x6, 0x0, 0x0, 0x0, 0xfff0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r10, 0x6, 0x2d, 0x0, &(0x7f00000017c0)) r11 = socket(0x23, 0x800, 0x8005) connect$inet(r11, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) bind$inet(r11, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r11, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(r11, 0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000600)=""/141, 0x8d) close_range(r9, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000000000), 0x2000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000140)='GPL\x00') sendmsg$kcm(r6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000200)="d8000000210081044e81f782db44b9040200000000806c01000015000a001800feffffff09000d2000000401a80018000a000e4006000000036010fab94dcf5c0468c1d67f6f94007134cf6ee062e1c547cbc7225e6756cfb39b0590b4800089e408e8d8ef52b49816277cf4090000001fb791643a5ee4ce1b14d6d930dfe1d9db22fe7c9f8775730d16a4683f1aeb4edbb57a5025ccca9e00360db701000000eafad95667e006dcdf969b3ef35ce3bb9ad809d561cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d939acd92637429397f632838", 0xd8}], 0x1}, 0x0) 17m19.49455414s ago: executing program 32 (id=126): r0 = syz_genetlink_get_family_id$nl802154(&(0x7f00000006c0), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_INTERFACE(r1, &(0x7f00000010c0)={0x0, 0x0, &(0x7f0000001080)={&(0x7f0000001040)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01002abd7000df25050000000c0006000100000001000000"], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x8000) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1b, 0xa, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000010c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x23, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="d80000001d0081044e81f782db44b9040a1d080005000000e8fe54a1180015000600142603600e1208000f0000000401a80016002000014003000000036010fab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9701", 0xd8}], 0x1}, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0xd, 0xd, &(0x7f0000000740)=ANY=[@ANYBLOB="180200000000000000000000ffffffff851000000100000095000000000000001800000020646c2500000000002020207b1af8ff00000000bda100000000000007010000f8ffffffb702000008b19200b703000000000000850000008f00000095"], &(0x7f0000000000)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x4e, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) futex(&(0x7f000000cffc)=0x1, 0x6, 0x0, 0x0, 0x0, 0xfff0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8}, 0x10) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r10, 0x6, 0x2d, 0x0, &(0x7f00000017c0)) r11 = socket(0x23, 0x800, 0x8005) connect$inet(r11, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) bind$inet(r11, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r11, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(r11, 0x0, 0x0, 0x0, 0x0, 0x0) read(r2, &(0x7f0000000600)=""/141, 0x8d) close_range(r9, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000000000), 0x2000000) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000140)='GPL\x00') sendmsg$kcm(r6, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000200)="d8000000210081044e81f782db44b9040200000000806c01000015000a001800feffffff09000d2000000401a80018000a000e4006000000036010fab94dcf5c0468c1d67f6f94007134cf6ee062e1c547cbc7225e6756cfb39b0590b4800089e408e8d8ef52b49816277cf4090000001fb791643a5ee4ce1b14d6d930dfe1d9db22fe7c9f8775730d16a4683f1aeb4edbb57a5025ccca9e00360db701000000eafad95667e006dcdf969b3ef35ce3bb9ad809d561cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d939acd92637429397f632838", 0xd8}], 0x1}, 0x0) 12m35.900529035s ago: executing program 3 (id=6447): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfd, 0x0, 0x7ffc0002}]}) r1 = gettid() r2 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x140a, 0x1, 0x70bd27, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x8080) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) r3 = socket$inet_smc(0x2b, 0x1, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2000000}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='ext4_shutdown\x00', r5, 0x0, 0x1}, 0x18) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, 0x0, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xf0, 0x6, 0x40, 0x3, 0x0, 0x4000000000, 0xd4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x8}, 0x100882, 0x7ff, 0x6, 0x3, 0x0, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0xb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x100000a, 0x4082172, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b400000000000000791028000000000069002400000000009500740000000000", @ANYRESDEC], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/164, 0x0, 0x25, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffff8f}, 0x48) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000005000/0x4000)=nil) r6 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r6, &(0x7f0000000000), 0x10) setsockopt$CAN_RAW_FILTER(r6, 0x65, 0x1, 0x0, 0x0) close(r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) timer_settime(0x0, 0x1, &(0x7f0000000480)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex_waitv(&(0x7f0000001080)=[{0x3, &(0x7f0000001040)=0x3, 0x82}], 0x1, 0x0, &(0x7f0000001100)={0x77359400}, 0x1) 12m35.056866442s ago: executing program 3 (id=6469): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000001c0)={'bond0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x20000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8003}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r3}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x44}, 0x1, 0x0, 0x0, 0x240008c4}, 0x4054) 12m34.981743576s ago: executing program 3 (id=6471): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="7c30a6f427e52161434d2b4a0e2e9e2d78ac2d1b5b330e8e1e05c8726f93b3ec353d12232973e1bf8166be7f561a2760a241072fc7ebbee5ff04c318b20a358c3370349542044229802cf711d6f60316cb35b359c9ebd55cc0469fdd2de8a11effc45c4a1ae6ca", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x33, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[], 0x5c}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1a, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES64=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xeb, '\x00', 0x0, @tracing=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000640)='kfree\x00', r3}, 0x18) sendmsg$IPSET_CMD_DESTROY(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000030601020000ffffffff00000a0000010500018007"], 0x1c}, 0x1, 0x0, 0x0, 0x4004810}, 0x840) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file1\x00', 0x81, &(0x7f0000000000)={[{@errors_remount}]}, 0x4, 0x4dd, &(0x7f0000000240)="$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") bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYRES64=0x0], 0x48) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) 12m34.89357698s ago: executing program 3 (id=6473): r0 = io_uring_setup(0x7fc0, &(0x7f00000006c0)={0x0, 0x117, 0x40}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000850000002300000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r1}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') name_to_handle_at(r2, &(0x7f0000000240)='./mnt\x00', &(0x7f0000000200)=ANY=[], &(0x7f00000002c0), 0x600) io_uring_register$IORING_REGISTER_RESTRICTIONS(r0, 0xb, &(0x7f00000002c0), 0x0) io_uring_register$IORING_REGISTER_RESTRICTIONS(r0, 0xb, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) r5 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000380)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000001080)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r5, 0x84, 0x1f, &(0x7f00000003c0)={r6, @in6={{0xa, 0x4e24, 0xffffffff, @empty, 0x2f}}, 0x75, 0xad}, &(0x7f0000000080)=0x90) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001800)={0x6, 0x3, &(0x7f00000006c0)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r4}, 0x94) close_range(r7, r7, 0x0) 12m34.828005582s ago: executing program 3 (id=6474): mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) r0 = perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x5, 0xa, 0x80, 0x40, 0x0, 0x7, 0x184, 0x7, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x5, 0xbe}, 0x100102, 0xcf, 0x2, 0x4, 0x10001, 0x3, 0x1, 0x0, 0x10000, 0x0, 0xfffffffffffffff4}, 0x0, 0xe, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000008, 0x4000010, r0, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x23, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000480)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a030000000000000000f0070000000900010073797a300000000080000000090a010400000000000000000700000008000a40000000000900020073797a30000000000900010073797a3000000000080005400000000d3c00128014000180090001006c617374000000000400028010000180090001006c61737400000000140001800c000100636f756e746572000400028008000340000001"], 0xc8}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) 12m34.827482552s ago: executing program 3 (id=6475): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xf, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000100000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000800008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001f40)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) epoll_pwait2(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x40505330, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x503, 0xfffffffb, 0x0, {0x0, 0x0, 0x0, 0x0, 0x21111, 0x9820}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_MACSEC_CIPHER_SUITE={0xc, 0x4, 0x80c20001000003}, @IFLA_MACSEC_WINDOW={0x8, 0x5, 0x200}]}}}, @IFLA_LINK={0x8, 0x5, r5}]}, 0x50}, 0x1, 0x0, 0x0, 0x48890}, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x8008000000010, &(0x7f0000001640)="17000000020001000003d68c5ee17688a2003208030300ecff3f0000000300000a0000000098fc5ad9485bbb6a880000d6c8db0000dba67e06000000e28900000200df018000000000f50607bdff59100ac45761547a681f009cee4a", 0x5c) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=ANY=[@ANYBLOB="0212000002"], 0x10}}, 0x0) 12m26.087714215s ago: executing program 0 (id=6655): mkdir(&(0x7f0000000400)='./file0\x00', 0x5c) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0x0) faccessat(r2, &(0x7f0000000000)='./file0\x00', 0x5) 12m26.060156046s ago: executing program 0 (id=6656): r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmmsg$inet_sctp(r0, 0x0, 0x0, 0x40895) 12m25.999052798s ago: executing program 0 (id=6657): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000580)) (fail_nth: 4) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x20000000) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 12m25.693807392s ago: executing program 0 (id=6659): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0xfff, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0, 0x0, 0x5a8cdbd7}, 0x18) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800714, &(0x7f0000000000)={[{}]}, 0xff, 0x485, &(0x7f0000001040)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x111) ftruncate(r0, 0xffff7fff7fffffff) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x5000, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x80000000020, 0x8005, 0x0, 0x0, 0x11, 0x1c, "ef359f413bb93852f7d6a4ae6dddfbd1ce5d29c2ee5e5ca9000ff8ee09e737ff0edf110ff4117639c2eb4b78c660e677df701905b9aafab4afaaf755a3f6a004", "036c47c6780820d1cbf7966d61fdcf335263bd9bffbcc2542ded71038259ca171ce1a311ef54ec32d71efdd23dc177e9b48b00", "f28359738e229a4c66810000000000d300e6d602000000000000000000000001", [0x204]}) pwrite64(r1, &(0x7f0000000300)="ec", 0x1, 0x8000c61) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000fc0)=@raw={'raw\x00', 0x8, 0x3, 0x4e8, 0x0, 0x11, 0x148, 0x340, 0x0, 0x450, 0x2a8, 0x2a8, 0x450, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x88000000, 0x3, 0x7}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x110, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@quota={{0x38}, {0x0, 0x0, 0x81}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x4f, 0x7, "72f6daeff0a9c6294e211d2d88fe6dcff5d0e552201da3b7a1fdb30dcb59"}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x548) 12m24.717367705s ago: executing program 0 (id=6681): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfd, 0x0, 0x7ffc0002}]}) r1 = gettid() r2 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x140a, 0x1, 0x70bd27, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x8080) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)) r3 = socket$inet_smc(0x2b, 0x1, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2000000}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='ext4_shutdown\x00', r5, 0x0, 0x1}, 0x18) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x100000a, 0x4082172, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x15, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="b400000000000000791028000000000069002400000000009500740000000000", @ANYRESDEC], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/164, 0x0, 0x25, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xffffff8f}, 0x48) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000005000/0x4000)=nil) r6 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r6, &(0x7f0000000000), 0x10) setsockopt$CAN_RAW_FILTER(r6, 0x65, 0x1, 0x0, 0x0) close(r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)) timer_settime(0x0, 0x1, &(0x7f0000000480)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) futex_waitv(&(0x7f0000001080)=[{0x3, &(0x7f0000001040)=0x3, 0x82}], 0x1, 0x0, &(0x7f0000001100)={0x77359400}, 0x1) 12m24.492241464s ago: executing program 0 (id=6688): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000bc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00', r1}, 0x9) r2 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r2, &(0x7f0000006b80)=[{{&(0x7f0000000340)={0xa, 0x4e24, 0xfff, @remote}, 0x1c, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="e802000000000000290000000400"], 0x2e8}}], 0x1, 0x0) 12m24.448763266s ago: executing program 33 (id=6688): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000bc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00', r1}, 0x9) r2 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r2, &(0x7f0000006b80)=[{{&(0x7f0000000340)={0xa, 0x4e24, 0xfff, @remote}, 0x1c, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="e802000000000000290000000400"], 0x2e8}}], 0x1, 0x0) 12m20.505043549s ago: executing program 34 (id=6475): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xf, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000100000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000800008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001f40)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) epoll_pwait2(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x40505330, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) socketpair(0x1, 0x100000005, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000140)=@newlink={0x50, 0x10, 0x503, 0xfffffffb, 0x0, {0x0, 0x0, 0x0, 0x0, 0x21111, 0x9820}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_MACSEC_CIPHER_SUITE={0xc, 0x4, 0x80c20001000003}, @IFLA_MACSEC_WINDOW={0x8, 0x5, 0x200}]}}}, @IFLA_LINK={0x8, 0x5, r5}]}, 0x50}, 0x1, 0x0, 0x0, 0x48890}, 0x0) setsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x8008000000010, &(0x7f0000001640)="17000000020001000003d68c5ee17688a2003208030300ecff3f0000000300000a0000000098fc5ad9485bbb6a880000d6c8db0000dba67e06000000e28900000200df018000000000f50607bdff59100ac45761547a681f009cee4a", 0x5c) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=ANY=[@ANYBLOB="0212000002"], 0x10}}, 0x0) 4m24.699700884s ago: executing program 5 (id=17526): r0 = socket$inet6(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = getpgrp(0x0) tkill(r2, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0, r1, 0x0, 0x5}, 0x18) r3 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000001200)={0x0, 0xffaf}, 0x1, 0x0, 0x0, 0x40814}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) sendmsg$nl_route(r4, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2004d808}, 0x0) sendmsg$nl_route(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={0x0, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x200088c4) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000004c0)={'ip6_vti0\x00', &(0x7f0000000740)={'syztnl1\x00', r5, 0x29, 0xfa, 0x3, 0x2, 0x5c, @local, @empty, 0x7800, 0x40, 0x4, 0x4}}) r6 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, r6, 0x0, 0x8, 0xfffffffffffffffd) socket$kcm(0x29, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000680)={'syztnl1\x00', 0x0}) request_key(&(0x7f0000001d40)='asymmetric\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0xfffffffffffffffe) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="1801000000000000000000006dfeff00850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r7, 0x0, 0x401}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a000000020000"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r9, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x1018}, './file0\x00'}) 4m24.697091874s ago: executing program 5 (id=17529): set_mempolicy(0x6005, &(0x7f0000000080)=0xfffffffffffffffd, 0x4) r0 = syz_io_uring_setup(0x1104, &(0x7f0000000300)={0x0, 0x0, 0x400, 0x0, 0x8000021e}, &(0x7f0000000400)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f0000000380)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7ff, 0x0, 0x1}) io_uring_enter(r0, 0x47fa, 0x37f9, 0x0, 0x0, 0x0) (fail_nth: 2) 4m24.357134178s ago: executing program 5 (id=17532): r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff08000400000000000000", 0x38}], 0x1) 4m24.32519521s ago: executing program 5 (id=17534): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000001200)={[{@nodiscard}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@dioread_lock}, {@data_err_ignore}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4007b1}}, {@nobarrier}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0xeb}}, {@abort}, {@user_xattr}, {@bh}, {@errors_remount}]}, 0x1, 0x55f, &(0x7f0000000580)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000410"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000000c0)='kmem_cache_free\x00', r1, 0x0, 0x3}, 0x18) lsetxattr$trusted_overlay_upper(&(0x7f0000000200)='./file1\x00', &(0x7f0000000100), &(0x7f0000000400)=ANY=[], 0xfe37, 0x0) r2 = open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x180000) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e24, 0x8, @local, 0x2}, 0x1c) r3 = socket$inet6(0xa, 0x3, 0xff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r4, &(0x7f0000000440), 0x10) listen(r4, 0x0) r5 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r5, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0x10) sendmmsg$inet(r5, &(0x7f0000000480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4000844) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000440)={'vxcan1\x00', 0x0}) r7 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r7, &(0x7f0000000000)={0x1d, r6, 0x0, {}, 0xfe}, 0x18) sendmsg$can_j1939(r7, &(0x7f00000001c0)={&(0x7f0000000140)={0x1d, 0x0, 0x0, {}, 0x1}, 0x18, &(0x7f0000000180)={&(0x7f00000003c0)="08030005c7373d5b04", 0x9}}, 0xee) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500970010000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) close(r0) r9 = syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r9) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) ptrace(0x10, r9) getcwd(&(0x7f0000000480)=""/155, 0x9b) socket$inet_mptcp(0x2, 0x1, 0x106) 4m22.282076834s ago: executing program 5 (id=17577): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000008c0)=ANY=[@ANYBLOB="54000000000801010000ffffe00000000a000000050003002f0000000600024000000000240004800800024000000000080001400000fcff07000140800000010800014080000001090001"], 0x54}, 0x1, 0x0, 0x0, 0x4004}, 0x28040000) 4m21.833323673s ago: executing program 5 (id=17592): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f00000000c0)='.\x00', 0xa4000061) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000200), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5c0000000206030000000000000000000000000005000100070000000900020073797a310000000014000780050015000c00000008001240000000000500050002000000050004000000000010000300686173683a69702c6d6163"], 0x5c}, 0x1, 0x0, 0x0, 0x20040010}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000030601020000ffffffff00000a0000010500018007"], 0x1c}, 0x1, 0x0, 0x0, 0x4004810}, 0x840) read(r0, &(0x7f0000002040)=""/76, 0x4c) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000bc0), r1) open(&(0x7f0000000000)='.\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000001700000001"], 0x48) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) write(r2, &(0x7f00000000c0)="c3", 0xffffffed) poll(&(0x7f0000000000)=[{}], 0x20000000000000fe, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x18) clock_getres(0x3, 0x0) 4m21.833070163s ago: executing program 35 (id=17592): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f00000000c0)='.\x00', 0xa4000061) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000200), 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5c0000000206030000000000000000000000000005000100070000000900020073797a310000000014000780050015000c00000008001240000000000500050002000000050004000000000010000300686173683a69702c6d6163"], 0x5c}, 0x1, 0x0, 0x0, 0x20040010}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000030601020000ffffffff00000a0000010500018007"], 0x1c}, 0x1, 0x0, 0x0, 0x4004810}, 0x840) read(r0, &(0x7f0000002040)=""/76, 0x4c) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000bc0), r1) open(&(0x7f0000000000)='.\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000001700000001"], 0x48) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) write(r2, &(0x7f00000000c0)="c3", 0xffffffed) poll(&(0x7f0000000000)=[{}], 0x20000000000000fe, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x18) clock_getres(0x3, 0x0) 4m15.028174406s ago: executing program 2 (id=17695): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000030000008500000086000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000240)='kfree\x00', r1}, 0x18) mount$9p_fd(0x0, &(0x7f0000000000)='./cgroup.cpu/cgroup.procs\x00', &(0x7f00000003c0), 0x4000, &(0x7f0000000180)=ANY=[@ANYBLOB=',loose,access=client,access=any,version=9p2000,version=9p2000.L,fscontext=', @ANYRES64]) 4m15.002385957s ago: executing program 2 (id=17696): bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = socket$key(0xf, 0x3, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x7, 0x4, 0x100, 0x1, 0x28}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB], &(0x7f0000000d40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) umount2(&(0x7f00000002c0)='./file0\x00', 0x9) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x4, [@volatile={0x7, 0x0, 0x0, 0x9, 0x3}, @func={0x7, 0x0, 0x0, 0xc, 0x4}, @float={0x6, 0x0, 0x0, 0x10, 0x8}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x1, 0x9}}, @struct={0xc, 0x1, 0x0, 0x4, 0x1, 0x7, [{0x2, 0x3, 0xf4}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x4, 0xffff}}, @typedef={0x10}]}, {0x0, [0x0, 0x2e]}}, &(0x7f0000001c00)=""/4096, 0x94, 0x1000}, 0x28) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000500)=ANY=[@ANYRESDEC=r0, @ANYRES32=r1, @ANYRES16=r3], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x27, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x18) r7 = socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$inet(r7, &(0x7f0000000080)={&(0x7f0000000280)={0x2, 0x4001, @local}, 0x10, 0x0}, 0x30004001) r8 = signalfd4(r6, &(0x7f00000000c0)={[0xa900]}, 0x8, 0x80000) getsockopt$bt_sco_SCO_OPTIONS(r8, 0x11, 0x1, &(0x7f0000000c00)=""/4096, &(0x7f0000000100)=0x1000) sendmsg$inet(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="d5", 0x1}], 0x1}, 0x8004) 4m14.91309039s ago: executing program 2 (id=17698): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x18, 0xc, &(0x7f0000000d80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4000000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x6, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, &(0x7f0000000180)=[{0x5, 0x4, 0xd, 0x6}, {0x4, 0x4, 0x3, 0x2}], 0x10, 0x26}, 0x94) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) r4 = socket$isdn(0x22, 0x3, 0x1) ioctl$BTRFS_IOC_SUBVOL_CREATE(r4, 0x5000940e, &(0x7f0000000e00)={{r1}, "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"}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01032757c38d085641a7260000000c000180080001"], 0x20}, 0x1, 0x0, 0x0, 0x20040005}, 0x48d4) 4m14.9120257s ago: executing program 2 (id=17700): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) r3 = socket(0x2b, 0x80801, 0x1) setsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000040)=0x5, 0x4) socket(0x40000000015, 0x5, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x2}]}, @volatile={0x0, 0x0, 0x0, 0x9, 0x1}]}}, 0x0, 0x3a}, 0x20) socket$nl_netfilter(0x10, 0x3, 0xc) pselect6(0x40, &(0x7f00000001c0)={0x7, 0x0, 0x100000000000000, 0x0, 0x400000000, 0xfffffffffffffffb, 0xffffffffffffffff, 0xffffffff}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0) shutdown(r3, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x5, 0x6, 0x8, 0xad, 0x0, 0xffffffffffffffff, 0x4000000}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000080)=0x0) ioprio_get$uid(0x0, r6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x4008, r5}, 0x18) 4m14.006310718s ago: executing program 2 (id=17713): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_j1939(r2, &(0x7f0000000340)={0x1d, r3, 0x0, {0x1, 0xf0, 0x4}, 0xfe}, 0x18) sendmsg$nl_route_sched(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000780)=@newtfilter={0x24, 0x11, 0x1, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x74, r3, {0xfff3, 0x10}, {0xfff1, 0x9}, {0x2, 0xb}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x4012}, 0x20000050) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002780)=[{0x18, 0x1, 0x1, "f474b43ca55f85"}], 0x18}, 0x20004000) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={r3, @private=0xa010102, @broadcast}, 0xc) recvfrom$packet(r0, &(0x7f0000000040)=""/103, 0x67, 0x140, &(0x7f00000001c0)={0x11, 0x4, r3, 0x1, 0xd6, 0x6, @remote}, 0x14) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r6}, 0x10) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f0000000300)={0x0, r6}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1a, 0x10, &(0x7f00000008c0)=ANY=[@ANYRES16=r7, @ANYRESOCT=r2, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r8}, 0x10) r9 = socket$kcm(0x21, 0x2, 0x2) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x24000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x200000000000, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x8b7848, 0x0) sendmsg$kcm(r9, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, 0x0, 0x0, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x106) 4m13.767831368s ago: executing program 2 (id=17717): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa1000000"], &(0x7f0000000000)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r1}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000010000100"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x0], 0x30}}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000035c0)="5c00000013006bcd9e3fe3dc4e48aa31086b8703340000001f00000000000000040014000d000a00140000009ee517d34460bc08eab556a705251e6182949a3651f60a84c9f5d1938837e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f000801}, 0x240000c0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80500, 0x4) setsockopt$inet_mreqsrc(r5, 0x0, 0x28, &(0x7f0000000080)={@dev={0xac, 0x14, 0x14, 0x1c}, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r5, 0x89f8, &(0x7f00000002c0)={'ip_vti0\x00', &(0x7f00000001c0)={'gre0\x00', 0x0, 0x44a4da6a6f8f5bf0, 0x7, 0x900, 0x4, {{0x6, 0x4, 0x1, 0x2, 0x18, 0x68, 0x0, 0x9, 0x2f, 0x0, @multicast1, @private=0xa010102, {[@noop]}}}}}) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x6, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="180200000a0095000000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="180058f613ecde46e90000000000000000fbffffff850000002a", @ANYRES32, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b70400000000000085000000330000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0xffffffff, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b80)={r7, 0x2000012, 0xe, 0x0, &(0x7f0000000280)="63ec33c9e9b98600000000000000", 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xb}, 0x50) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r8, 0x84, 0x6e, &(0x7f0000000340)=[@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x31}}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e20, 0x4, @local, 0x1}], 0x3c) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYRES8=r6, @ANYRES32=r8, @ANYBLOB="5d980a1910b71a5d6573e0ba25a72a718ad850c5c47d68ffa9ac8b8107cee376001bb40293908a962321f6e8dca32fc94930debcc0f6d386baa19327170b9c73034983abf52da8f2cea07529baf3c3dbee109250d25459dc797cc3f08e0e699b7f50ffcd8c9f28712d8852949de9ab92e0c506f322d223a8cde5afd901bfddf3e4864e39fd734a56b00dc02d7f4719fbd0140d"], 0x48) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0b00000008000000010001000900000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x3c, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r7}, 0x18) r10 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r10, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000900)=@newqdisc={0x38, 0x24, 0x3fe3aa0262d8c583, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x0, 0xffe0}, {0xffff, 0xffff}, {0x10, 0xe}}, [@qdisc_kind_options=@q_fq={{0x7}, {0xc, 0x2, [@TCA_FQ_FLOW_DEFAULT_RATE={0x8, 0x6, 0xffffffff}]}}]}, 0x38}}, 0x4048000) r11 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="01002dbd7000fedbdf2531000000180001801400020064756d6d7930"], 0x2c}, 0x1, 0x0, 0x0, 0x2004c890}, 0x2000c800) 3m59.296197679s ago: executing program 36 (id=17717): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa1000000"], &(0x7f0000000000)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r1}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="3000000010000100"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x0], 0x30}}, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000035c0)="5c00000013006bcd9e3fe3dc4e48aa31086b8703340000001f00000000000000040014000d000a00140000009ee517d34460bc08eab556a705251e6182949a3651f60a84c9f5d1938837e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f000801}, 0x240000c0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80500, 0x4) setsockopt$inet_mreqsrc(r5, 0x0, 0x28, &(0x7f0000000080)={@dev={0xac, 0x14, 0x14, 0x1c}, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r5, 0x89f8, &(0x7f00000002c0)={'ip_vti0\x00', &(0x7f00000001c0)={'gre0\x00', 0x0, 0x44a4da6a6f8f5bf0, 0x7, 0x900, 0x4, {{0x6, 0x4, 0x1, 0x2, 0x18, 0x68, 0x0, 0x9, 0x2f, 0x0, @multicast1, @private=0xa010102, {[@noop]}}}}}) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x6, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="180200000a0095000000000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="180058f613ecde46e90000000000000000fbffffff850000002a", @ANYRES32, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b70400000000000085000000330000009500000000000000"], &(0x7f00000001c0)='syzkaller\x00', 0xffffffff, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b80)={r7, 0x2000012, 0xe, 0x0, &(0x7f0000000280)="63ec33c9e9b98600000000000000", 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xb}, 0x50) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r8, 0x84, 0x6e, &(0x7f0000000340)=[@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x31}}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e20, 0x4, @local, 0x1}], 0x3c) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYRES8=r6, @ANYRES32=r8, @ANYBLOB="5d980a1910b71a5d6573e0ba25a72a718ad850c5c47d68ffa9ac8b8107cee376001bb40293908a962321f6e8dca32fc94930debcc0f6d386baa19327170b9c73034983abf52da8f2cea07529baf3c3dbee109250d25459dc797cc3f08e0e699b7f50ffcd8c9f28712d8852949de9ab92e0c506f322d223a8cde5afd901bfddf3e4864e39fd734a56b00dc02d7f4719fbd0140d"], 0x48) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0b00000008000000010001000900000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x3c, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r7}, 0x18) r10 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r10, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000900)=@newqdisc={0x38, 0x24, 0x3fe3aa0262d8c583, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x0, 0xffe0}, {0xffff, 0xffff}, {0x10, 0xe}}, [@qdisc_kind_options=@q_fq={{0x7}, {0xc, 0x2, [@TCA_FQ_FLOW_DEFAULT_RATE={0x8, 0x6, 0xffffffff}]}}]}, 0x38}}, 0x4048000) r11 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="01002dbd7000fedbdf2531000000180001801400020064756d6d7930"], 0x2c}, 0x1, 0x0, 0x0, 0x2004c890}, 0x2000c800) 1.20723939s ago: executing program 6 (id=23793): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0xfffffffffffffd2d, 0x0, 0x0, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f00000004c0)={0x0, r0}, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x6, &(0x7f0000000280)=[{0x4, 0x0, 0xfc, 0x7ffc0001}, {0x4, 0x1, 0xc, 0x2}, {0x675b, 0x3, 0xa, 0x6}, {0x4, 0x80, 0x8}, {0x81, 0x69, 0x8, 0x2}, {0x6, 0x7f, 0x68, 0x8}]}) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xe7fd}, 0x100002, 0x3, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000012c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x4, 0x0, 0x0}, 0x94) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0), 0x103642, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) socket$netlink(0x10, 0x3, 0x10) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt(r4, 0x0, 0x82, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) socket$netlink(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000001780)=ANY=[@ANYBLOB="540000001000010400000000000000ffff000000", @ANYRES32=0x0, @ANYBLOB="0380000000000000240012800c0001006d6163766c616e00140002800800010008000000060002000100000008000500", @ANYRES32=r6, @ANYBLOB='\b\x00\n\x00R'], 0x54}, 0x1, 0x0, 0x0, 0x4048814}, 0x0) sendmmsg(r5, &(0x7f00000002c0), 0x40000000000009f, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x3, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000001080)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r7}, 0x10) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYBLOB="3c0100001000130700000000000000006e66cbdf423cf08f00000000eb00000000fe8000000000000000000000000000aa000000000008000000000000000000006d84cbeeb12c2350569c76fc1fbd0bdec0714ffefa1fac8e53cc03c3d471e8a63f54235c3637c02abad0b0e69467", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000000000000000000004d533000000fe80000000000000000000000000001a07000000000000000900000000000000fdffffffffffffff00000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000ffffffff0200000060000000000000004c001400636d61632861657329"], 0x13c}}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x4cc, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x5}, 0x0, 0x10000, 0x0, 0x6, 0x8, 0x80020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_io_uring_submit(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800700, &(0x7f00000005c0)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x2}}, {@bsdgroups}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5c}}, {@noauto_da_alloc}, {@bsdgroups}, {@oldalloc}, {@errors_continue}]}, 0x2, 0x45d, &(0x7f0000000ac0)="$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") 953.404929ms ago: executing program 6 (id=23802): socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), r0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000003100)={&(0x7f00000001c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01002bbd7000fbdbdf25020000000a", @ANYRES32=r2, @ANYBLOB='\b\x00\v'], 0x30}, 0x1, 0x0, 0x0, 0x20000050}, 0x20040084) 924.630841ms ago: executing program 6 (id=23804): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000040)=ANY=[], 0x0}, 0x94) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000200)=0x474c, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @local}, 0x6f) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c00e4b43682f4bad7aa000000172200000000000534778f21000100067ab9b0000000ba9b146401deef48853b79573784b826ff5ce1e418c9caceae413bab9efb68e2da003002b0ebd74a7c02ddd73f"], 0x1c}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) socket$netlink(0x10, 0x3, 0x1) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r1, &(0x7f0000000480)={0x0, 0xffffffffffffff3c, &(0x7f0000000140)={&(0x7f00000002c0)={0x14, r2, 0x9c3fa077fa966179, 0x0, 0x0, {{0x7e}, {@void, @void}}}, 0x14}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000040000"], 0x50) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x60, 0x24, 0xd0f, 0x70bd2d, 0x0, {0x60, 0x0, 0x0, r5, {0x0, 0xa}, {0xffff, 0xffff}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x34, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0xea, 0x2, 0x0, 0x0, 0x9, 0x5}, {0x12, 0x2, 0x0, 0x401, 0x8001, 0x1400}, 0xa5, 0x5, 0xffffffd}}, @TCA_TBF_BURST={0x8, 0x6, 0x8057}]}}]}, 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0x44080) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=@newqdisc={0x44, 0x24, 0xd0f, 0x70bd29, 0x0, {0x60, 0x0, 0x0, r5, {}, {0xffe0, 0xa}, {0x1, 0x10}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x14, 0x2, [@TCA_CAKE_ATM={0x8, 0x4, 0x2}, @TCA_CAKE_FLOW_MODE={0x8, 0x5, 0x5}]}}]}, 0x44}, 0x1, 0x0, 0x0, 0x55}, 0x4000) r6 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r6, &(0x7f0000000000)={0xa, 0x3, 0x0, @loopback}, 0x1c) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x3, 0x7, @loopback, 0x800000}, 0x1c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='rxrpc_client\x00', 0xffffffffffffffff, 0x0, 0x3}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x800001d, 0x300) 500.509159ms ago: executing program 4 (id=23823): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000000100000100000028"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRES32=r1], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWSET={0x5c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x7}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}, @NFTA_SET_EXPR={0x20, 0x11, 0x0, 0x1, @limit={{0xa}, @val={0x10, 0x2, 0x0, 0x1, [@NFTA_LIMIT_RATE={0xc, 0x1, 0x1, 0x0, 0x101}]}}}]}, @NFT_MSG_NEWSETELEM={0x38, 0xc, 0xa, 0x101, 0x0, 0x0, {0x7}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0xc, 0x3, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x4}]}]}]}], {0x14, 0x10, 0x1, 0x0, 0x0, {0x0, 0x84}}}, 0xbc}}, 0x0) 482.648559ms ago: executing program 4 (id=23824): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xf, &(0x7f0000000700)=ANY=[@ANYRESOCT=r0, @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014fa0000b7030000000008008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b70200000000000085000000840000fd00b70000000020000095", @ANYRES8=r0], &(0x7f0000000300)='syzkaller\x00', 0x9, 0x0, 0x0, 0x40f00, 0x7b, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x52, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, 0x0, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000380)=ANY=[@ANYRESOCT=r2, @ANYRES64=r1], 0x57) socket$netlink(0x10, 0x3, 0x0) prlimit64(0x0, 0x8, &(0x7f0000000000)={0xfffffffffffffffb, 0xfffffffffffffffc}, 0x0) getrlimit(0xe, &(0x7f0000000440)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f0850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r3}, 0x18) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffc0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000100)='sched_switch\x00', r4, 0x0, 0x2}, 0x18) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000240), 0xb, 0x101301) ioctl$USBDEVFS_IOCTL(r5, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect) perf_event_open(&(0x7f0000000600)={0x2, 0x80, 0x28, 0x3, 0x0, 0x0, 0x0, 0x3, 0x4000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x180, 0x6}, 0x4065, 0x4005, 0x100000b, 0x0, 0x1, 0x1, 0xb, 0x0, 0xa8e, 0x0, 0x1ff}, 0x0, 0x1, 0xffffffffffffffff, 0x2) ioctl$USBDEVFS_SETCONFIGURATION(r5, 0x80045505, &(0x7f0000000000)=0x1) 472.12554ms ago: executing program 9 (id=23826): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) io_setup(0x6, &(0x7f0000000680)=0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0xff, 0x7ffc1ffd}]}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x10, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f00000007c0)='kmem_cache_free\x00', r3}, 0x18) io_submit(r1, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x180a, 0x0, 0x3, 0x1, 0x0, r0, 0x0, 0x1802}]) 431.601402ms ago: executing program 8 (id=23829): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x204410, &(0x7f0000000740), 0xfe, 0x4a1, &(0x7f00000001c0)="$eJzs3M1vVFUbAPDn3mnLN+3Li6h8SBWNjR8tLags3Gh0p4mJLnBjUttCKgM1tCRCiFZjcGlI3BvdGKJ/gSvdGHVl4lb3hoQoMQFdmDF35t4yU2ZKW6YdcH6/5JZz5p7pOc+ce+499x6mAXStwexHErE1In6JiP5atrHAYO2f61fPT/x19fxEEpXKq78n1XLXrp6fKIoW79uSZ4bSiPTDJK+k0ezZcyfGy+Wp03l+ZO7k2yOzZ889OX1y/PjU8alTY0eOHD40+szTY0+1Jc4srmu7353Zm/S8fvHliaMX3/zhqzQidu2r7a+P47akWxaSg1ngf1SqFhd7pC2V3Tm21aWTng42hBUpRUTWXb3V8d8fpbjRef3x4gcdbRywprJr04bWu+crwH9YEp1uAdAZxYU+u/8ttnWaetwRrjxXuwHK4r6eb7U9PZHmZXrXsP77IuLo/N+fZlvk/fDP1jWsEADoet9k858nms3/0thVV257voYyEBH/i4gdEfH/iNgZEfdEVMvem89nVqK2NFRayN88/0wvrzq4Zcjmf8/ma1uN879i9hcDpTy3rRp/b3Jsujx1MP9MhqJ3Q5YfXaKOb1/4+eNW+wbr5n/ZltVfzAXzdlzuWfSAbnJ8brxdk9Ir70fs7mkWf7KwEpBExP0RsXtlv3p7kZh+7NLeVoVuHf8S2rDOVPks4tFa/8/HovgLydLrkyMbozx1cKQ4Km72408XXmle+8bbi78Nsv7f3Hj8LyrR/2dSv147u/I6Lvz6Uct7ytUe/33Ja9Ux2Ze/9s743Nzp0Yi+5KVqvuH1sRvvLfJF+Sz+oQPNx/+O/D1Z/HsiIjuI90XEAxGxP2/7gxHxUEQcWCL+759/+K0VxT+9vv0/2fT8t3D8DzT2/8oTpRPffd2q/jz+4mTbov8PV1ND+SvV898ttG5OlKciKpVVH80AAABw98luvLdGkg4vpNN0eLj2f/h3xua0PDM79/ixmTOnJmvfERiI3rR40tWfPw/N7rZHk/n8N9aej47lz4qL56WH8ufGn5Q2VfPDEzPlyQ7HDt1uS4vxn/mt1OnWAWvO97Wgey0e/2mH2gGsP9d/6F7GP3Qv4x+6V934//LMhT3VxHvVn/sXdjRdC1jiL4cAd4dF1/9Ln3eqIcC6M/+H7mX8Q/cy/qEr3c73+juT2JS3/FaF+zrf1NUlvuidLWXx1e1KeiI637DGRKRLlXkjmu8ajIg1aljcER9LuxPJMg715SaOHc+HznIKd/KsBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0D7/BgAA//9ajd4t") ptrace$setregs(0xd, r0, 0x0, &(0x7f00000003c0)) ptrace$getregset(0x4205, r0, 0x200, &(0x7f0000000080)={0x0, 0x30}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r2 = socket$key(0xf, 0x3, 0x2) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001040)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x18) r5 = socket(0x1e, 0x1, 0x0) connect$tipc(r5, &(0x7f0000000000)=@name={0x1e, 0x2, 0x1, {{0x1, 0x1}}}, 0x10) write$binfmt_misc(r5, &(0x7f0000000340), 0x2000011a) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='sched_switch\x00', r6}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x18) sendmsg$key(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000180)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000400)='sys_enter\x00', r8}, 0x18) syz_clone3(&(0x7f0000000540)={0x800100, 0x0, 0x0, 0x0, {0x2f}, 0x0, 0x0, 0x0, 0x0}, 0x58) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r9}, 0x18) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='fdinfo\x00') fchdir(r10) syz_clone3(&(0x7f0000001040)={0x800, 0x0, 0x0, 0x0, {0x202f}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd10}, 0x58) 394.807993ms ago: executing program 4 (id=23830): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000040)=ANY=[], 0x0}, 0x94) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000200)=0x474c, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @local}, 0x6f) connect$inet(0xffffffffffffffff, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c00e4b43682f4bad7aa000000172200000000000534778f21000100067ab9b0000000ba9b146401deef48853b79573784b826ff5ce1e418c9caceae413bab9efb68e2da003002b0ebd74a7c02ddd73f"], 0x1c}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) socket$netlink(0x10, 0x3, 0x1) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r1, &(0x7f0000000480)={0x0, 0xffffffffffffff3c, &(0x7f0000000140)={&(0x7f00000002c0)={0x14, r2, 0x9c3fa077fa966179, 0x0, 0x0, {{0x7e}, {@void, @void}}}, 0x14}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan1\x00'}) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="02000000040000000800"], 0x50) r3 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000080)=@newqdisc={0x60, 0x24, 0xd0f, 0x70bd2d, 0x0, {0x60, 0x0, 0x0, r5, {0x0, 0xa}, {0xffff, 0xffff}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x34, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0xea, 0x2, 0x0, 0x0, 0x9, 0x5}, {0x12, 0x2, 0x0, 0x401, 0x8001, 0x1400}, 0xa5, 0x5, 0xffffffd}}, @TCA_TBF_BURST={0x8, 0x6, 0x8057}]}}]}, 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0x44080) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=@newqdisc={0x44, 0x24, 0xd0f, 0x70bd29, 0x0, {0x60, 0x0, 0x0, r5, {}, {0xffe0, 0xa}, {0x1, 0x10}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x14, 0x2, [@TCA_CAKE_ATM={0x8, 0x4, 0x2}, @TCA_CAKE_FLOW_MODE={0x8, 0x5, 0x5}]}}]}, 0x44}, 0x1, 0x0, 0x0, 0x55}, 0x4000) r6 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r6, &(0x7f0000000000)={0xa, 0x3, 0x0, @loopback}, 0x1c) connect$inet6(r6, &(0x7f0000000040)={0xa, 0x3, 0x7, @loopback, 0x800000}, 0x1c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='rxrpc_client\x00', 0xffffffffffffffff, 0x0, 0x3}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x800001d, 0x300) 376.737824ms ago: executing program 9 (id=23831): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000640)='ext4\x00', &(0x7f0000000680)='./file0\x00', 0x0, &(0x7f00000006c0), 0x1, 0x603, &(0x7f0000000700)="$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") 335.781595ms ago: executing program 9 (id=23832): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000a00)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01030000000000000000010000000900010073797a310000000054000000030a01020000000000000000010000000900030073797a310000000028000480080002400000000008000140000000051400030076657468315f6d6163767461700000000900010073797a31"], 0xf4}}, 0x10) 307.311796ms ago: executing program 9 (id=23833): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x204410, &(0x7f0000000740), 0xfe, 0x4a1, &(0x7f00000001c0)="$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") ptrace$setregs(0xd, r0, 0x0, &(0x7f00000003c0)) ptrace$getregset(0x4205, r0, 0x200, &(0x7f0000000080)={0x0, 0x30}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r2 = socket$key(0xf, 0x3, 0x2) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001040)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x18) r5 = socket(0x1e, 0x1, 0x0) connect$tipc(r5, &(0x7f0000000000)=@name={0x1e, 0x2, 0x1, {{0x1, 0x1}}}, 0x10) write$binfmt_misc(r5, &(0x7f0000000340), 0x2000011a) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x18) sendmsg$key(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000180)={0x2, 0x9, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000400)='sys_enter\x00', r7}, 0x18) syz_clone3(&(0x7f0000000540)={0x800100, 0x0, 0x0, 0x0, {0x2f}, 0x0, 0x0, 0x0, 0x0}, 0x58) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r8}, 0x18) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='fdinfo\x00') fchdir(r9) syz_clone3(&(0x7f0000001040)={0x800, 0x0, 0x0, 0x0, {0x202f}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd10}, 0x58) 269.833868ms ago: executing program 7 (id=23834): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000400)='kfree\x00', r1, 0x0, 0x8}, 0x18) r2 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x6) symlinkat(&(0x7f0000000400)='./file0/../file0\x00', r3, &(0x7f0000000080)='./file0\x00') readlinkat(r3, &(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000780)=""/198, 0xc6) 258.056839ms ago: executing program 8 (id=23835): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000000100000100000028"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRES32=r1], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWSET={0x5c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x7}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}, @NFTA_SET_EXPR={0x20, 0x11, 0x0, 0x1, @limit={{0xa}, @val={0x10, 0x2, 0x0, 0x1, [@NFTA_LIMIT_RATE={0xc, 0x1, 0x1, 0x0, 0x101}]}}}]}, @NFT_MSG_NEWSETELEM={0x38, 0xc, 0xa, 0x101, 0x0, 0x0, {0x7}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0xc, 0x3, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x4}]}]}]}], {0x14, 0x10, 0x1, 0x0, 0x0, {0x0, 0x84}}}, 0xbc}}, 0x0) 243.18739ms ago: executing program 4 (id=23836): creat(&(0x7f00000002c0)='./file0\x00', 0x0) sendmsg$AUDIT_USER_AVC(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0, 0x14}, 0x1, 0x0, 0x0, 0xc044}, 0x2080) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xc, &(0x7f0000000300)=ANY=[], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x58a5}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000004500), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',access=any,cache=mmap']) 237.57323ms ago: executing program 7 (id=23837): getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@private1, @in=@loopback}}, {{@in=@local}, 0x0, @in6=@initdev}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001080)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1], 0x1c}}, 0x0) sendmsg$NL80211_CMD_DEL_MPATH(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="face", @ANYRES16=r1, @ANYBLOB="00002abd7000ffdbdf2518000000"], 0x14}}, 0x8) 230.52177ms ago: executing program 8 (id=23838): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x6, 0x2, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000002f80)=""/61) 216.6394ms ago: executing program 7 (id=23839): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)=ANY=[@ANYBLOB="5c000000100001442cbd7000000000000000ff", @ANYRES32=0x0, @ANYBLOB="421c0000000000001c001280090001007866726d000000000c00028008000200feffffff140003007866726d30"], 0x5c}}, 0x0) 200.860311ms ago: executing program 7 (id=23840): socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), r0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000003100)={&(0x7f00000001c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01002bbd7000fbdbdf25020000000a000900aaaaaaaaaa", @ANYRES32=r2, @ANYBLOB='\b\x00\v'], 0x30}, 0x1, 0x0, 0x0, 0x20000050}, 0x20040084) 191.179422ms ago: executing program 9 (id=23841): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x6, 0x2, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$KDGKBDIACR(r2, 0x4b4a, &(0x7f0000002f80)=""/61) 179.784532ms ago: executing program 8 (id=23842): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x101000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x11) ioctl$FIONREAD(r0, 0x8924, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f00000003c0)=[{0x0}], 0x1) writev(r2, &(0x7f0000000300)=[{&(0x7f00000001c0)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000d00000000000006040000000000f93132", 0x39}], 0x1) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e22, 0x7, @mcast2, 0x40}}}, &(0x7f00000000c0)=0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r3, @in={{0x2, 0x4e24, @empty}}}, &(0x7f0000000100)=0x84) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={{0x14}, [@NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @ct={{0x7}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_CT_KEY={0x8, 0x2, 0x1, 0x0, 0xf}, @NFTA_CT_DREG={0x8, 0x1, 0x1, 0x0, 0x2}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x78}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) syz_io_uring_complete(0x0) r5 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) sendmsg(r5, &(0x7f00000000c0)={0x0, 0x953c, &(0x7f0000000100)=[{&(0x7f0000000000)="2b10", 0xffbd}], 0x1, 0x0, 0x0, 0x2c}, 0x4) 179.389852ms ago: executing program 7 (id=23843): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000640)='ext4\x00', &(0x7f0000000680)='./file0\x00', 0x0, &(0x7f00000006c0), 0x1, 0x603, &(0x7f0000000700)="$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") 158.906793ms ago: executing program 4 (id=23844): r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xf, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_route(0x10, 0x3, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) (async) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) (async) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f00006dbffc), 0x4) (async) bind$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x57) sendmsg$xdp(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000200)="0000000000aa303e97380e90231bdbdaf6a4bd866226b7cdb7c26858c4e4fd703be2f51ed6ddc4a47116ec2db75c7042a22491af0ffea4174a9de3350c0a498396b28c7d1784d04aa38922721cb7816094cb82950fd012efd26d", 0x5a}, {&(0x7f0000000900)="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", 0x3f1}, {&(0x7f00000003c0)="128b9306006d4810e5ac5040ad9201847839fc378469d5765b9cc241840896c1498194a7197b45d74a8532b82037b02c9e6045c361eb", 0x36}], 0x3}, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003ec0)=[{{0x0, 0x0, 0x0}, 0x8000}], 0x1, 0x40000100, 0x0) migrate_pages(0x0, 0x4, 0x0, 0xffffffffffffffff) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='kfree\x00', r1}, 0x18) (async) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) (async) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x42718, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0xd07, 0x40}, 0x100b28, 0x6, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000400)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) (async) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={0xffffffffffffffff, 0x0, 0x0}, 0x20) (async) memfd_create(0x0, 0x7) (async) syz_open_dev$sg(&(0x7f0000000000), 0xfffffffffffffffa, 0x400000) (async) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f00000001c0)={0x0, 0x1f, &(0x7f0000000080)=[{&(0x7f00000000c0)="2e00000011008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x40840) (async) write$P9_RAUTH(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) fdatasync(r5) (async) ioctl$GIO_SCRNMAP(r3, 0x4b40, &(0x7f00000001c0)=""/176) (async) r6 = io_uring_setup(0x4d3f, &(0x7f0000000d80)={0x0, 0xca6a, 0x40, 0x2003, 0x2f8}) (async) getpeername$unix(r5, &(0x7f0000000280)=@abs, &(0x7f0000000300)=0x6e) io_uring_register$IORING_REGISTER_RESTRICTIONS(r6, 0xb, &(0x7f0000000480), 0x66) (async) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="480700000000070180040008800600dd00800a00000c00213c5330ae79527e3e02a0"], 0x48}}, 0xc000) 149.924383ms ago: executing program 7 (id=23845): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0xc, 0x40008, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, 0x2, @perf_config_ext={0x9, 0x6}, 0x0, 0x0, 0x800001, 0x7, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$usbfs(&(0x7f0000000340), 0x7, 0x20ac2) dup(r0) r1 = socket(0x2, 0x80805, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x60880, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = socket(0x25, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000380)={'xfrm0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x44, 0x2c, 0xd27, 0x70bd25, 0x25dfdbff, {0x0, 0x0, 0x0, r4, {0xfff6, 0x1}, {}, {0x8, 0x4}}, [@filter_kind_options=@f_flower={{0xb}, {0x14, 0x2, [@TCA_FLOWER_KEY_IPV4_DST={0x8, 0xc, @multicast2}, @TCA_FLOWER_KEY_ETH_TYPE={0x6, 0x8, 0x86dd}]}}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000}, 0x4010) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000001c0)={0x0, 0x0, 0x0, &(0x7f0000000140)="a5c2f900a48f98956dbaa6b4ca1b647c1c467fecf113f4", 0x7, 0xffffffffffffffff, 0x4}, 0x38) lstat(0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x161281, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="c35b809d5800fbc31541aa035e45b1fcd354f1da200869f0570fe87f81ceed3168643c00fcb7bf81619eaeb1d63d042888975ead84da68bcc3aeb17b370a678813d809fea21cad88dd27f37da01c5c3fd3965349c76443652d1bb5b7f37d18c1e7d17a48e184597ce6ccd69826a2c7cb367a17c4b88590e7bb736d8fffae6a47bab0a093e6840ef66ee976e7dc3237d925290d6d5447f612c94d221194650adb3239ba2900fc654f4c1291cbaf3209ea733fef64fa46eb4f6b74fdd2f51351"], 0x318c) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xf, "0040001e1d113c812e5d6000"}) r6 = syz_open_pts(r5, 0x0) dup3(r6, r5, 0x0) r7 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x20042400, 0x0, 0x0, 0x0, 0x0, 0x0) setpgid(r7, r7) waitid(0x2, r7, 0x0, 0x4, 0x0) wait4(0x0, 0x0, 0x20000000, &(0x7f0000000540)) ppoll(&(0x7f0000000140)=[{r5}], 0x1, 0x0, 0x0, 0x0) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000180)={0x38000, 0x8, 0x0, 0x6, 0x5, "aa32b73986bbee6bd231334cbfa0b758261a93"}) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000240)={0x0, @in6={{0xa, 0x4e22, 0x702, @mcast1, 0x6d589036}}, 0x9}, &(0x7f0000000080)=0x90) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) write$cgroup_subtree(r8, &(0x7f0000000080)=ANY=[], 0x10448) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2000001, 0x12, r8, 0xa1a30000) 110.535435ms ago: executing program 4 (id=23846): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) fdatasync(r0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) syz_io_uring_setup(0x10e, &(0x7f0000001cc0)={0x0, 0xf07d, 0x400, 0x40000, 0x101}, &(0x7f0000000400)=0x0, &(0x7f0000000380)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0xa0, 0x30000, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0xa}, 0x0, 0x10004, 0x0, 0x6, 0xb, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r3 = getpid() r4 = syz_pidfd_open(r3, 0x0) r5 = pidfd_getfd(r4, r4, 0x0) setns(r5, 0x66020000) syz_clone(0x498144ee5f62e149, 0x0, 0x17, 0x0, 0x0, 0x0) 109.652295ms ago: executing program 6 (id=23847): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000400)='kfree\x00', r1, 0x0, 0x8}, 0x18) r2 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x6) symlinkat(&(0x7f0000000400)='./file0/../file0\x00', r3, &(0x7f0000000080)='./file0\x00') readlinkat(r3, &(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000780)=""/198, 0xc6) 108.988505ms ago: executing program 9 (id=23848): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x4, 0x8, &(0x7f00000009c0)=ANY=[@ANYRESDEC], &(0x7f0000000100)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) r1 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r1, &(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x3, {0x42, 0x2, 0xfffffffd}}, 0x10) bind$tipc(r1, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x0, 0x2}}, 0x10) r2 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000100)={0x42, 0x2, 0x2}, 0x10) sendmsg$tipc(r2, &(0x7f0000002340)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x42, 0x4, 0x4}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8800}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0900000004000000dd000000b88f1ed1a50a00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0x14, &(0x7f0000000400)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) r4 = perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0xfe, 0x0, 0xff, 0x0, 0x2, 0x5022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x2, 0x0, 0x0, 0x3, 0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='kfree\x00', r5}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) close(r4) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) shmat(0x0, &(0x7f0000001000/0x3000)=nil, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0x4}, 0x18) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r6}, 0x10) syz_io_uring_setup(0x111, &(0x7f0000000340)={0x0, 0x0, 0x2, 0x4}, 0x0, 0x0) accept(r3, &(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private0}}}, &(0x7f0000000400)=0x80) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r8, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x4e21, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x9}]}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp6_SCTP_MAX_BURST(r8, 0x84, 0x83, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r7, 0x84, 0x7d, &(0x7f0000000080)={r10, 0x8}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r8, 0x84, 0x23, &(0x7f0000000640)={r9, 0x2401}, 0x8) 82.108036ms ago: executing program 8 (id=23849): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000000100000100000028"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x8, &(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRES32=r1], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWSET={0x5c, 0x9, 0xa, 0x401, 0x0, 0x0, {0x7}, [@NFTA_SET_ID={0x8}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x21}, @NFTA_SET_EXPR={0x20, 0x11, 0x0, 0x1, @limit={{0xa}, @val={0x10, 0x2, 0x0, 0x1, [@NFTA_LIMIT_RATE={0xc, 0x1, 0x1, 0x0, 0x101}]}}}]}, @NFT_MSG_NEWSETELEM={0x38, 0xc, 0xa, 0x101, 0x0, 0x0, {0x7}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0xc, 0x3, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x4}]}]}]}], {0x14, 0x10, 0x1, 0x0, 0x0, {0x0, 0x84}}}, 0xbc}}, 0x0) 67.481307ms ago: executing program 6 (id=23850): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xf, &(0x7f0000000700)=ANY=[@ANYRESOCT=r0, @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014fa0000b7030000000008008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b70200000000000085000000840000fd00b70000000020000095", @ANYRES8=r0], &(0x7f0000000300)='syzkaller\x00', 0x9, 0x0, 0x0, 0x40f00, 0x7b, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x52, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, 0x0, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000380)=ANY=[@ANYRESOCT=r2, @ANYRES64=r1], 0x57) r3 = socket$netlink(0x10, 0x3, 0x0) prlimit64(0x0, 0x8, &(0x7f0000000000)={0xfffffffffffffffb, 0xfffffffffffffffc}, 0x0) getrlimit(0xe, &(0x7f0000000440)) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f0850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r4}, 0x18) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) writev(r5, &(0x7f00000025c0)=[{&(0x7f0000000240)='4', 0x1}, {0x0, 0x900}], 0x2) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffc0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb0100180000000000000034000019340000000c0000000400000002000084fdffffff0a00000002000000e26900000100000005000000040000000000000000000001050000002000000000"], 0x0, 0x58}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000100)='sched_switch\x00', r6, 0x0, 0x2}, 0x18) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYRES8, @ANYRES32=r3, @ANYRES32, @ANYRES16], 0x10c}, 0x1, 0x0, 0x0, 0x8000}, 0x804) r7 = syz_open_dev$usbfs(&(0x7f0000000240), 0xb, 0x101301) ioctl$USBDEVFS_SETCONFIGURATION(r7, 0x80045505, &(0x7f0000000000)=0x1) 58.825247ms ago: executing program 8 (id=23851): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x4, 0xdd, 0xa}, 0x50) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0x4}, 0x18) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r2}, 0x10) syz_io_uring_setup(0x111, &(0x7f0000000340)={0x0, 0x0, 0x2, 0x4}, 0x0, 0x0) 0s ago: executing program 6 (id=23852): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x110e22fff6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000380)={'syzkaller0\x00', 0x0}) syz_open_dev$evdev(0x0, 0x0, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0xffe0}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newtfilter={0x88, 0x2c, 0xd27, 0x70bd25, 0x2, {0x0, 0x0, 0x0, r3, {0x8, 0x1}, {}, {0x8, 0x6}}, [@filter_kind_options=@f_flow={{0x9}, {0x58, 0x2, [@TCA_FLOW_ACT={0x54, 0x9, 0x0, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x1, 0x4000000, 0x20000001, 0x4, 0x2}, 0x1, r3}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}]}]}}]}, 0x88}, 0x1, 0x0, 0x0, 0x4000}, 0x0) kernel console output (not intermixed with test programs): Not using interface batadv_slave_1 (retrying later): interface not active [ 1011.132893][ T605] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1011.161085][ T1318] hsr_slave_0: entered promiscuous mode [ 1011.167271][ T1318] hsr_slave_1: entered promiscuous mode [ 1011.187898][ T605] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1011.199989][ T1359] netlink: 'syz.8.22023': attribute type 2 has an invalid length. [ 1011.236515][ T605] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1011.301653][ T605] bridge_slave_1: left allmulticast mode [ 1011.307652][ T605] bridge_slave_1: left promiscuous mode [ 1011.313567][ T605] bridge0: port 2(bridge_slave_1) entered disabled state [ 1011.322735][ T605] bridge_slave_0: left allmulticast mode [ 1011.328492][ T605] bridge_slave_0: left promiscuous mode [ 1011.334263][ T605] bridge0: port 1(bridge_slave_0) entered disabled state [ 1011.347483][ T1369] bpf: Bad value for 'uid' [ 1011.424178][ T605] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1011.433989][ T605] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1011.443533][ T605] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 1011.452647][ T605] bond0 (unregistering): Released all slaves [ 1011.501528][ T605] hsr_slave_0: left promiscuous mode [ 1011.507351][ T605] hsr_slave_1: left promiscuous mode [ 1011.512984][ T605] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1011.520455][ T605] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1011.527991][ T605] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1011.535403][ T605] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1011.543122][ T605] batman_adv: batadv0: Interface deactivated: macvlan3 [ 1011.550082][ T605] batman_adv: batadv0: Removing interface: macvlan3 [ 1011.558933][ T605] batadv_slave_1: left promiscuous mode [ 1011.564712][ T605] veth1_macvtap: left promiscuous mode [ 1011.570229][ T605] veth0_macvtap: left promiscuous mode [ 1011.575957][ T605] veth1_vlan: left promiscuous mode [ 1011.581290][ T605] veth0_vlan: left promiscuous mode [ 1011.654469][ T605] team0 (unregistering): Port device team_slave_1 removed [ 1011.664577][ T605] team0 (unregistering): Port device team_slave_0 removed [ 1011.784648][ T1385] tipc: Started in network mode [ 1011.789671][ T1385] tipc: Node identity ac14140f, cluster identity 4711 [ 1011.796668][ T1385] tipc: New replicast peer: 255.255.255.255 [ 1011.802699][ T1385] tipc: Enabled bearer , priority 10 [ 1011.923980][ T1395] 8021q: adding VLAN 0 to HW filter on device macvlan0 [ 1011.950713][ T1399] __nla_validate_parse: 2 callbacks suppressed [ 1011.950768][ T1399] netlink: 3 bytes leftover after parsing attributes in process `syz.4.22037'. [ 1011.954842][ T1398] netlink: 76 bytes leftover after parsing attributes in process `syz.9.22036'. [ 1011.983109][ T1399] 0X: renamed from 61X [ 1011.989961][ T1399] A link change request failed with some changes committed already. Interface 60X may have been left with an inconsistent configuration, please check. [ 1012.113271][ T1410] can0: slcan on ptm0. [ 1012.127408][ T1410] netlink: 'syz.9.22041': attribute type 4 has an invalid length. [ 1012.141788][ T1410] netlink: 'syz.9.22041': attribute type 4 has an invalid length. [ 1012.162511][ T1410] netlink: 14 bytes leftover after parsing attributes in process `syz.9.22041'. [ 1012.182910][ T1410] hsr_slave_0: left promiscuous mode [ 1012.199555][ T1412] netlink: 14 bytes leftover after parsing attributes in process `syz.4.22042'. [ 1012.209009][ T1412] hsr_slave_0: left promiscuous mode [ 1012.215068][ T1412] hsr_slave_1: left promiscuous mode [ 1012.298415][ T1423] can1: slcan on ptm1. [ 1012.337073][ T1318] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 1012.347719][ T1318] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 1012.357448][ T1318] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 1012.364440][ T1423] SELinux: failed to load policy [ 1012.371253][ T1318] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 1012.383347][ T1409] can0 (unregistered): slcan off ptm0. [ 1012.429917][ T1438] netlink: 3 bytes leftover after parsing attributes in process `syz.4.22050'. [ 1012.430031][ T1318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1012.439478][ T1423] can1 (unregistered): slcan off ptm1. [ 1012.450811][ T1318] 8021q: adding VLAN 0 to HW filter on device team0 [ 1012.458496][ T1438] 1X: renamed from 60X [ 1012.465767][ T1438] A link change request failed with some changes committed already. Interface 61X may have been left with an inconsistent configuration, please check. [ 1012.489035][ T605] bridge0: port 1(bridge_slave_0) entered blocking state [ 1012.496121][ T605] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1012.512768][ T605] bridge0: port 2(bridge_slave_1) entered blocking state [ 1012.519946][ T605] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1012.649194][ T1318] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1012.753906][ T29] kauditd_printk_skb: 226 callbacks suppressed [ 1012.753920][ T29] audit: type=1326 audit(2000000190.297:113243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1460 comm="syz.6.22058" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32f779f749 code=0x7ffc0000 [ 1012.784144][ T29] audit: type=1326 audit(2000000190.307:113244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1460 comm="syz.6.22058" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32f779f749 code=0x7ffc0000 [ 1012.867442][ T1483] bpf: Bad value for 'uid' [ 1012.878085][T32030] tipc: Node number set to 2886997007 [ 1012.891599][ T1318] veth0_vlan: entered promiscuous mode [ 1012.899835][ T1318] veth1_vlan: entered promiscuous mode [ 1012.935549][ T1318] veth0_macvtap: entered promiscuous mode [ 1012.943355][ T1318] veth1_macvtap: entered promiscuous mode [ 1012.954038][ T1318] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1012.967002][ T1318] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1012.978104][ T635] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1012.995029][ T635] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1013.005675][ T635] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1013.015933][ T635] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1013.050462][ T1488] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=45 sclass=netlink_audit_socket pid=1488 comm=syz.7.22014 [ 1013.519892][ T29] audit: type=1326 audit(2000000191.105:113245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1530 comm="syz.6.22074" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32f779f749 code=0x7ffc0000 [ 1013.578728][ T1536] program syz.4.22076 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1013.591195][ T29] audit: type=1326 audit(2000000191.126:113246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1530 comm="syz.6.22074" exe="/root/syz-executor" sig=0 arch=c000003e syscall=37 compat=0 ip=0x7f32f779f749 code=0x7ffc0000 [ 1013.615159][ T29] audit: type=1326 audit(2000000191.126:113247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1530 comm="syz.6.22074" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32f779f749 code=0x7ffc0000 [ 1013.638915][ T29] audit: type=1326 audit(2000000191.126:113248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1530 comm="syz.6.22074" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32f779f749 code=0x7ffc0000 [ 1013.662714][ T29] audit: type=1326 audit(2000000191.137:113249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1530 comm="syz.6.22074" exe="/root/syz-executor" sig=0 arch=c000003e syscall=437 compat=0 ip=0x7f32f779f749 code=0x7ffc0000 [ 1013.686378][ T29] audit: type=1326 audit(2000000191.137:113250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1530 comm="syz.6.22074" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32f779f749 code=0x7ffc0000 [ 1013.710193][ T29] audit: type=1326 audit(2000000191.137:113251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1530 comm="syz.6.22074" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32f779f749 code=0x7ffc0000 [ 1013.734212][ T29] audit: type=1326 audit(2000000191.137:113252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1530 comm="syz.6.22074" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f32f779f749 code=0x7ffc0000 [ 1013.786830][ T1538] program syz.6.22077 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1013.906549][ T1552] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 1014.085615][ T1575] bpf: Bad value for 'uid' [ 1014.107602][ T1577] can0: slcan on ptm0. [ 1014.142395][ T1577] SELinux: failed to load policy [ 1014.249563][ T1577] can0 (unregistered): slcan off ptm0. [ 1014.295385][ T1582] netlink: 14 bytes leftover after parsing attributes in process `syz.7.22088'. [ 1014.308551][ T1582] hsr_slave_0: left promiscuous mode [ 1014.314621][ T1582] hsr_slave_1: left promiscuous mode [ 1015.261039][ T1670] netlink: 3 bytes leftover after parsing attributes in process `syz.6.22119'. [ 1015.272010][ T1670] 0X: renamed from caif0 [ 1015.278406][ T1670] 0X: entered allmulticast mode [ 1015.283629][ T1670] A link change request failed with some changes committed already. Interface 60X may have been left with an inconsistent configuration, please check. [ 1015.360063][ T1680] FAULT_INJECTION: forcing a failure. [ 1015.360063][ T1680] name failslab, interval 1, probability 0, space 0, times 0 [ 1015.372981][ T1680] CPU: 0 UID: 0 PID: 1680 Comm: syz.8.22123 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1015.373016][ T1680] Tainted: [W]=WARN [ 1015.373023][ T1680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1015.373110][ T1680] Call Trace: [ 1015.373188][ T1680] [ 1015.373195][ T1680] __dump_stack+0x1d/0x30 [ 1015.373216][ T1680] dump_stack_lvl+0xe8/0x140 [ 1015.373237][ T1680] dump_stack+0x15/0x1b [ 1015.373253][ T1680] should_fail_ex+0x265/0x280 [ 1015.373326][ T1680] should_failslab+0x8c/0xb0 [ 1015.373352][ T1680] kmem_cache_alloc_noprof+0x50/0x480 [ 1015.373377][ T1680] ? skb_clone+0x151/0x1f0 [ 1015.373395][ T1680] skb_clone+0x151/0x1f0 [ 1015.373480][ T1680] __netlink_deliver_tap+0x2c9/0x500 [ 1015.373506][ T1680] netlink_unicast+0x66b/0x690 [ 1015.373534][ T1680] netlink_sendmsg+0x58b/0x6b0 [ 1015.373559][ T1680] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1015.373597][ T1680] __sock_sendmsg+0x145/0x180 [ 1015.373620][ T1680] ____sys_sendmsg+0x31e/0x4e0 [ 1015.373639][ T1680] ___sys_sendmsg+0x17b/0x1d0 [ 1015.373667][ T1680] __x64_sys_sendmsg+0xd4/0x160 [ 1015.373772][ T1680] x64_sys_call+0x191e/0x3000 [ 1015.373793][ T1680] do_syscall_64+0xd2/0x200 [ 1015.373875][ T1680] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1015.373910][ T1680] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1015.373962][ T1680] RIP: 0033:0x7f096abaf749 [ 1015.373978][ T1680] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1015.373994][ T1680] RSP: 002b:00007f0969617038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1015.374016][ T1680] RAX: ffffffffffffffda RBX: 00007f096ae05fa0 RCX: 00007f096abaf749 [ 1015.374031][ T1680] RDX: 0000000020000000 RSI: 0000200000000600 RDI: 000000000000000a [ 1015.374045][ T1680] RBP: 00007f0969617090 R08: 0000000000000000 R09: 0000000000000000 [ 1015.374060][ T1680] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1015.374099][ T1680] R13: 00007f096ae06038 R14: 00007f096ae05fa0 R15: 00007ffeab1859e8 [ 1015.374119][ T1680] [ 1015.374156][ T1680] netlink: 14 bytes leftover after parsing attributes in process `syz.8.22123'. [ 1015.505878][ T1697] bpf: Bad value for 'uid' [ 1015.593302][ T1680] hsr_slave_0: left promiscuous mode [ 1015.599016][ T1680] hsr_slave_1: left promiscuous mode [ 1015.608982][ T1700] tipc: Enabling of bearer rejected, already enabled [ 1015.674078][ T1706] can0: slcan on ptm0. [ 1015.709099][ T1706] SELinux: failed to load policy [ 1015.763769][ T1705] can0 (unregistered): slcan off ptm0. [ 1015.781194][ T1714] netlink: 3 bytes leftover after parsing attributes in process `syz.8.22135'. [ 1015.790306][ T1714] 0X: renamed from 61X [ 1015.797518][ T1714] A link change request failed with some changes committed already. Interface 60X may have been left with an inconsistent configuration, please check. [ 1015.863874][ T1721] netlink: 8 bytes leftover after parsing attributes in process `syz.8.22138'. [ 1016.074977][ T1756] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1016.113761][ T1760] bpf: Bad value for 'uid' [ 1016.169897][ T1764] SELinux: failed to load policy [ 1016.299885][ T1774] tipc: Started in network mode [ 1016.304831][ T1774] tipc: Node identity ac14140f, cluster identity 4711 [ 1016.311916][ T1774] tipc: New replicast peer: 255.255.255.255 [ 1016.317947][ T1774] tipc: Enabled bearer , priority 10 [ 1016.371903][ T1776] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 1016.578789][ T1820] tipc: Enabling of bearer rejected, already enabled [ 1016.633153][ T1828] can0: slcan on ptm1. [ 1016.640495][ T1828] netlink: 'syz.4.22172': attribute type 4 has an invalid length. [ 1016.654941][ T1828] netlink: 'syz.4.22172': attribute type 4 has an invalid length. [ 1016.699772][ T1836] program syz.9.22176 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1016.726090][ T1827] can0 (unregistered): slcan off ptm1. [ 1016.749010][ T1846] program syz.9.22181 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1016.883067][ T1878] program syz.7.22192 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1016.954053][ T1888] __nla_validate_parse: 1 callbacks suppressed [ 1016.954068][ T1888] netlink: 14 bytes leftover after parsing attributes in process `syz.7.22194'. [ 1017.029285][ T1902] program syz.6.22201 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1017.134193][ T1920] bpf: Bad value for 'uid' [ 1017.198244][ T1934] netlink: 3 bytes leftover after parsing attributes in process `syz.8.22215'. [ 1017.207740][ T1934] 1X: renamed from 60X [ 1017.216435][ T1937] program syz.4.22216 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1017.226373][ T1934] A link change request failed with some changes committed already. Interface 61X may have been left with an inconsistent configuration, please check. [ 1017.276486][ T1941] SELinux: security_context_str_to_sid (VWW) failed with errno=-22 [ 1017.383253][T27826] tipc: Node number set to 2886997007 [ 1017.420410][ T1953] bpf: Bad value for 'uid' [ 1017.441821][ T1955] 9p: Unknown Cache mode or invalid value mmap [ 1017.478070][ T1961] serio: Serial port ptm2 [ 1017.703454][ T1968] program syz.8.22229 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1017.766072][ T1970] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 1017.914716][ T1982] bpf: Bad value for 'uid' [ 1017.978833][ T1986] SELinux: security_context_str_to_sid (VWW) failed with errno=-22 [ 1018.192054][ T29] kauditd_printk_skb: 152 callbacks suppressed [ 1018.192118][ T29] audit: type=1326 audit(2000000196.008:113405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2000 comm="syz.9.22241" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1018.222407][ T29] audit: type=1326 audit(2000000196.008:113406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2000 comm="syz.9.22241" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1018.222436][ T29] audit: type=1326 audit(2000000196.008:113407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2000 comm="syz.9.22241" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1018.222459][ T29] audit: type=1326 audit(2000000196.008:113408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2000 comm="syz.9.22241" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1018.222523][ T29] audit: type=1326 audit(2000000196.008:113409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2000 comm="syz.9.22241" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1018.222549][ T29] audit: type=1326 audit(2000000196.008:113410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2000 comm="syz.9.22241" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1018.222625][ T29] audit: type=1326 audit(2000000196.008:113411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2000 comm="syz.9.22241" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1018.222647][ T29] audit: type=1326 audit(2000000196.008:113412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2000 comm="syz.9.22241" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1018.222672][ T29] audit: type=1326 audit(2000000196.008:113413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2000 comm="syz.9.22241" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1018.222700][ T29] audit: type=1326 audit(2000000196.008:113414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2000 comm="syz.9.22241" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fe987b3df90 code=0x7ffc0000 [ 1018.543994][ T2024] bpf: Bad value for 'uid' [ 1018.809370][ T2046] program syz.6.22256 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1019.076527][ T2059] sch_tbf: burst 19872 is lower than device lo mtu (11337746) ! [ 1019.193200][ T2073] bpf: Bad value for 'uid' [ 1019.493314][ T2091] netlink: 76 bytes leftover after parsing attributes in process `syz.8.22272'. [ 1019.616012][ T2097] program syz.7.22275 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1019.660513][ T2100] SELinux: failed to load policy [ 1019.780233][ T2127] bpf: Bad value for 'uid' [ 1020.002002][ T2166] sch_tbf: burst 19872 is lower than device lo mtu (11337746) ! [ 1020.158329][ T2175] program syz.7.22305 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1020.865522][ T2220] netlink: 14 bytes leftover after parsing attributes in process `syz.6.22320'. [ 1020.891169][ T2228] netlink: 3 bytes leftover after parsing attributes in process `syz.9.22324'. [ 1020.892349][ T2220] hsr_slave_0: left promiscuous mode [ 1020.909257][ T2220] hsr_slave_1: left promiscuous mode [ 1020.921737][ T2228] 1X: renamed from 60X [ 1020.929666][ T2228] A link change request failed with some changes committed already. Interface 61X may have been left with an inconsistent configuration, please check. [ 1021.053557][ T2239] sch_tbf: burst 19872 is lower than device lo mtu (11337746) ! [ 1021.075810][ T2237] 9p: Unknown Cache mode or invalid value mmap [ 1021.399941][ T2288] netlink: 'syz.7.22345': attribute type 4 has an invalid length. [ 1021.410555][ T2288] netlink: 'syz.7.22345': attribute type 4 has an invalid length. [ 1022.263764][ T2341] bpf: Bad value for 'uid' [ 1022.620880][ T2354] bpf: Bad value for 'uid' [ 1022.831624][ T2381] program syz.8.22375 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1022.865435][ T2383] netlink: 'syz.9.22376': attribute type 4 has an invalid length. [ 1022.919570][ T2387] can0: slcan on ptm0. [ 1022.938508][ T2387] netlink: 'syz.8.22377': attribute type 4 has an invalid length. [ 1023.003658][ T2386] can0 (unregistered): slcan off ptm0. [ 1023.079607][ T2402] program syz.8.22385 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1023.107956][ T2406] bpf: Bad value for 'uid' [ 1023.162837][ T29] kauditd_printk_skb: 59 callbacks suppressed [ 1023.162854][ T29] audit: type=1326 audit(2000000201.225:113474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2413 comm="syz.9.22390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1023.192840][ T29] audit: type=1326 audit(2000000201.225:113475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2413 comm="syz.9.22390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1023.216602][ T29] audit: type=1326 audit(2000000201.225:113476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2413 comm="syz.9.22390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1023.240630][ T2416] netlink: 'syz.8.22389': attribute type 4 has an invalid length. [ 1023.263278][ T29] audit: type=1326 audit(2000000201.309:113477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2413 comm="syz.9.22390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1023.287323][ T29] audit: type=1326 audit(2000000201.309:113478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2413 comm="syz.9.22390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1023.311111][ T29] audit: type=1326 audit(2000000201.320:113479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2413 comm="syz.9.22390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1023.334885][ T29] audit: type=1326 audit(2000000201.320:113480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2413 comm="syz.9.22390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1023.358742][ T29] audit: type=1326 audit(2000000201.320:113481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2413 comm="syz.9.22390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1023.382536][ T29] audit: type=1326 audit(2000000201.320:113482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2413 comm="syz.9.22390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=209 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1023.406376][ T29] audit: type=1326 audit(2000000201.320:113483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2413 comm="syz.9.22390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1023.593384][ T2439] program syz.9.22400 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1023.873059][ T2474] program syz.8.22414 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1024.060145][ T2482] can0: slcan on ptm0. [ 1024.078689][ T2482] netlink: 'syz.8.22416': attribute type 4 has an invalid length. [ 1024.101832][ T2482] netlink: 'syz.8.22416': attribute type 4 has an invalid length. [ 1024.175017][ T2481] can0 (unregistered): slcan off ptm0. [ 1024.241911][ T2486] bpf: Bad value for 'uid' [ 1024.458430][ T2494] netlink: 76 bytes leftover after parsing attributes in process `syz.7.22421'. [ 1024.596141][ T2503] can0: slcan on ptm1. [ 1024.602645][ T2501] bpf: Bad value for 'uid' [ 1024.641670][ T2499] can0 (unregistered): slcan off ptm1. [ 1024.752560][ T2526] program syz.8.22434 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1024.845253][ T2533] can0: slcan on ptm1. [ 1024.851498][ T2533] netlink: 'syz.8.22436': attribute type 4 has an invalid length. [ 1024.865107][ T2533] netlink: 'syz.8.22436': attribute type 4 has an invalid length. [ 1024.928261][ T2532] can0 (unregistered): slcan off ptm1. [ 1024.954346][ T2536] bpf: Bad value for 'uid' [ 1024.968890][ T2538] can0: slcan on ptm1. [ 1025.013174][ T2537] can0 (unregistered): slcan off ptm1. [ 1025.034972][ T2540] can0: slcan on ptm1. [ 1025.050107][ T2540] netlink: 'syz.8.22439': attribute type 4 has an invalid length. [ 1025.075571][ T2540] netlink: 'syz.8.22439': attribute type 4 has an invalid length. [ 1025.104963][ T2540] netlink: 14 bytes leftover after parsing attributes in process `syz.8.22439'. [ 1025.155969][ T2539] can0 (unregistered): slcan off ptm1. [ 1025.249967][ T2550] netlink: 3 bytes leftover after parsing attributes in process `syz.8.22443'. [ 1025.259227][ T2550] 0X: renamed from 61X [ 1025.266601][ T2550] A link change request failed with some changes committed already. Interface 60X may have been left with an inconsistent configuration, please check. [ 1025.301845][ T2554] 9pnet_fd: Insufficient options for proto=fd [ 1025.442225][ T2570] SELinux: failed to load policy [ 1025.469863][ T2578] bpf: Bad value for 'uid' [ 1025.515791][ T2581] can0: slcan on ptm0. [ 1025.548536][ T2580] can0 (unregistered): slcan off ptm0. [ 1025.585556][ T2590] 9pnet_fd: Insufficient options for proto=fd [ 1025.743572][ T2614] program syz.4.22469 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1025.794944][ T2621] bpf: Bad value for 'uid' [ 1025.954257][ T2633] can0: slcan on ptm2. [ 1025.967025][ T2633] netlink: 'syz.7.22476': attribute type 4 has an invalid length. [ 1026.051638][ T2632] can0 (unregistered): slcan off ptm2. [ 1026.091468][ T2637] can0: slcan on ptm2. [ 1026.165595][ T2636] can0 (unregistered): slcan off ptm2. [ 1026.260612][ T2647] SELinux: failed to load policy [ 1026.285462][ T2651] can0: slcan on ptm3. [ 1026.318421][ T2650] can0 (unregistered): slcan off ptm3. [ 1026.548320][ T2674] netlink: 28 bytes leftover after parsing attributes in process `syz.8.22492'. [ 1026.557439][ T2674] netlink: 32 bytes leftover after parsing attributes in process `syz.8.22492'. [ 1026.566788][ T2674] netlink: 28 bytes leftover after parsing attributes in process `syz.8.22492'. [ 1026.668434][ T2683] can0: slcan on ptm0. [ 1026.718198][ T2682] can0 (unregistered): slcan off ptm0. [ 1026.826027][ T2697] can0: slcan on ptm1. [ 1026.870429][ T2696] can0 (unregistered): slcan off ptm1. [ 1026.909963][ T2700] SELinux: failed to load policy [ 1026.939394][ T2704] serio: Serial port ptm1 [ 1027.104514][ T2708] SELinux: failed to load policy [ 1027.147297][ T2714] netlink: 3 bytes leftover after parsing attributes in process `syz.7.22507'. [ 1027.156627][ T2714] 0X: renamed from caif0 [ 1027.167728][ T2714] 0X: entered allmulticast mode [ 1027.172948][ T2714] A link change request failed with some changes committed already. Interface 60X may have been left with an inconsistent configuration, please check. [ 1027.243778][ T2720] can0: slcan on ptm2. [ 1027.290253][ T2719] can0 (unregistered): slcan off ptm2. [ 1027.331190][ T2732] bpf: Bad value for 'uid' [ 1027.432824][ T2731] 9p: Unknown Cache mode or invalid value mmap [ 1027.454645][ T2739] SELinux: failed to load policy [ 1027.640794][ T2754] 9p: Unknown Cache mode or invalid value mmap [ 1027.710584][ T2758] sch_tbf: burst 19872 is lower than device lo mtu (11337746) ! [ 1027.815872][ T2766] can0: slcan on ptm0. [ 1027.820770][ T2766] validate_nla: 10 callbacks suppressed [ 1027.820786][ T2766] netlink: 'syz.4.22527': attribute type 4 has an invalid length. [ 1027.840460][ T2766] netlink: 'syz.4.22527': attribute type 4 has an invalid length. [ 1027.889784][ T2765] can0 (unregistered): slcan off ptm0. [ 1027.968079][ T2786] can0: slcan on ptm0. [ 1027.972717][ T2786] netlink: 'syz.4.22533': attribute type 4 has an invalid length. [ 1028.014020][ T2785] can0 (unregistered): slcan off ptm0. [ 1028.205844][ T2796] can0: slcan on ptm0. [ 1028.210968][ T2796] netlink: 'syz.6.22536': attribute type 4 has an invalid length. [ 1028.239750][ T2796] netlink: 'syz.6.22536': attribute type 4 has an invalid length. [ 1028.289927][ T2793] can0 (unregistered): slcan off ptm0. [ 1028.380197][ T2806] can0: slcan on ptm0. [ 1028.404546][ T2806] netlink: 'syz.7.22541': attribute type 4 has an invalid length. [ 1028.425215][ T2806] netlink: 'syz.7.22541': attribute type 4 has an invalid length. [ 1028.480771][ T2805] can0 (unregistered): slcan off ptm0. [ 1028.810664][ T2833] bpf: Bad value for 'uid' [ 1028.816356][ T29] kauditd_printk_skb: 111 callbacks suppressed [ 1028.816369][ T29] audit: type=1326 audit(2000000207.167:113595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2829 comm="syz.8.22547" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f096abaf749 code=0x0 [ 1028.874042][ T2836] 9p: Unknown Cache mode or invalid value mmap [ 1028.891462][ T2839] SELinux: security_context_str_to_sid (VWW) failed with errno=-22 [ 1029.082142][ T2846] SELinux: security_context_str_to_sid (VWW) failed with errno=-22 [ 1029.365536][ T2871] bpf: Bad value for 'uid' [ 1029.425659][ T29] audit: type=1326 audit(2000000207.807:113596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2876 comm="syz.4.22562" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6cb4a4f749 code=0x7ffc0000 [ 1029.464995][ T29] audit: type=1326 audit(2000000207.807:113597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2876 comm="syz.4.22562" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6cb4a4f749 code=0x7ffc0000 [ 1029.488744][ T29] audit: type=1326 audit(2000000207.807:113598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2876 comm="syz.4.22562" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6cb4a4f749 code=0x7ffc0000 [ 1029.512658][ T29] audit: type=1326 audit(2000000207.807:113599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2876 comm="syz.4.22562" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6cb4a4f749 code=0x7ffc0000 [ 1029.536410][ T29] audit: type=1326 audit(2000000207.807:113600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2876 comm="syz.4.22562" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6cb4a4f749 code=0x7ffc0000 [ 1029.540594][ T2873] 9p: Unknown Cache mode or invalid value mmap [ 1029.560161][ T29] audit: type=1326 audit(2000000207.807:113601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2876 comm="syz.4.22562" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6cb4a4f749 code=0x7ffc0000 [ 1029.590222][ T29] audit: type=1326 audit(2000000207.807:113602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2876 comm="syz.4.22562" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f6cb4a4f749 code=0x7ffc0000 [ 1029.614013][ T29] audit: type=1326 audit(2000000207.807:113603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2876 comm="syz.4.22562" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6cb4a4f749 code=0x7ffc0000 [ 1029.638073][ T29] audit: type=1326 audit(2000000207.807:113604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2876 comm="syz.4.22562" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f6cb4a4df90 code=0x7ffc0000 [ 1029.720812][ T2893] netlink: 3 bytes leftover after parsing attributes in process `syz.4.22567'. [ 1029.730685][ T2893] 0X: renamed from 61X [ 1029.738881][ T2893] A link change request failed with some changes committed already. Interface 60X may have been left with an inconsistent configuration, please check. [ 1029.808205][ T2899] SELinux: failed to load policy [ 1030.716132][ T2943] bpf: Bad value for 'uid' [ 1030.887639][ T2946] can0: slcan on ptm0. [ 1030.893624][ T2946] netlink: 'syz.9.22585': attribute type 4 has an invalid length. [ 1030.902693][ T2946] netlink: 'syz.9.22585': attribute type 4 has an invalid length. [ 1030.957290][ T2945] can0 (unregistered): slcan off ptm0. [ 1030.989794][ T2952] program syz.8.22587 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1031.041038][ T2960] netlink: 'syz.4.22591': attribute type 4 has an invalid length. [ 1031.149848][ T2979] SELinux: failed to load policy [ 1031.277946][ T2984] 9p: Unknown Cache mode or invalid value mmap [ 1031.963477][ T3047] syzkaller0: entered promiscuous mode [ 1031.969006][ T3047] syzkaller0: entered allmulticast mode [ 1032.127504][ T3053] netlink: 12 bytes leftover after parsing attributes in process `syz.9.22627'. [ 1032.138346][ T3053] netlink: 144 bytes leftover after parsing attributes in process `syz.9.22627'. [ 1032.511349][ T3079] can0: slcan on ptm0. [ 1032.550056][ T3082] serio: Serial port ptm1 [ 1032.604906][ T3078] can0 (unregistered): slcan off ptm0. [ 1033.089466][ T3108] can0: slcan on ptm0. [ 1033.095066][ T3108] validate_nla: 7 callbacks suppressed [ 1033.095079][ T3108] netlink: 'syz.4.22648': attribute type 4 has an invalid length. [ 1033.109833][ T3108] netlink: 'syz.4.22648': attribute type 4 has an invalid length. [ 1033.167408][ T3107] can0 (unregistered): slcan off ptm0. [ 1033.323474][ T3133] netlink: 3 bytes leftover after parsing attributes in process `syz.9.22658'. [ 1033.333246][ T3133] 0X: renamed from 61X [ 1033.358011][ T3133] A link change request failed with some changes committed already. Interface 60X may have been left with an inconsistent configuration, please check. [ 1033.458414][ T3144] netlink: 'syz.4.22662': attribute type 4 has an invalid length. [ 1033.472119][ T3148] SELinux: security_context_str_to_sid (VWW) failed with errno=-22 [ 1033.623933][ T3164] netlink: 3 bytes leftover after parsing attributes in process `syz.9.22672'. [ 1033.640985][ T3164] 1X: renamed from 60X [ 1033.651021][ T3164] A link change request failed with some changes committed already. Interface 61X may have been left with an inconsistent configuration, please check. [ 1033.757252][ T3181] netlink: 76 bytes leftover after parsing attributes in process `syz.7.22677'. [ 1034.017113][ T29] kauditd_printk_skb: 128 callbacks suppressed [ 1034.017128][ T29] audit: type=1326 audit(2000000212.626:113733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3199 comm="syz.7.22688" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f97f8edf749 code=0x0 [ 1034.067860][ T3206] 9p: Unknown Cache mode or invalid value mmap [ 1034.130422][ T3213] SELinux: failed to load policy [ 1034.230697][ T3228] can0: slcan on ptm1. [ 1034.241166][ T3228] netlink: 'syz.9.22695': attribute type 4 has an invalid length. [ 1034.275140][ T3228] netlink: 'syz.9.22695': attribute type 4 has an invalid length. [ 1034.336985][ T3246] bpf: Bad value for 'uid' [ 1034.357931][ T3227] can0 (unregistered): slcan off ptm1. [ 1034.610203][ T29] audit: type=1326 audit(2000000213.245:113734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3285 comm="syz.9.22715" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1034.635299][ T29] audit: type=1326 audit(2000000213.245:113735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3285 comm="syz.9.22715" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1034.659066][ T29] audit: type=1326 audit(2000000213.245:113736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3285 comm="syz.9.22715" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1034.682705][ T29] audit: type=1326 audit(2000000213.245:113737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3285 comm="syz.9.22715" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1034.706466][ T29] audit: type=1326 audit(2000000213.245:113738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3285 comm="syz.9.22715" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1034.730225][ T29] audit: type=1326 audit(2000000213.245:113739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3285 comm="syz.9.22715" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1034.754174][ T29] audit: type=1326 audit(2000000213.245:113740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3285 comm="syz.9.22715" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1034.778014][ T29] audit: type=1326 audit(2000000213.245:113741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3285 comm="syz.9.22715" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1034.801965][ T29] audit: type=1326 audit(2000000213.245:113742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3285 comm="syz.9.22715" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fe987b3df90 code=0x7ffc0000 [ 1034.843642][ T3297] program syz.4.22719 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1034.885898][ T3306] SELinux: security_context_str_to_sid (VWW) failed with errno=-22 [ 1034.914317][ T3310] can0: slcan on ptm0. [ 1034.926210][ T3310] netlink: 'syz.9.22723': attribute type 4 has an invalid length. [ 1034.934592][ T3313] 9pnet_fd: Insufficient options for proto=fd [ 1034.954768][ T3310] netlink: 'syz.9.22723': attribute type 4 has an invalid length. [ 1035.023192][ T3325] netlink: 76 bytes leftover after parsing attributes in process `syz.4.22726'. [ 1035.092264][ T3327] bridge0: port 2(bridge_slave_1) entered disabled state [ 1035.099713][ T3327] bridge0: port 1(bridge_slave_0) entered disabled state [ 1035.129717][ T3307] can0 (unregistered): slcan off ptm0. [ 1035.163585][ T3342] SELinux: security_context_str_to_sid (VWW) failed with errno=-22 [ 1035.169368][ T3327] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1035.182404][ T3327] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1035.224395][ T610] netdevsim netdevsim7 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1035.233732][ T610] netdevsim netdevsim7 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1035.244216][ T610] netdevsim netdevsim7 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1035.261628][ T3353] 9pnet_fd: Insufficient options for proto=fd [ 1035.267132][ T610] netdevsim netdevsim7 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1035.348053][ T3367] netlink: 76 bytes leftover after parsing attributes in process `syz.9.22741'. [ 1035.421822][ T3372] SELinux: failed to load policy [ 1035.520790][ T3397] program syz.9.22758 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1035.535227][ T3399] serio: Serial port ptm2 [ 1035.819529][ T3420] netlink: 28 bytes leftover after parsing attributes in process `syz.8.22763'. [ 1036.169534][ T3466] netlink: 3 bytes leftover after parsing attributes in process `syz.4.22784'. [ 1036.180314][ T3466] 1X: renamed from 60X [ 1036.196672][ T3466] A link change request failed with some changes committed already. Interface 61X may have been left with an inconsistent configuration, please check. [ 1036.267791][ T3475] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 1036.277584][ T3475] SELinux: failed to load policy [ 1036.342968][ T3479] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1036.389730][ T3479] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1036.439345][ T3479] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1036.477683][ T3479] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1036.557315][ T605] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1036.578792][ T605] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1036.610357][ T605] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1036.618801][ T605] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1036.714400][ T3499] netlink: 3 bytes leftover after parsing attributes in process `syz.4.22797'. [ 1036.733615][ T3499] 0X: renamed from 61X [ 1036.746796][ T3499] A link change request failed with some changes committed already. Interface 60X may have been left with an inconsistent configuration, please check. [ 1036.874297][ T3507] netlink: 76 bytes leftover after parsing attributes in process `syz.6.22800'. [ 1037.032091][ T3530] bpf: Bad value for 'uid' [ 1037.077063][ T3536] program syz.8.22812 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1037.794221][ T3586] FAULT_INJECTION: forcing a failure. [ 1037.794221][ T3586] name failslab, interval 1, probability 0, space 0, times 0 [ 1037.806925][ T3586] CPU: 1 UID: 0 PID: 3586 Comm: syz.4.22830 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1037.807014][ T3586] Tainted: [W]=WARN [ 1037.807021][ T3586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1037.807035][ T3586] Call Trace: [ 1037.807043][ T3586] [ 1037.807050][ T3586] __dump_stack+0x1d/0x30 [ 1037.807073][ T3586] dump_stack_lvl+0xe8/0x140 [ 1037.807128][ T3586] dump_stack+0x15/0x1b [ 1037.807144][ T3586] should_fail_ex+0x265/0x280 [ 1037.807175][ T3586] should_failslab+0x8c/0xb0 [ 1037.807204][ T3586] kmem_cache_alloc_noprof+0x50/0x480 [ 1037.807294][ T3586] ? getname_kernel+0x3c/0x1f0 [ 1037.807328][ T3586] getname_kernel+0x3c/0x1f0 [ 1037.807359][ T3586] kern_path+0x23/0x130 [ 1037.807444][ T3586] create_local_trace_uprobe+0x53/0x2c0 [ 1037.807476][ T3586] perf_uprobe_init+0xc0/0x150 [ 1037.807502][ T3586] perf_uprobe_event_init+0xc4/0x140 [ 1037.807599][ T3586] perf_try_init_event+0xd9/0x540 [ 1037.807669][ T3586] ? perf_event_alloc+0xb1c/0x1740 [ 1037.807693][ T3586] perf_event_alloc+0xb27/0x1740 [ 1037.807720][ T3586] __se_sys_perf_event_open+0x4a5/0x11c0 [ 1037.807751][ T3586] ? __rcu_read_unlock+0x4f/0x70 [ 1037.807802][ T3586] __x64_sys_perf_event_open+0x67/0x80 [ 1037.807838][ T3586] x64_sys_call+0x7bd/0x3000 [ 1037.807862][ T3586] do_syscall_64+0xd2/0x200 [ 1037.807882][ T3586] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1037.807907][ T3586] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1037.808017][ T3586] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1037.808039][ T3586] RIP: 0033:0x7f6cb4a4f749 [ 1037.808055][ T3586] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1037.808143][ T3586] RSP: 002b:00007f6cb34b7038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1037.808164][ T3586] RAX: ffffffffffffffda RBX: 00007f6cb4ca5fa0 RCX: 00007f6cb4a4f749 [ 1037.808177][ T3586] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000200000000180 [ 1037.808216][ T3586] RBP: 00007f6cb34b7090 R08: 0000000000000000 R09: 0000000000000000 [ 1037.808228][ T3586] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1037.808239][ T3586] R13: 00007f6cb4ca6038 R14: 00007f6cb4ca5fa0 R15: 00007ffd7cfea758 [ 1037.808256][ T3586] [ 1038.115037][ T3602] can0: slcan on ptm1. [ 1038.120003][ T3602] netlink: 'syz.7.22838': attribute type 4 has an invalid length. [ 1038.128730][ T3602] netlink: 'syz.7.22838': attribute type 4 has an invalid length. [ 1038.129147][ T3604] serio: Serial port ptm2 [ 1038.187232][ T3601] can0 (unregistered): slcan off ptm1. [ 1038.211738][ T3611] SELinux: security_context_str_to_sid (VWW) failed with errno=-22 [ 1038.314031][ T3622] netlink: 12 bytes leftover after parsing attributes in process `syz.6.22842'. [ 1038.411149][ T3632] can0: slcan on ptm1. [ 1038.417198][ T3632] netlink: 'syz.6.22847': attribute type 4 has an invalid length. [ 1038.425776][ T3632] netlink: 'syz.6.22847': attribute type 4 has an invalid length. [ 1038.442361][ T3634] netlink: 3 bytes leftover after parsing attributes in process `syz.7.22848'. [ 1038.451501][ T3634] 1X: renamed from 60X [ 1038.461100][ T3634] A link change request failed with some changes committed already. Interface 61X may have been left with an inconsistent configuration, please check. [ 1038.501273][ T3631] can0 (unregistered): slcan off ptm1. [ 1038.575784][ T3638] sch_tbf: burst 19872 is lower than device lo mtu (11337746) ! [ 1038.686524][ T3652] FAULT_INJECTION: forcing a failure. [ 1038.686524][ T3652] name failslab, interval 1, probability 0, space 0, times 0 [ 1038.699249][ T3652] CPU: 0 UID: 0 PID: 3652 Comm: syz.6.22854 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1038.699282][ T3652] Tainted: [W]=WARN [ 1038.699369][ T3652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1038.699382][ T3652] Call Trace: [ 1038.699388][ T3652] [ 1038.699396][ T3652] __dump_stack+0x1d/0x30 [ 1038.699420][ T3652] dump_stack_lvl+0xe8/0x140 [ 1038.699447][ T3652] dump_stack+0x15/0x1b [ 1038.699463][ T3652] should_fail_ex+0x265/0x280 [ 1038.699496][ T3652] should_failslab+0x8c/0xb0 [ 1038.699599][ T3652] kmem_cache_alloc_noprof+0x50/0x480 [ 1038.699661][ T3652] ? audit_log_start+0x342/0x720 [ 1038.699684][ T3652] audit_log_start+0x342/0x720 [ 1038.699707][ T3652] ? kstrtouint+0x76/0xc0 [ 1038.699793][ T3652] audit_seccomp+0x48/0x100 [ 1038.699853][ T3652] ? __seccomp_filter+0x82d/0x1250 [ 1038.699879][ T3652] __seccomp_filter+0x83e/0x1250 [ 1038.699913][ T3652] ? vfs_write+0x7e8/0x960 [ 1038.699989][ T3652] ? __rcu_read_unlock+0x4f/0x70 [ 1038.700016][ T3652] ? __fget_files+0x184/0x1c0 [ 1038.700045][ T3652] __secure_computing+0x82/0x150 [ 1038.700081][ T3652] syscall_trace_enter+0xcf/0x1e0 [ 1038.700172][ T3652] do_syscall_64+0xac/0x200 [ 1038.700193][ T3652] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1038.700221][ T3652] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1038.700308][ T3652] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1038.700331][ T3652] RIP: 0033:0x7f32f779f749 [ 1038.700347][ T3652] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1038.700365][ T3652] RSP: 002b:00007f32f6207038 EFLAGS: 00000246 ORIG_RAX: 000000000000010f [ 1038.700386][ T3652] RAX: ffffffffffffffda RBX: 00007f32f79f5fa0 RCX: 00007f32f779f749 [ 1038.700474][ T3652] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1038.700488][ T3652] RBP: 00007f32f6207090 R08: 0000000000000000 R09: 0000000000000000 [ 1038.700566][ T3652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1038.700579][ T3652] R13: 00007f32f79f6038 R14: 00007f32f79f5fa0 R15: 00007ffe0aa71e28 [ 1038.700598][ T3652] [ 1038.927508][ T29] kauditd_printk_skb: 80 callbacks suppressed [ 1038.927524][ T29] audit: type=1326 audit(2000000217.781:113821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3653 comm="syz.7.22855" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f97f8edf749 code=0x7ffc0000 [ 1038.958913][ T29] audit: type=1326 audit(2000000217.781:113822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3653 comm="syz.7.22855" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f97f8edf749 code=0x7ffc0000 [ 1038.982633][ T29] audit: type=1326 audit(2000000217.781:113823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3653 comm="syz.7.22855" exe="/root/syz-executor" sig=0 arch=c000003e syscall=105 compat=0 ip=0x7f97f8edf749 code=0x7ffc0000 [ 1039.006305][ T29] audit: type=1326 audit(2000000217.781:113824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3653 comm="syz.7.22855" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f97f8edf749 code=0x7ffc0000 [ 1039.030239][ T29] audit: type=1326 audit(2000000217.781:113825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3653 comm="syz.7.22855" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f97f8edf749 code=0x7ffc0000 [ 1039.109812][ T3666] netlink: 4 bytes leftover after parsing attributes in process `syz.9.22857'. [ 1039.121584][ T3666] netlink: 12 bytes leftover after parsing attributes in process `syz.9.22857'. [ 1039.190315][ T3674] bpf: Bad value for 'uid' [ 1039.504505][ T3686] can0: slcan on ptm0. [ 1039.518633][ T3686] netlink: 'syz.6.22867': attribute type 4 has an invalid length. [ 1039.544095][ T3686] netlink: 'syz.6.22867': attribute type 4 has an invalid length. [ 1039.606596][ T3685] can0 (unregistered): slcan off ptm0. [ 1039.662029][ T3697] SELinux: security_context_str_to_sid (VWW) failed with errno=-22 [ 1039.703957][ T29] audit: type=1326 audit(2000000218.599:113826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3700 comm="syz.6.22873" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32f779f749 code=0x7ffc0000 [ 1039.727777][ T29] audit: type=1326 audit(2000000218.599:113827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3700 comm="syz.6.22873" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32f779f749 code=0x7ffc0000 [ 1039.755612][ T29] audit: type=1326 audit(2000000218.652:113828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3700 comm="syz.6.22873" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f32f779f749 code=0x7ffc0000 [ 1039.779479][ T29] audit: type=1326 audit(2000000218.652:113829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3700 comm="syz.6.22873" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32f779f749 code=0x7ffc0000 [ 1039.803632][ T29] audit: type=1326 audit(2000000218.652:113830): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3700 comm="syz.6.22873" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32f779f749 code=0x7ffc0000 [ 1039.861737][ T3705] hub 1-0:1.0: USB hub found [ 1039.866597][ T3705] hub 1-0:1.0: 8 ports detected [ 1040.080792][ T3745] bpf: Bad value for 'uid' [ 1040.092165][ T3748] can0: slcan on ptm0. [ 1040.100247][ T3748] netlink: 'syz.4.22887': attribute type 4 has an invalid length. [ 1040.109224][ T3748] netlink: 'syz.4.22887': attribute type 4 has an invalid length. [ 1040.139903][ T3746] can0 (unregistered): slcan off ptm0. [ 1040.269546][ T3779] can0: slcan on ptm0. [ 1040.275652][ T3779] netlink: 'syz.4.22895': attribute type 4 has an invalid length. [ 1040.290939][ T3779] netlink: 'syz.4.22895': attribute type 4 has an invalid length. [ 1040.348357][ T3789] team0 (unregistering): Port device team_slave_0 removed [ 1040.356178][ T3789] team0 (unregistering): Port device team_slave_1 removed [ 1040.378300][ T3778] can0 (unregistered): slcan off ptm0. [ 1040.403243][ T3795] SELinux: security_context_str_to_sid (VWW) failed with errno=-22 [ 1040.434158][ T3800] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1040.523887][ T3816] netlink: 76 bytes leftover after parsing attributes in process `syz.4.22908'. [ 1040.582586][ T3827] can0: slcan on ptm0. [ 1040.614787][ T3830] serio: Serial port ptm1 [ 1040.654906][ T3826] can0 (unregistered): slcan off ptm0. [ 1040.907787][ T3847] FAULT_INJECTION: forcing a failure. [ 1040.907787][ T3847] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1040.920868][ T3847] CPU: 1 UID: 0 PID: 3847 Comm: syz.8.22924 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1040.920915][ T3847] Tainted: [W]=WARN [ 1040.920922][ T3847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1040.920933][ T3847] Call Trace: [ 1040.920940][ T3847] [ 1040.920947][ T3847] __dump_stack+0x1d/0x30 [ 1040.920975][ T3847] dump_stack_lvl+0xe8/0x140 [ 1040.920997][ T3847] dump_stack+0x15/0x1b [ 1040.921051][ T3847] should_fail_ex+0x265/0x280 [ 1040.921154][ T3847] should_fail+0xb/0x20 [ 1040.921171][ T3847] should_fail_usercopy+0x1a/0x20 [ 1040.921194][ T3847] _copy_from_user+0x1c/0xb0 [ 1040.921220][ T3847] ___sys_sendmsg+0xc1/0x1d0 [ 1040.921327][ T3847] __x64_sys_sendmsg+0xd4/0x160 [ 1040.921351][ T3847] x64_sys_call+0x191e/0x3000 [ 1040.921372][ T3847] do_syscall_64+0xd2/0x200 [ 1040.921391][ T3847] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1040.921471][ T3847] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1040.921500][ T3847] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1040.921523][ T3847] RIP: 0033:0x7f096abaf749 [ 1040.921539][ T3847] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1040.921640][ T3847] RSP: 002b:00007f0969617038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1040.921659][ T3847] RAX: ffffffffffffffda RBX: 00007f096ae05fa0 RCX: 00007f096abaf749 [ 1040.921672][ T3847] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 1040.921683][ T3847] RBP: 00007f0969617090 R08: 0000000000000000 R09: 0000000000000000 [ 1040.921695][ T3847] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1040.921772][ T3847] R13: 00007f096ae06038 R14: 00007f096ae05fa0 R15: 00007ffeab1859e8 [ 1040.921830][ T3847] [ 1041.267811][ T3853] SELinux: security_context_str_to_sid (VWW) failed with errno=-22 [ 1041.424326][ T3874] can0: slcan on ptm0. [ 1041.454764][ T3873] can0 (unregistered): slcan off ptm0. [ 1041.462619][ T3880] bpf: Bad value for 'uid' [ 1041.644844][ T3903] bpf: Bad value for 'uid' [ 1042.115374][ T3952] bpf: Bad value for 'uid' [ 1042.394588][ T3974] can0: slcan on ptm1. [ 1042.414539][ T3979] bond0: (slave dummy0): Releasing backup interface [ 1042.482558][ T3989] SELinux: security_context_str_to_sid (VWW) failed with errno=-22 [ 1042.492611][ T3972] can0 (unregistered): slcan off ptm1. [ 1042.578328][ T4004] SELinux: security_context_str_to_sid (VWW) failed with errno=-22 [ 1042.601783][ T4006] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1042.891223][ T4023] SELinux: security_context_str_to_sid (VWW) failed with errno=-22 [ 1042.938037][ T4028] 9p: Unknown Cache mode or invalid value mmap [ 1043.195181][ T4043] bpf: Bad value for 'uid' [ 1043.204745][ T4045] netlink: 92 bytes leftover after parsing attributes in process `syz.9.22996'. [ 1043.242235][ T4045] veth0_to_team: entered promiscuous mode [ 1043.259806][ T4051] bpf: Bad value for 'uid' [ 1043.320420][ T4057] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65311 sclass=netlink_route_socket pid=4057 comm=syz.9.23002 [ 1043.428067][ T4066] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1043.549002][ T4077] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1043.764237][ T4109] bpf: Bad value for 'uid' [ 1043.805591][ T29] kauditd_printk_skb: 487 callbacks suppressed [ 1043.805606][ T29] audit: type=1326 audit(2000000222.893:114318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4093 comm="syz.4.23016" exe="/root/syz-executor" sig=0 arch=c000003e syscall=60 compat=0 ip=0x7f6cb4a4f749 code=0x7ffc0000 [ 1044.207287][ T4146] netlink: 76 bytes leftover after parsing attributes in process `syz.9.23038'. [ 1044.349571][ T4162] bpf: Bad value for 'uid' [ 1044.418938][ T4180] can0: slcan on ptm0. [ 1044.493193][ T4179] can0 (unregistered): slcan off ptm0. [ 1044.515934][ T4188] SELinux: security_context_str_to_sid (VWW) failed with errno=-22 [ 1044.689468][ T4206] SELinux: security_context_str_to_sid (VWW) failed with errno=-22 [ 1044.767159][ T29] audit: type=1326 audit(2000000223.911:114319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4216 comm="syz.4.23066" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6cb4a4f749 code=0x7ffc0000 [ 1044.791101][ T29] audit: type=1326 audit(2000000223.911:114320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4216 comm="syz.4.23066" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6cb4a4f749 code=0x7ffc0000 [ 1044.814746][ T29] audit: type=1326 audit(2000000223.911:114321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4216 comm="syz.4.23066" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6cb4a4f749 code=0x7ffc0000 [ 1044.838479][ T29] audit: type=1326 audit(2000000223.911:114322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4216 comm="syz.4.23066" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6cb4a4f749 code=0x7ffc0000 [ 1044.862501][ T29] audit: type=1326 audit(2000000223.911:114323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4216 comm="syz.4.23066" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6cb4a4f749 code=0x7ffc0000 [ 1044.886203][ T29] audit: type=1326 audit(2000000223.911:114324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4216 comm="syz.4.23066" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6cb4a4f749 code=0x7ffc0000 [ 1044.909854][ T29] audit: type=1326 audit(2000000223.911:114325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4216 comm="syz.4.23066" exe="/root/syz-executor" sig=0 arch=c000003e syscall=209 compat=0 ip=0x7f6cb4a4f749 code=0x7ffc0000 [ 1044.933537][ T29] audit: type=1326 audit(2000000223.911:114326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4216 comm="syz.4.23066" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6cb4a4f749 code=0x7ffc0000 [ 1044.961843][ T4219] SELinux: security_context_str_to_sid (VWW) failed with errno=-22 [ 1045.003552][ T29] audit: type=1400 audit(2000000224.163:114327): avc: denied { setopt } for pid=4222 comm="syz.8.23069" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1045.080033][ T4229] bpf: Bad value for 'uid' [ 1045.363369][ T4260] netlink: 76 bytes leftover after parsing attributes in process `syz.8.23079'. [ 1045.501759][ T4266] sch_tbf: burst 19872 is lower than device lo mtu (11337746) ! [ 1045.622565][ T4286] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 1045.626924][ T4288] 9pnet_fd: Insufficient options for proto=fd [ 1045.648094][ T4286] SELinux: failed to load policy [ 1045.713650][ T4292] netlink: 76 bytes leftover after parsing attributes in process `syz.9.23093'. [ 1045.952398][ T4320] netlink: 3 bytes leftover after parsing attributes in process `syz.8.23105'. [ 1045.962333][ T4320] 1X: renamed from 60X [ 1045.969529][ T4320] A link change request failed with some changes committed already. Interface 61X may have been left with an inconsistent configuration, please check. [ 1045.989910][ T4321] netlink: 12 bytes leftover after parsing attributes in process `syz.9.23104'. [ 1046.030347][ T4325] can0: slcan on ptm0. [ 1046.066766][ T4327] netlink: 12 bytes leftover after parsing attributes in process `syz.8.23108'. [ 1046.076162][ T4324] can0 (unregistered): slcan off ptm0. [ 1046.190184][ T4340] serio: Serial port ptm1 [ 1046.307773][ T4350] bpf: Bad value for 'uid' [ 1046.499423][ T4354] netlink: 3 bytes leftover after parsing attributes in process `syz.8.23117'. [ 1046.521895][ T4354] 0X: renamed from 61X [ 1046.532679][ T4354] A link change request failed with some changes committed already. Interface 60X may have been left with an inconsistent configuration, please check. [ 1046.625576][ T4363] netlink: 12 bytes leftover after parsing attributes in process `syz.4.23121'. [ 1046.710142][ T4366] netlink: 12 bytes leftover after parsing attributes in process `syz.8.23120'. [ 1046.845041][ T4378] bpf: Bad value for 'uid' [ 1046.861488][ T4381] macvtap0: refused to change device tx_queue_len [ 1046.944254][ T4387] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1047.020096][ T4394] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4394 comm=syz.8.23134 [ 1047.115130][ T4408] netlink: 12 bytes leftover after parsing attributes in process `syz.8.23135'. [ 1047.151073][ T4409] netlink: 12 bytes leftover after parsing attributes in process `syz.6.23137'. [ 1047.286898][ T4421] bpf: Bad value for 'uid' [ 1047.300982][ T4423] SELinux: security_context_str_to_sid (VWW) failed with errno=-22 [ 1047.324156][ T4425] 1X: renamed from 60X [ 1047.335847][ T4425] A link change request failed with some changes committed already. Interface 61X may have been left with an inconsistent configuration, please check. [ 1047.473113][ T4447] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 1047.485866][ T4447] SELinux: failed to load policy [ 1047.527596][ T4457] SELinux: security_context_str_to_sid (VWW) failed with errno=-22 [ 1047.647295][ T4475] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1047.685171][ T4480] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 1047.693017][ T4480] SELinux: failed to load policy [ 1048.059380][ T4513] 9p: Unknown Cache mode or invalid value mmap [ 1048.332281][ T4517] can0: slcan on ptm1. [ 1048.368713][ T4517] validate_nla: 5 callbacks suppressed [ 1048.368875][ T4517] netlink: 'syz.6.23177': attribute type 4 has an invalid length. [ 1048.417731][ T4520] netlink: 'syz.6.23177': attribute type 4 has an invalid length. [ 1048.522990][ T4516] can0 (unregistered): slcan off ptm1. [ 1048.583587][ T29] kauditd_printk_skb: 111 callbacks suppressed [ 1048.583601][ T29] audit: type=1326 audit(2000000227.922:114439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4523 comm="syz.4.23180" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6cb4a4f749 code=0x7ffc0000 [ 1048.613511][ T29] audit: type=1326 audit(2000000227.922:114440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4523 comm="syz.4.23180" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6cb4a4f749 code=0x7ffc0000 [ 1048.715841][ T4531] FAULT_INJECTION: forcing a failure. [ 1048.715841][ T4531] name failslab, interval 1, probability 0, space 0, times 0 [ 1048.728635][ T4531] CPU: 1 UID: 0 PID: 4531 Comm: syz.4.23182 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1048.728672][ T4531] Tainted: [W]=WARN [ 1048.728701][ T4531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1048.728713][ T4531] Call Trace: [ 1048.728719][ T4531] [ 1048.728725][ T4531] __dump_stack+0x1d/0x30 [ 1048.728785][ T4531] dump_stack_lvl+0xe8/0x140 [ 1048.728808][ T4531] dump_stack+0x15/0x1b [ 1048.728863][ T4531] should_fail_ex+0x265/0x280 [ 1048.728898][ T4531] ? sctp_add_bind_addr+0x71/0x1e0 [ 1048.729063][ T4531] should_failslab+0x8c/0xb0 [ 1048.729095][ T4531] __kmalloc_cache_noprof+0x4c/0x4a0 [ 1048.729207][ T4531] sctp_add_bind_addr+0x71/0x1e0 [ 1048.729229][ T4531] sctp_copy_local_addr_list+0x199/0x220 [ 1048.729267][ T4531] sctp_copy_one_addr+0x7f/0x280 [ 1048.729284][ T4531] sctp_bind_addr_copy+0x79/0x290 [ 1048.729345][ T4531] sctp_assoc_set_bind_addr_from_ep+0xce/0xe0 [ 1048.729416][ T4531] sctp_connect_new_asoc+0x1c3/0x3a0 [ 1048.729444][ T4531] sctp_sendmsg+0xf10/0x18d0 [ 1048.729466][ T4531] ? selinux_socket_sendmsg+0x131/0x1b0 [ 1048.729566][ T4531] ? __pfx_sctp_sendmsg+0x10/0x10 [ 1048.729588][ T4531] inet_sendmsg+0xc5/0xd0 [ 1048.729608][ T4531] __sock_sendmsg+0x102/0x180 [ 1048.729630][ T4531] ____sys_sendmsg+0x31e/0x4e0 [ 1048.729717][ T4531] ___sys_sendmsg+0x17b/0x1d0 [ 1048.729748][ T4531] __x64_sys_sendmsg+0xd4/0x160 [ 1048.729824][ T4531] x64_sys_call+0x191e/0x3000 [ 1048.729849][ T4531] do_syscall_64+0xd2/0x200 [ 1048.729873][ T4531] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1048.729903][ T4531] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1048.729998][ T4531] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1048.730022][ T4531] RIP: 0033:0x7f6cb4a4f749 [ 1048.730037][ T4531] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1048.730054][ T4531] RSP: 002b:00007f6cb34b7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1048.730071][ T4531] RAX: ffffffffffffffda RBX: 00007f6cb4ca5fa0 RCX: 00007f6cb4a4f749 [ 1048.730147][ T4531] RDX: 0000000000004804 RSI: 00002000000001c0 RDI: 0000000000000005 [ 1048.730162][ T4531] RBP: 00007f6cb34b7090 R08: 0000000000000000 R09: 0000000000000000 [ 1048.730205][ T4531] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1048.730217][ T4531] R13: 00007f6cb4ca6038 R14: 00007f6cb4ca5fa0 R15: 00007ffd7cfea758 [ 1048.730277][ T4531] [ 1048.968727][ T29] audit: type=1326 audit(2000000227.974:114441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4523 comm="syz.4.23180" exe="/root/syz-executor" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7f6cb4a4f749 code=0x7ffc0000 [ 1048.992440][ T29] audit: type=1326 audit(2000000227.974:114442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4523 comm="syz.4.23180" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6cb4a4f749 code=0x7ffc0000 [ 1049.016067][ T29] audit: type=1326 audit(2000000227.974:114443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4523 comm="syz.4.23180" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6cb4a4f749 code=0x7ffc0000 [ 1049.039799][ T29] audit: type=1326 audit(2000000227.985:114444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4526 comm="syz.4.23180" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f6cb4a82005 code=0x7ffc0000 [ 1049.063604][ T29] audit: type=1326 audit(2000000227.995:114445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4523 comm="syz.4.23180" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f6cb4a51667 code=0x7ffc0000 [ 1049.087407][ T29] audit: type=1326 audit(2000000227.995:114446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4523 comm="syz.4.23180" exe="/root/syz-executor" sig=0 arch=c000003e syscall=44 compat=0 ip=0x7f6cb4a515dc code=0x7ffc0000 [ 1049.110965][ T29] audit: type=1326 audit(2000000227.995:114447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4523 comm="syz.4.23180" exe="/root/syz-executor" sig=0 arch=c000003e syscall=45 compat=0 ip=0x7f6cb4a51514 code=0x7ffc0000 [ 1049.134542][ T29] audit: type=1326 audit(2000000227.995:114448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4523 comm="syz.4.23180" exe="/root/syz-executor" sig=0 arch=c000003e syscall=45 compat=0 ip=0x7f6cb4a51514 code=0x7ffc0000 [ 1049.437384][ T4567] bpf: Bad value for 'uid' [ 1049.462481][ T4569] block device autoloading is deprecated and will be removed. [ 1049.524927][ T4582] SELinux: security_context_str_to_sid (VWW) failed with errno=-22 [ 1049.622594][ T4592] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1049.632718][ T4579] 9p: Unknown Cache mode or invalid value mmap [ 1049.660923][ T4593] dvmrp0: entered allmulticast mode [ 1049.771017][ T4603] bpf: Bad value for 'uid' [ 1050.268859][ T4615] __nla_validate_parse: 2 callbacks suppressed [ 1050.268877][ T4615] netlink: 60 bytes leftover after parsing attributes in process `syz.7.23214'. [ 1050.443123][ T4620] bpf: Bad value for 'uid' [ 1050.538634][ T4626] program syz.8.23218 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1050.661637][ T4631] can-isotp: isotp_sendmsg: can_send_ret -ENETDOWN [ 1050.940336][ T4645] sch_tbf: burst 19872 is lower than device lo mtu (11337746) ! [ 1051.135787][ T4631] netlink: 28 bytes leftover after parsing attributes in process `syz.7.23222'. [ 1051.278397][ T4657] 9pnet_fd: Insufficient options for proto=fd [ 1051.358658][ T4661] bpf: Bad value for 'uid' [ 1051.386964][ T4664] netlink: 8 bytes leftover after parsing attributes in process `syz.9.23228'. [ 1051.770849][ T4686] 9p: Unknown Cache mode or invalid value mmap [ 1051.886975][ T4698] serio: Serial port ptm0 [ 1052.007571][ T4708] 9pnet_fd: Insufficient options for proto=fd [ 1052.016908][ T4711] can0: slcan on ptm1. [ 1052.042831][ T4711] netlink: 'syz.9.23248': attribute type 4 has an invalid length. [ 1052.089994][ T4717] netlink: 'syz.9.23248': attribute type 4 has an invalid length. [ 1052.109996][ T4712] hub 1-0:1.0: USB hub found [ 1052.115935][ T4712] hub 1-0:1.0: 8 ports detected [ 1052.275562][ T4709] can0 (unregistered): slcan off ptm1. [ 1052.365658][ T4723] SELinux: security_context_str_to_sid (-Xܘ7.H\ %u@) failed with errno=-22 [ 1052.516137][ T4718] netlink: 28 bytes leftover after parsing attributes in process `syz.8.23251'. [ 1052.606186][ T4735] sch_tbf: burst 19872 is lower than device lo mtu (11337746) ! [ 1052.934932][ T4757] bpf: Bad value for 'uid' [ 1052.987003][ T4760] netlink: 76 bytes leftover after parsing attributes in process `syz.9.23263'. [ 1053.160226][ T4773] netlink: 12 bytes leftover after parsing attributes in process `syz.9.23266'. [ 1053.241700][ T4781] 9pnet_fd: Insufficient options for proto=fd [ 1053.368974][ T29] kauditd_printk_skb: 157 callbacks suppressed [ 1053.368987][ T29] audit: type=1400 audit(2000000232.940:114606): avc: denied { create } for pid=4795 comm="syz.7.23279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 1053.405348][ T4799] can0: slcan on ptm0. [ 1053.410579][ T4799] netlink: 'syz.9.23280': attribute type 4 has an invalid length. [ 1053.430812][ T4799] netlink: 'syz.9.23280': attribute type 4 has an invalid length. [ 1053.492411][ T4805] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 1053.494843][ T29] audit: type=1400 audit(2000000233.066:114607): avc: denied { load_policy } for pid=4804 comm="syz.7.23283" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1053.500477][ T4805] SELinux: failed to load policy [ 1053.524066][ T4802] netlink: 12 bytes leftover after parsing attributes in process `syz.4.23282'. [ 1053.542265][ T4798] can0 (unregistered): slcan off ptm0. [ 1053.576570][ T4810] bpf: Bad value for 'uid' [ 1053.587498][ T29] audit: type=1326 audit(2000000233.171:114608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4809 comm="syz.9.23285" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1053.611269][ T29] audit: type=1326 audit(2000000233.171:114609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4809 comm="syz.9.23285" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1053.635005][ T29] audit: type=1326 audit(2000000233.171:114610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4809 comm="syz.9.23285" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1053.658928][ T29] audit: type=1326 audit(2000000233.171:114611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4809 comm="syz.9.23285" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1053.682704][ T29] audit: type=1326 audit(2000000233.171:114612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4809 comm="syz.9.23285" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1053.706631][ T29] audit: type=1326 audit(2000000233.171:114613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4809 comm="syz.9.23285" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1053.730477][ T29] audit: type=1326 audit(2000000233.171:114614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4809 comm="syz.9.23285" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1053.754167][ T29] audit: type=1326 audit(2000000233.171:114615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4809 comm="syz.9.23285" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1053.768568][ T4813] sch_tbf: burst 19872 is lower than device lo mtu (11337746) ! [ 1053.817885][ T4825] bpf: Bad value for 'uid' [ 1053.843971][ T4829] netlink: 32 bytes leftover after parsing attributes in process `syz.9.23292'. [ 1053.853043][ T4829] netlink: 12 bytes leftover after parsing attributes in process `syz.9.23292'. [ 1053.884693][ T4831] 9p: Unknown Cache mode or invalid value mmap [ 1054.009320][ T4837] can0: slcan on ptm0. [ 1054.016303][ T4837] netlink: 'syz.9.23296': attribute type 4 has an invalid length. [ 1054.035447][ T4837] netlink: 'syz.9.23296': attribute type 4 has an invalid length. [ 1054.063900][ T4835] 9p: Unknown Cache mode or invalid value mmap [ 1054.171431][ T4836] can0 (unregistered): slcan off ptm0. [ 1054.201822][ T4840] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 1054.214386][ T4840] SELinux: failed to load policy [ 1054.306563][ T4863] bpf: Bad value for 'uid' [ 1054.389245][ T4877] can0: slcan on ptm0. [ 1054.394285][ T4877] netlink: 'syz.6.23309': attribute type 4 has an invalid length. [ 1054.412574][ T4877] netlink: 'syz.6.23309': attribute type 4 has an invalid length. [ 1054.468104][ T4889] 9pnet_fd: Insufficient options for proto=fd [ 1054.515649][ T4876] can0 (unregistered): slcan off ptm0. [ 1054.532595][ T3421] IPVS: starting estimator thread 0... [ 1054.548697][ T4890] IPVS: wrr: UDP 224.0.0.2:0 - no destination available [ 1054.628306][ T4902] IPVS: using max 2688 ests per chain, 134400 per kthread [ 1054.643913][ T4916] bpf: Bad value for 'uid' [ 1054.731888][ T4912] sch_tbf: burst 19872 is lower than device lo mtu (11337746) ! [ 1054.820917][ T4934] SELinux: security_context_str_to_sid (-Xܘ7.H\ %u@) failed with errno=-22 [ 1054.832691][ T4938] SELinux: security_context_str_to_sid (-Xܘ7.H\ %u@) failed with errno=-22 [ 1054.892108][ T4944] netlink: 'syz.7.23331': attribute type 4 has an invalid length. [ 1054.901985][ T4944] netlink: 'syz.7.23331': attribute type 4 has an invalid length. [ 1054.954829][ T4953] netlink: 'syz.7.23334': attribute type 1 has an invalid length. [ 1054.969994][ T4953] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1054.988214][ T4953] netlink: 4 bytes leftover after parsing attributes in process `syz.7.23334'. [ 1054.999434][ T4953] bond1 (unregistering): Released all slaves [ 1055.016070][ T4963] 1X: renamed from 60X [ 1055.023194][ T4963] A link change request failed with some changes committed already. Interface 61X may have been left with an inconsistent configuration, please check. [ 1055.084540][ T4971] SELinux: security_context_str_to_sid (-Xܘ7.H\ %u@) failed with errno=-22 [ 1055.084758][ T4973] SELinux: security_context_str_to_sid (-Xܘ7.H\ %u@) failed with errno=-22 [ 1055.098745][ T4975] bpf: Bad value for 'uid' [ 1055.144781][ T4977] netlink: 'syz.6.23342': attribute type 4 has an invalid length. [ 1055.270678][ T4986] bpf: Bad value for 'uid' [ 1055.374409][ T4999] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1055.426664][ T5002] SELinux: security_context_str_to_sid (-Xܘ7.H\ %u@) failed with errno=-22 [ 1055.601774][ T5044] __nla_validate_parse: 1 callbacks suppressed [ 1055.601789][ T5044] netlink: 8 bytes leftover after parsing attributes in process `syz.4.23365'. [ 1055.627094][ T5049] netlink: 3 bytes leftover after parsing attributes in process `syz.6.23368'. [ 1055.653687][ T5049] 1X: renamed from 60X [ 1055.677847][ T5049] A link change request failed with some changes committed already. Interface 61X may have been left with an inconsistent configuration, please check. [ 1055.772586][ T5069] SELinux: security_context_str_to_sid (-Xܘ7.H\ %u@) failed with errno=-22 [ 1055.850806][ T5078] hub 1-0:1.0: USB hub found [ 1055.865035][ T5076] 9p: Unknown Cache mode or invalid value mmap [ 1055.868842][ T5078] hub 1-0:1.0: 8 ports detected [ 1055.994162][ T5093] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1056.035582][ T5096] 9pnet_fd: Insufficient options for proto=fd [ 1056.115681][ T5106] bpf: Bad value for 'uid' [ 1056.144511][ T5108] netlink: 8 bytes leftover after parsing attributes in process `syz.8.23389'. [ 1056.195439][ T5114] usb usb1: usbfs: interface 0 claimed by hub while 'syz.9.23391' sets config #0 [ 1056.206036][ T5073] chnl_net:caif_netlink_parms(): no params data found [ 1056.239230][ T5114] usb usb1: usbfs: interface 0 claimed by hub while 'syz.9.23391' sets config #1 [ 1056.299184][ T5120] 9p: Unknown Cache mode or invalid value mmap [ 1056.388019][ T5073] bridge0: port 1(bridge_slave_0) entered blocking state [ 1056.395339][ T5073] bridge0: port 1(bridge_slave_0) entered disabled state [ 1056.422745][ T5073] bridge_slave_0: entered allmulticast mode [ 1056.434426][ T5073] bridge_slave_0: entered promiscuous mode [ 1056.489836][ T5136] netlink: 76 bytes leftover after parsing attributes in process `syz.7.23396'. [ 1056.558411][ T5073] bridge0: port 2(bridge_slave_1) entered blocking state [ 1056.565555][ T5073] bridge0: port 2(bridge_slave_1) entered disabled state [ 1056.592237][ T5073] bridge_slave_1: entered allmulticast mode [ 1056.610476][ T5073] bridge_slave_1: entered promiscuous mode [ 1056.654297][ T5073] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1056.699316][ T5073] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1056.701496][ T5151] usb usb1: usbfs: interface 0 claimed by hub while 'syz.7.23405' sets config #0 [ 1056.735840][ T5151] usb usb1: usbfs: interface 0 claimed by hub while 'syz.7.23405' sets config #1 [ 1056.789164][ T5073] team0: Port device team_slave_0 added [ 1056.799204][ T5158] 9p: Unknown Cache mode or invalid value mmap [ 1056.800393][ T5156] 9pnet_fd: Insufficient options for proto=fd [ 1056.821215][ T5073] team0: Port device team_slave_1 added [ 1056.877244][ T5073] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1056.884335][ T5073] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1056.910274][ T5073] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1056.917011][ T5162] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 1056.930033][ T5162] SELinux: failed to load policy [ 1056.940403][ T5073] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1056.947376][ T5073] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1056.973442][ T5073] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1057.028025][ T5073] hsr_slave_0: entered promiscuous mode [ 1057.034288][ T5073] hsr_slave_1: entered promiscuous mode [ 1057.183177][ T5175] netlink: 76 bytes leftover after parsing attributes in process `syz.6.23413'. [ 1057.269044][ T5073] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1057.355638][ T5073] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1057.430844][ T5073] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1057.442561][ T5193] netlink: 12 bytes leftover after parsing attributes in process `syz.7.23418'. [ 1057.458196][ T5192] bpf: Bad value for 'uid' [ 1057.496756][ T5073] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1057.506678][ T5195] netlink: 32 bytes leftover after parsing attributes in process `syz.8.23422'. [ 1057.686326][ T5073] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 1057.724441][ T5073] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 1057.756340][ T5073] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1057.774866][ T5220] netlink: 12 bytes leftover after parsing attributes in process `syz.8.23432'. [ 1057.798889][ T5073] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 1057.850824][ T5216] sch_tbf: burst 19872 is lower than device lo mtu (11337746) ! [ 1057.968280][ T5073] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1057.993051][ T5073] 8021q: adding VLAN 0 to HW filter on device team0 [ 1058.012814][ T618] bridge0: port 1(bridge_slave_0) entered blocking state [ 1058.019897][ T618] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1058.077193][ T618] bridge0: port 2(bridge_slave_1) entered blocking state [ 1058.084371][ T618] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1058.234534][ T5073] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1058.388627][ T5073] veth0_vlan: entered promiscuous mode [ 1058.405493][ T5073] veth1_vlan: entered promiscuous mode [ 1058.435147][ T5073] veth0_macvtap: entered promiscuous mode [ 1058.450712][ T5073] veth1_macvtap: entered promiscuous mode [ 1058.473731][ T5073] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1058.496303][ T5073] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1058.543300][ T605] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1058.570366][ T605] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1058.592871][ T5271] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 1058.600451][ T5271] SELinux: failed to load policy [ 1058.626499][ T5272] netlink: 76 bytes leftover after parsing attributes in process `syz.9.23442'. [ 1058.691885][ T605] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1058.719758][ T29] kauditd_printk_skb: 490 callbacks suppressed [ 1058.719773][ T29] audit: type=1400 audit(2000000238.556:115106): avc: denied { mounton } for pid=5073 comm="syz-executor" path="/root/syzkaller.AqYauT/syz-tmp" dev="sda1" ino=2123 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 1058.730983][ T605] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1058.824177][ T29] audit: type=1400 audit(2000000238.556:115107): avc: denied { mount } for pid=5073 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1058.846500][ T29] audit: type=1400 audit(2000000238.556:115108): avc: denied { mount } for pid=5073 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1058.868997][ T29] audit: type=1400 audit(2000000238.609:115109): avc: denied { mounton } for pid=5073 comm="syz-executor" path="/root/syzkaller.AqYauT/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1058.895993][ T29] audit: type=1400 audit(2000000238.609:115110): avc: denied { mounton } for pid=5073 comm="syz-executor" path="/root/syzkaller.AqYauT/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=262725 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1058.924004][ T29] audit: type=1400 audit(2000000238.609:115111): avc: denied { unmount } for pid=5073 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1058.935588][ T5286] netlink: 76 bytes leftover after parsing attributes in process `syz.7.23444'. [ 1058.943987][ T29] audit: type=1400 audit(2000000238.630:115112): avc: denied { mounton } for pid=5073 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1058.976073][ T29] audit: type=1400 audit(2000000238.630:115113): avc: denied { mount } for pid=5073 comm="syz-executor" name="/" dev="gadgetfs" ino=5133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 1059.217104][ T29] audit: type=1400 audit(2000000239.081:115114): avc: denied { prog_load } for pid=5303 comm="syz.7.23455" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1059.236584][ T29] audit: type=1400 audit(2000000239.081:115115): avc: denied { bpf } for pid=5303 comm="syz.7.23455" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1059.270531][ T5304] hub 1-0:1.0: USB hub found [ 1059.282555][ T5304] hub 1-0:1.0: 8 ports detected [ 1059.403566][ T5310] usb usb1: usbfs: interface 0 claimed by hub while 'syz.7.23457' sets config #1 [ 1059.445982][ T5312] SELinux: security_context_str_to_sid (-Xܘ7.H\ %u@) failed with errno=-22 [ 1059.566999][ T5314] 9pnet_fd: Insufficient options for proto=fd [ 1059.859476][ T5330] hub 1-0:1.0: USB hub found [ 1059.865307][ T5330] hub 1-0:1.0: 8 ports detected [ 1060.239675][ T5341] usb usb1: usbfs: interface 0 claimed by hub while 'syz.6.23469' sets config #1 [ 1060.309845][ T5344] 9pnet_fd: Insufficient options for proto=fd [ 1060.776705][ T5364] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 1060.815338][ T5364] SELinux: failed to load policy [ 1060.831163][ T5367] validate_nla: 1 callbacks suppressed [ 1060.831177][ T5367] netlink: 'syz.9.23481': attribute type 4 has an invalid length. [ 1060.882538][ T5373] netlink: 'syz.9.23481': attribute type 4 has an invalid length. [ 1060.952634][ T5377] bpf: Bad value for 'uid' [ 1061.067879][ T5385] bpf: Bad value for 'uid' [ 1061.317622][ T5409] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 1061.355054][ T5409] SELinux: failed to load policy [ 1061.498538][ T5431] bpf: Bad value for 'uid' [ 1061.576096][ T5437] bpf: Bad value for 'uid' [ 1061.681045][ T5453] bpf: Bad value for 'uid' [ 1061.932740][ T5457] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1062.249311][ T5469] __nla_validate_parse: 1 callbacks suppressed [ 1062.249339][ T5469] netlink: 12 bytes leftover after parsing attributes in process `syz.6.23515'. [ 1062.298063][ T5471] SELinux: security_context_str_to_sid (-Xܘ7.H\ %u@) failed with errno=-22 [ 1062.472954][ T5486] hub 1-0:1.0: USB hub found [ 1062.483366][ T5486] hub 1-0:1.0: 8 ports detected [ 1062.846349][ T5513] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 1062.868351][ T5513] SELinux: failed to load policy [ 1063.023799][ T5529] ip6t_srh: unknown srh invflags 4000 [ 1063.129680][ T5539] SELinux: security_context_str_to_sid (-Xܘ7.H\ %u@) failed with errno=-22 [ 1063.223012][ T5548] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 1063.238264][ T5548] SELinux: failed to load policy [ 1063.239449][ T5550] bpf: Bad value for 'uid' [ 1063.273210][ T5552] netlink: 'syz.8.23550': attribute type 4 has an invalid length. [ 1063.297570][ T5552] netlink: 'syz.8.23550': attribute type 4 has an invalid length. [ 1063.408046][ T5554] sch_tbf: burst 19872 is lower than device lo mtu (11337746) ! [ 1063.518816][ T5568] netlink: 8 bytes leftover after parsing attributes in process `syz.7.23555'. [ 1063.563203][ T29] kauditd_printk_skb: 353 callbacks suppressed [ 1063.563217][ T29] audit: type=1400 audit(2000000243.637:115469): avc: denied { setcheckreqprot } for pid=5571 comm="syz.7.23557" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1063.592243][ T29] audit: type=1400 audit(2000000243.658:115470): avc: denied { ioctl } for pid=5571 comm="syz.7.23557" path="socket:[263112]" dev="sockfs" ino=263112 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1063.618453][ T29] audit: type=1400 audit(2000000243.658:115471): avc: denied { watch } for pid=5573 comm="syz.8.23558" path="/proc/1505/task/1506" dev="proc" ino=263114 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1063.641836][ T29] audit: type=1400 audit(2000000243.658:115472): avc: denied { execute } for pid=5573 comm="syz.8.23558" dev="tmpfs" ino=5247 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1063.663481][ T29] audit: type=1400 audit(2000000243.658:115473): avc: denied { execute_no_trans } for pid=5573 comm="syz.8.23558" path=2F6D656D66643A2D42D54E49C56A9A707070F00884A26D202864656C6574656429 dev="tmpfs" ino=5247 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1063.703325][ T29] audit: type=1400 audit(2000000243.784:115474): avc: denied { ioctl } for pid=5571 comm="syz.7.23557" path="socket:[263795]" dev="sockfs" ino=263795 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1063.728883][ T29] audit: type=1400 audit(2000000243.784:115475): avc: denied { create } for pid=5571 comm="syz.7.23557" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 1063.751338][ T29] audit: type=1400 audit(2000000243.795:115476): avc: denied { connect } for pid=5575 comm="syz.8.23559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1063.771452][ T29] audit: type=1400 audit(2000000243.805:115477): avc: denied { write } for pid=5575 comm="syz.8.23559" path="socket:[263124]" dev="sockfs" ino=263124 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1063.787344][ T5576] netlink: 12 bytes leftover after parsing attributes in process `syz.8.23559'. [ 1063.866941][ T29] audit: type=1326 audit(2000000243.963:115478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5590 comm="syz.9.23561" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe987b3f749 code=0x7ffc0000 [ 1063.914755][ T5597] bpf: Bad value for 'uid' [ 1064.275535][ T5646] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1064.345892][ T5619] chnl_net:caif_netlink_parms(): no params data found [ 1064.391796][ T5655] netlink: 12 bytes leftover after parsing attributes in process `syz.4.23580'. [ 1064.424064][ T5619] bridge0: port 1(bridge_slave_0) entered blocking state [ 1064.431291][ T5619] bridge0: port 1(bridge_slave_0) entered disabled state [ 1064.438658][ T5619] bridge_slave_0: entered allmulticast mode [ 1064.445398][ T5619] bridge_slave_0: entered promiscuous mode [ 1064.452687][ T5619] bridge0: port 2(bridge_slave_1) entered blocking state [ 1064.459848][ T5619] bridge0: port 2(bridge_slave_1) entered disabled state [ 1064.467300][ T5619] bridge_slave_1: entered allmulticast mode [ 1064.473753][ T5619] bridge_slave_1: entered promiscuous mode [ 1064.491714][ T5619] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1064.499258][ T5668] bpf: Bad value for 'uid' [ 1064.502446][ T5619] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1064.527371][ T5619] team0: Port device team_slave_0 added [ 1064.533708][ T5619] team0: Port device team_slave_1 added [ 1064.548661][ T5619] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1064.555706][ T5619] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1064.581948][ T5619] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1064.595557][ T5619] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1064.602588][ T5619] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1064.628820][ T5619] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1064.654755][ T5619] hsr_slave_0: entered promiscuous mode [ 1064.660965][ T5619] hsr_slave_1: entered promiscuous mode [ 1064.667006][ T5619] debugfs: 'hsr0' already exists in 'hsr' [ 1064.672800][ T5619] Cannot create hsr debugfs directory [ 1064.742667][ T5619] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1064.785058][ T5619] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1064.860844][ T5619] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1064.910558][ T5678] bpf: Bad value for 'uid' [ 1064.938686][ T5619] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1065.022079][ T5686] netlink: 12 bytes leftover after parsing attributes in process `syz.9.23592'. [ 1065.035076][ T5690] netlink: 12 bytes leftover after parsing attributes in process `syz.4.23593'. [ 1065.061560][ T5619] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 1065.076085][ T5619] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 1065.097730][ T5692] 9pnet: Could not find request transport: fd0x0000000000000003 [ 1065.107593][ T5619] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 1065.129782][ T5619] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 1065.143762][ T5697] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1065.159535][ T5701] netlink: 8 bytes leftover after parsing attributes in process `syz.7.23598'. [ 1065.203247][ T5619] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1065.220930][ T5716] netlink: 8 bytes leftover after parsing attributes in process `syz.9.23602'. [ 1065.240719][ T5619] 8021q: adding VLAN 0 to HW filter on device team0 [ 1065.257007][ T9476] bridge0: port 1(bridge_slave_0) entered blocking state [ 1065.264106][ T9476] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1065.273824][ T5726] bpf: Bad value for 'uid' [ 1065.287171][ T9476] bridge0: port 2(bridge_slave_1) entered blocking state [ 1065.294324][ T9476] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1065.326644][ T5728] 9pnet: Could not find request transport: fd0x0000000000000003 [ 1065.384350][ T5736] FAULT_INJECTION: forcing a failure. [ 1065.384350][ T5736] name failslab, interval 1, probability 0, space 0, times 0 [ 1065.397022][ T5736] CPU: 1 UID: 0 PID: 5736 Comm: syz.6.23609 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1065.397118][ T5736] Tainted: [W]=WARN [ 1065.397125][ T5736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1065.397143][ T5736] Call Trace: [ 1065.397149][ T5736] [ 1065.397155][ T5736] __dump_stack+0x1d/0x30 [ 1065.397178][ T5736] dump_stack_lvl+0xe8/0x140 [ 1065.397198][ T5736] dump_stack+0x15/0x1b [ 1065.397258][ T5736] should_fail_ex+0x265/0x280 [ 1065.397292][ T5736] should_failslab+0x8c/0xb0 [ 1065.397321][ T5736] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 1065.397386][ T5736] ? __alloc_skb+0x101/0x320 [ 1065.397411][ T5736] __alloc_skb+0x101/0x320 [ 1065.397437][ T5736] netlink_alloc_large_skb+0xbf/0xf0 [ 1065.397468][ T5736] netlink_sendmsg+0x3cf/0x6b0 [ 1065.397528][ T5736] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1065.397549][ T5736] __sock_sendmsg+0x145/0x180 [ 1065.397574][ T5736] ____sys_sendmsg+0x31e/0x4e0 [ 1065.397597][ T5736] ___sys_sendmsg+0x17b/0x1d0 [ 1065.397686][ T5736] __x64_sys_sendmsg+0xd4/0x160 [ 1065.397708][ T5736] x64_sys_call+0x191e/0x3000 [ 1065.397799][ T5736] do_syscall_64+0xd2/0x200 [ 1065.397817][ T5736] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1065.397842][ T5736] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1065.397946][ T5736] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1065.397972][ T5736] RIP: 0033:0x7f32f779f749 [ 1065.397989][ T5736] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1065.398007][ T5736] RSP: 002b:00007f32f6207038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1065.398027][ T5736] RAX: ffffffffffffffda RBX: 00007f32f79f5fa0 RCX: 00007f32f779f749 [ 1065.398041][ T5736] RDX: 0000000000000000 RSI: 0000200000000100 RDI: 0000000000000006 [ 1065.398081][ T5736] RBP: 00007f32f6207090 R08: 0000000000000000 R09: 0000000000000000 [ 1065.398116][ T5736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1065.398127][ T5736] R13: 00007f32f79f6038 R14: 00007f32f79f5fa0 R15: 00007ffe0aa71e28 [ 1065.398143][ T5736] [ 1065.429520][ T5741] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1065.446192][ T5619] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1065.699424][ T5765] bpf: Bad value for 'uid' [ 1065.751804][ T5619] veth0_vlan: entered promiscuous mode [ 1065.759436][ T5619] veth1_vlan: entered promiscuous mode [ 1065.772480][ T5619] veth0_macvtap: entered promiscuous mode [ 1065.783366][ T5619] veth1_macvtap: entered promiscuous mode [ 1065.793940][ T5619] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1065.804840][ T5619] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1065.817357][ T618] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1065.826881][ T618] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1065.846097][ T618] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1065.855671][ T618] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1065.905287][ T5782] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 1065.911310][ T5776] sch_tbf: burst 19872 is lower than device lo mtu (11337746) ! [ 1065.913054][ T5782] SELinux: failed to load policy [ 1066.009169][ T5793] netlink: 'syz.7.23624': attribute type 4 has an invalid length. [ 1066.021871][ T5793] netlink: 'syz.7.23624': attribute type 4 has an invalid length. [ 1066.072134][ T5801] netlink: 8 bytes leftover after parsing attributes in process `syz.7.23628'. [ 1066.096529][ T5805] 9pnet_fd: Insufficient options for proto=fd [ 1066.672106][ T5821] hub 1-0:1.0: USB hub found [ 1066.676912][ T5821] hub 1-0:1.0: 8 ports detected [ 1066.728055][ T5831] usb usb1: usbfs: interface 0 claimed by hub while 'syz.8.23641' sets config #1 [ 1066.754072][ T5833] netlink: 8 bytes leftover after parsing attributes in process `syz.8.23642'. [ 1066.827656][ T5837] ucma_write: process 1490 (syz.9.23644) changed security contexts after opening file descriptor, this is not allowed. [ 1066.996429][ T5846] FAULT_INJECTION: forcing a failure. [ 1066.996429][ T5846] name failslab, interval 1, probability 0, space 0, times 0 [ 1067.009148][ T5846] CPU: 1 UID: 0 PID: 5846 Comm: syz.9.23646 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1067.009255][ T5846] Tainted: [W]=WARN [ 1067.009263][ T5846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1067.009292][ T5846] Call Trace: [ 1067.009306][ T5846] [ 1067.009314][ T5846] __dump_stack+0x1d/0x30 [ 1067.009338][ T5846] dump_stack_lvl+0xe8/0x140 [ 1067.009432][ T5846] dump_stack+0x15/0x1b [ 1067.009463][ T5846] should_fail_ex+0x265/0x280 [ 1067.009499][ T5846] should_failslab+0x8c/0xb0 [ 1067.009546][ T5846] kmem_cache_alloc_noprof+0x50/0x480 [ 1067.009645][ T5846] ? security_inode_alloc+0x37/0x100 [ 1067.009702][ T5846] security_inode_alloc+0x37/0x100 [ 1067.009723][ T5846] inode_init_always_gfp+0x4b7/0x500 [ 1067.009749][ T5846] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 1067.009771][ T5846] alloc_inode+0x58/0x170 [ 1067.009930][ T5846] new_inode+0x1d/0xe0 [ 1067.010009][ T5846] shmem_get_inode+0x244/0x750 [ 1067.010032][ T5846] __shmem_file_setup+0x113/0x210 [ 1067.010053][ T5846] shmem_file_setup+0x3b/0x50 [ 1067.010101][ T5846] __se_sys_memfd_create+0x2c3/0x590 [ 1067.010125][ T5846] __x64_sys_memfd_create+0x31/0x40 [ 1067.010164][ T5846] x64_sys_call+0x2ac2/0x3000 [ 1067.010260][ T5846] do_syscall_64+0xd2/0x200 [ 1067.010280][ T5846] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1067.010317][ T5846] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1067.010350][ T5846] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1067.010417][ T5846] RIP: 0033:0x7fe987b3f749 [ 1067.010433][ T5846] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1067.010450][ T5846] RSP: 002b:00007fe9865a6e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 1067.010470][ T5846] RAX: ffffffffffffffda RBX: 0000000000000458 RCX: 00007fe987b3f749 [ 1067.010504][ T5846] RDX: 00007fe9865a6ef0 RSI: 0000000000000000 RDI: 00007fe987bc4960 [ 1067.010518][ T5846] RBP: 0000200000000180 R08: 00007fe9865a6bb7 R09: 00007fe9865a6e40 [ 1067.010606][ T5846] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000100 [ 1067.010651][ T5846] R13: 00007fe9865a6ef0 R14: 00007fe9865a6eb0 R15: 0000200000000040 [ 1067.010667][ T5846] [ 1067.277302][ T5845] sch_tbf: burst 19872 is lower than device lo mtu (11337746) ! [ 1067.338270][T21675] Bluetooth: hci0: command 0x1003 tx timeout [ 1067.344757][T25999] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 1067.457122][ T5858] FAULT_INJECTION: forcing a failure. [ 1067.457122][ T5858] name failslab, interval 1, probability 0, space 0, times 0 [ 1067.469857][ T5858] CPU: 0 UID: 0 PID: 5858 Comm: syz.9.23651 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1067.469892][ T5858] Tainted: [W]=WARN [ 1067.469898][ T5858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1067.469910][ T5858] Call Trace: [ 1067.469917][ T5858] [ 1067.469926][ T5858] __dump_stack+0x1d/0x30 [ 1067.469951][ T5858] dump_stack_lvl+0xe8/0x140 [ 1067.469986][ T5858] dump_stack+0x15/0x1b [ 1067.470010][ T5858] should_fail_ex+0x265/0x280 [ 1067.470045][ T5858] should_failslab+0x8c/0xb0 [ 1067.470095][ T5858] kmem_cache_alloc_noprof+0x50/0x480 [ 1067.470125][ T5858] ? do_set_mempolicy+0x17c/0x3e0 [ 1067.470146][ T5858] do_set_mempolicy+0x17c/0x3e0 [ 1067.470167][ T5858] __x64_sys_set_mempolicy+0x139/0x170 [ 1067.470238][ T5858] x64_sys_call+0x165a/0x3000 [ 1067.470259][ T5858] do_syscall_64+0xd2/0x200 [ 1067.470311][ T5858] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1067.470394][ T5858] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1067.470434][ T5858] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1067.470454][ T5858] RIP: 0033:0x7fe987b3f749 [ 1067.470471][ T5858] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1067.470554][ T5858] RSP: 002b:00007fe9865a7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ee [ 1067.470571][ T5858] RAX: ffffffffffffffda RBX: 00007fe987d95fa0 RCX: 00007fe987b3f749 [ 1067.470584][ T5858] RDX: 0000000000000005 RSI: 0000200000000040 RDI: 0000000000008006 [ 1067.470636][ T5858] RBP: 00007fe9865a7090 R08: 0000000000000000 R09: 0000000000000000 [ 1067.470649][ T5858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1067.470663][ T5858] R13: 00007fe987d96038 R14: 00007fe987d95fa0 R15: 00007ffdb123ce88 [ 1067.470682][ T5858] [ 1067.656187][T18468] Bluetooth: hci1: Opcode 0x1003 failed: -110 [ 1067.656211][T25999] Bluetooth: hci1: command 0x1003 tx timeout [ 1067.764580][ T5864] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 1067.851352][ T5875] bpf: Bad value for 'uid' [ 1067.969384][ T5882] bpf: Bad value for 'uid' [ 1068.145872][ T5896] hub 1-0:1.0: USB hub found [ 1068.150744][ T5896] hub 1-0:1.0: 8 ports detected [ 1068.204031][ T5903] netlink: 12 bytes leftover after parsing attributes in process `syz.4.23668'. [ 1068.224606][ T5908] netlink: 16 bytes leftover after parsing attributes in process `syz.8.23671'. [ 1068.263237][ T5918] bpf: Bad value for 'uid' [ 1068.374541][ T29] kauditd_printk_skb: 290 callbacks suppressed [ 1068.374555][ T29] audit: type=1400 audit(2000000248.687:115769): avc: denied { prog_load } for pid=5925 comm="syz.4.23678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1068.400214][ T29] audit: type=1400 audit(2000000248.697:115770): avc: denied { bpf } for pid=5925 comm="syz.4.23678" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1068.406524][ T5926] usb usb1: usbfs: interface 0 claimed by hub while 'syz.4.23678' sets config #0 [ 1068.421166][ T29] audit: type=1400 audit(2000000248.697:115771): avc: denied { perfmon } for pid=5925 comm="syz.4.23678" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1068.451762][ T29] audit: type=1400 audit(2000000248.697:115772): avc: denied { prog_run } for pid=5925 comm="syz.4.23678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1068.451941][ T5928] netlink: 'syz.6.23679': attribute type 1 has an invalid length. [ 1068.471107][ T29] audit: type=1400 audit(2000000248.729:115773): avc: denied { write } for pid=5925 comm="syz.4.23678" name="001" dev="devtmpfs" ino=147 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1068.501997][ T29] audit: type=1400 audit(2000000248.750:115774): avc: denied { open } for pid=5925 comm="syz.4.23678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1068.504341][ T5929] FAULT_INJECTION: forcing a failure. [ 1068.504341][ T5929] name failslab, interval 1, probability 0, space 0, times 0 [ 1068.521634][ T29] audit: type=1400 audit(2000000248.750:115775): avc: denied { kernel } for pid=5925 comm="syz.4.23678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1068.534209][ T5929] CPU: 0 UID: 0 PID: 5929 Comm: syz.6.23679 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1068.534306][ T5929] Tainted: [W]=WARN [ 1068.534313][ T5929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1068.534327][ T5929] Call Trace: [ 1068.534335][ T5929] [ 1068.534344][ T5929] __dump_stack+0x1d/0x30 [ 1068.534368][ T5929] dump_stack_lvl+0xe8/0x140 [ 1068.534389][ T5929] dump_stack+0x15/0x1b [ 1068.534451][ T5929] should_fail_ex+0x265/0x280 [ 1068.534560][ T5929] should_failslab+0x8c/0xb0 [ 1068.534588][ T5929] kmem_cache_alloc_noprof+0x50/0x480 [ 1068.534657][ T5929] ? skb_clone+0x151/0x1f0 [ 1068.534685][ T5929] skb_clone+0x151/0x1f0 [ 1068.534756][ T5929] __netlink_deliver_tap+0x2c9/0x500 [ 1068.534780][ T5929] netlink_unicast+0x66b/0x690 [ 1068.534811][ T5929] netlink_sendmsg+0x58b/0x6b0 [ 1068.534834][ T5929] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1068.535085][ T5929] __sock_sendmsg+0x145/0x180 [ 1068.535150][ T5929] ____sys_sendmsg+0x31e/0x4e0 [ 1068.535172][ T5929] ___sys_sendmsg+0x17b/0x1d0 [ 1068.535239][ T5929] __x64_sys_sendmsg+0xd4/0x160 [ 1068.535262][ T5929] x64_sys_call+0x191e/0x3000 [ 1068.535321][ T5929] do_syscall_64+0xd2/0x200 [ 1068.535361][ T5929] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1068.535390][ T5929] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1068.535422][ T5929] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1068.535444][ T5929] RIP: 0033:0x7f32f779f749 [ 1068.535539][ T5929] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1068.535555][ T5929] RSP: 002b:00007f32f61e6038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1068.535572][ T5929] RAX: ffffffffffffffda RBX: 00007f32f79f6090 RCX: 00007f32f779f749 [ 1068.535586][ T5929] RDX: 0000000004004000 RSI: 0000200000000040 RDI: 0000000000000005 [ 1068.535599][ T5929] RBP: 00007f32f61e6090 R08: 0000000000000000 R09: 0000000000000000 [ 1068.535612][ T5929] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1068.535625][ T5929] R13: 00007f32f79f6128 R14: 00007f32f79f6090 R15: 00007ffe0aa71e28 [ 1068.535706][ T5929] [ 1068.535742][ T5929] netlink: 4 bytes leftover after parsing attributes in process `syz.6.23679'. [ 1068.569714][ T5930] usb usb1: usbfs: interface 0 claimed by hub while 'syz.4.23678' sets config #1 [ 1068.616573][ T5928] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1068.663661][ T29] audit: type=1400 audit(2000000249.002:115776): avc: denied { read } for pid=5932 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=139 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:getty_exec_t:s0" [ 1068.805837][ T5944] vhci_hcd vhci_hcd.0: pdev(8) rhport(0) sockfd(4) [ 1068.823339][ T5944] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 1068.830877][ T5944] vhci_hcd vhci_hcd.0: Device attached [ 1068.838653][ T29] audit: type=1400 audit(2000000249.002:115777): avc: denied { map_create } for pid=5933 comm="syz.7.23681" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1068.858134][ T29] audit: type=1400 audit(2000000249.002:115778): avc: denied { map_read map_write } for pid=5933 comm="syz.7.23681" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1068.882402][ T5929] bond1 (unregistering): Released all slaves [ 1068.901591][ T5948] netlink: 16 bytes leftover after parsing attributes in process `syz.4.23685'. [ 1068.911015][ T5944] vhci_hcd vhci_hcd.0: pdev(8) rhport(0) sockfd(7) [ 1068.917667][ T5944] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 1068.925361][ T5944] vhci_hcd vhci_hcd.0: Device attached [ 1068.931531][ T5944] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 1068.943603][ T5942] vhci_hcd vhci_hcd.0: pdev(8) rhport(2) sockfd(11) [ 1068.950302][ T5942] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 1068.957794][ T5942] vhci_hcd vhci_hcd.0: Device attached [ 1068.989488][ T5942] xt_hashlimit: max too large, truncated to 1048576 [ 1068.997144][ T5942] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1069.005252][ T3421] vhci_hcd: vhci_device speed not set [ 1069.011284][ T5964] 9pnet_fd: Insufficient options for proto=fd [ 1069.022083][ T5945] vhci_hcd: connection closed [ 1069.022172][ T5956] vhci_hcd: connection closed [ 1069.026877][ T9476] vhci_hcd: stop threads [ 1069.036092][ T9476] vhci_hcd: release socket [ 1069.038552][ T5966] bpf: Bad value for 'uid' [ 1069.040503][ T9476] vhci_hcd: disconnect device [ 1069.049876][ T5949] vhci_hcd: connection closed [ 1069.050246][ T9476] vhci_hcd: stop threads [ 1069.059228][ T9476] vhci_hcd: release socket [ 1069.059595][ T3421] usb 17-1: new full-speed USB device number 2 using vhci_hcd [ 1069.063667][ T9476] vhci_hcd: disconnect device [ 1069.079273][ T9476] vhci_hcd: stop threads [ 1069.083519][ T9476] vhci_hcd: release socket [ 1069.087961][ T9476] vhci_hcd: disconnect device [ 1069.087993][ T3421] usb 17-1: enqueue for inactive port 0 [ 1069.108179][ T3421] usb 17-1: enqueue for inactive port 0 [ 1069.119157][ T3421] usb 17-1: enqueue for inactive port 0 [ 1069.192772][ T3421] vhci_hcd: vhci_device speed not set [ 1069.243185][ T5979] usb usb1: usbfs: interface 0 claimed by hub while 'syz.4.23695' sets config #0 [ 1069.299888][ T5985] netlink: 16 bytes leftover after parsing attributes in process `syz.7.23698'. [ 1069.310503][ T5986] netlink: 76 bytes leftover after parsing attributes in process `syz.9.23692'. [ 1069.315625][ T5987] usb usb1: usbfs: interface 0 claimed by hub while 'syz.4.23695' sets config #1 [ 1069.339658][ T5983] FAULT_INJECTION: forcing a failure. [ 1069.339658][ T5983] name failslab, interval 1, probability 0, space 0, times 0 [ 1069.352427][ T5983] CPU: 0 UID: 0 PID: 5983 Comm: syz.6.23697 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1069.352468][ T5983] Tainted: [W]=WARN [ 1069.352474][ T5983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1069.352485][ T5983] Call Trace: [ 1069.352492][ T5983] [ 1069.352505][ T5983] __dump_stack+0x1d/0x30 [ 1069.352527][ T5983] dump_stack_lvl+0xe8/0x140 [ 1069.352550][ T5983] dump_stack+0x15/0x1b [ 1069.352568][ T5983] should_fail_ex+0x265/0x280 [ 1069.352642][ T5983] should_failslab+0x8c/0xb0 [ 1069.352668][ T5983] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 1069.352695][ T5983] ? __alloc_skb+0x101/0x320 [ 1069.352755][ T5983] ? __rtnl_unlock+0x95/0xb0 [ 1069.352858][ T5983] __alloc_skb+0x101/0x320 [ 1069.352884][ T5983] netlink_ack+0xfd/0x500 [ 1069.352967][ T5983] ? netlink_rcv_skb+0x7e/0x220 [ 1069.353039][ T5983] netlink_rcv_skb+0x192/0x220 [ 1069.353072][ T5983] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 1069.353104][ T5983] rtnetlink_rcv+0x1c/0x30 [ 1069.353127][ T5983] netlink_unicast+0x5c0/0x690 [ 1069.353224][ T5983] netlink_sendmsg+0x58b/0x6b0 [ 1069.353248][ T5983] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1069.353271][ T5983] __sock_sendmsg+0x145/0x180 [ 1069.353293][ T5983] ____sys_sendmsg+0x31e/0x4e0 [ 1069.353381][ T5983] ___sys_sendmsg+0x17b/0x1d0 [ 1069.353410][ T5983] __x64_sys_sendmsg+0xd4/0x160 [ 1069.353431][ T5983] x64_sys_call+0x191e/0x3000 [ 1069.353511][ T5983] do_syscall_64+0xd2/0x200 [ 1069.353534][ T5983] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1069.353566][ T5983] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1069.353665][ T5983] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1069.353686][ T5983] RIP: 0033:0x7f32f779f749 [ 1069.353769][ T5983] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1069.353788][ T5983] RSP: 002b:00007f32f6207038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1069.353809][ T5983] RAX: ffffffffffffffda RBX: 00007f32f79f5fa0 RCX: 00007f32f779f749 [ 1069.353823][ T5983] RDX: 0000000000040840 RSI: 0000200000000000 RDI: 0000000000000003 [ 1069.353874][ T5983] RBP: 00007f32f6207090 R08: 0000000000000000 R09: 0000000000000000 [ 1069.353889][ T5983] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1069.353902][ T5983] R13: 00007f32f79f6038 R14: 00007f32f79f5fa0 R15: 00007ffe0aa71e28 [ 1069.353922][ T5983] [ 1069.600432][ T5989] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 1069.619788][ T5989] SELinux: failed to load policy [ 1069.665534][ T5998] netlink: 12 bytes leftover after parsing attributes in process `syz.7.23699'. [ 1069.685492][ T6000] netlink: 8 bytes leftover after parsing attributes in process `syz.6.23704'. [ 1069.703677][ T6002] can0: slcan on ptm0. [ 1069.732377][ T6002] netlink: 'syz.8.23705': attribute type 4 has an invalid length. [ 1069.812106][ T6001] can0 (unregistered): slcan off ptm0. [ 1069.849213][ T6013] bpf: Bad value for 'uid' [ 1069.953260][ T6028] netlink: 8 bytes leftover after parsing attributes in process `syz.8.23711'. [ 1070.082042][ T6033] hub 1-0:1.0: USB hub found [ 1070.099925][ T6033] hub 1-0:1.0: 8 ports detected [ 1070.166672][ T6035] netlink: 76 bytes leftover after parsing attributes in process `syz.8.23713'. [ 1070.185079][ T6037] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 1070.207636][ T6037] SELinux: failed to load policy [ 1070.267306][ T6007] chnl_net:caif_netlink_parms(): no params data found [ 1070.433191][ T6007] bridge0: port 1(bridge_slave_0) entered blocking state [ 1070.440450][ T6007] bridge0: port 1(bridge_slave_0) entered disabled state [ 1070.453727][ T6007] bridge_slave_0: entered allmulticast mode [ 1070.465238][ T6007] bridge_slave_0: entered promiscuous mode [ 1070.472994][ T6007] bridge0: port 2(bridge_slave_1) entered blocking state [ 1070.480098][ T6007] bridge0: port 2(bridge_slave_1) entered disabled state [ 1070.498951][ T6007] bridge_slave_1: entered allmulticast mode [ 1070.513185][ T6007] bridge_slave_1: entered promiscuous mode [ 1070.535215][ T6068] bpf: Bad value for 'uid' [ 1070.547802][ T6007] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1070.589140][ T6007] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1070.647006][ T6007] team0: Port device team_slave_0 added [ 1070.675919][ T6007] team0: Port device team_slave_1 added [ 1070.718830][ T6007] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1070.726087][ T6007] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1070.752122][ T6007] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1070.803405][ T6007] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1070.810382][ T6007] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1070.836340][ T6007] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1070.867703][ T6081] usb usb1: usbfs: interface 0 claimed by hub while 'syz.6.23729' sets config #1 [ 1070.884451][ T6007] hsr_slave_0: entered promiscuous mode [ 1070.900084][ T6007] hsr_slave_1: entered promiscuous mode [ 1070.919506][ T6007] debugfs: 'hsr0' already exists in 'hsr' [ 1070.925261][ T6007] Cannot create hsr debugfs directory [ 1071.097590][ T6007] netdevsim netdevsim9 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1071.122501][ T6093] sch_tbf: burst 19872 is lower than device lo mtu (11337746) ! [ 1071.164386][ T6007] netdevsim netdevsim9 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1071.239112][ T6007] netdevsim netdevsim9 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1071.302372][ T6007] netdevsim netdevsim9 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1071.395581][ T6111] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 1071.403421][ T6111] SELinux: failed to load policy [ 1071.408109][ T6007] netdevsim netdevsim9 netdevsim0: renamed from eth0 [ 1071.417212][ T6007] netdevsim netdevsim9 netdevsim1: renamed from eth1 [ 1071.427701][ T6007] netdevsim netdevsim9 netdevsim2: renamed from eth2 [ 1071.439584][ T6007] netdevsim netdevsim9 netdevsim3: renamed from eth3 [ 1071.512944][ T6007] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1071.528417][ T6007] 8021q: adding VLAN 0 to HW filter on device team0 [ 1071.544746][ T9504] bridge0: port 1(bridge_slave_0) entered blocking state [ 1071.551841][ T9504] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1071.592962][ T8417] bridge0: port 2(bridge_slave_1) entered blocking state [ 1071.600106][ T8417] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1071.728781][ T3387] usb usb18-port1: attempt power cycle [ 1071.766445][ T6007] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1072.087040][ T6007] veth0_vlan: entered promiscuous mode [ 1072.109892][ T6007] veth1_vlan: entered promiscuous mode [ 1072.135533][ T6007] veth0_macvtap: entered promiscuous mode [ 1072.150341][ T6007] veth1_macvtap: entered promiscuous mode [ 1072.161139][ T6007] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1072.172376][ T6007] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1072.189448][ T8431] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1072.211461][ T8431] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1072.239068][ T619] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1072.241150][ T6153] bpf: Bad value for 'uid' [ 1072.281112][ T619] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1072.308442][ T6157] bpf: Bad value for 'uid' [ 1072.706370][ T6170] usb usb1: usbfs: interface 0 claimed by hub while 'syz.8.23747' sets config #1 [ 1072.788254][ T6175] bridge_slave_1: left allmulticast mode [ 1072.793977][ T6175] bridge_slave_1: left promiscuous mode [ 1072.799727][ T6175] bridge0: port 2(bridge_slave_1) entered disabled state [ 1072.847616][ T6175] bridge_slave_0: left allmulticast mode [ 1072.853327][ T6175] bridge_slave_0: left promiscuous mode [ 1072.859228][ T6175] bridge0: port 1(bridge_slave_0) entered disabled state [ 1072.957183][ T6187] bpf: Bad value for 'uid' [ 1073.062617][ T6190] __nla_validate_parse: 4 callbacks suppressed [ 1073.062633][ T6190] netlink: 8 bytes leftover after parsing attributes in process `syz.4.23755'. [ 1073.093931][ T6192] bpf: Bad value for 'uid' [ 1073.227501][ T29] kauditd_printk_skb: 429 callbacks suppressed [ 1073.227515][ T29] audit: type=1400 audit(2000000253.789:116206): avc: denied { write } for pid=6194 comm="syz.9.23757" name="001" dev="devtmpfs" ino=147 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1073.228143][ T6195] usb usb1: usbfs: interface 0 claimed by hub while 'syz.9.23757' sets config #0 [ 1073.268911][ T29] audit: type=1400 audit(2000000253.831:116207): avc: denied { open } for pid=6194 comm="syz.9.23757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1073.308539][ T29] audit: type=1400 audit(2000000253.831:116208): avc: denied { perfmon } for pid=6194 comm="syz.9.23757" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1073.329778][ T29] audit: type=1400 audit(2000000253.831:116209): avc: denied { kernel } for pid=6194 comm="syz.9.23757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1073.355969][ T6196] usb usb1: usbfs: interface 0 claimed by hub while 'syz.9.23757' sets config #1 [ 1073.390229][ T29] audit: type=1400 audit(2000000253.957:116210): avc: denied { read } for pid=6197 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=139 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:getty_exec_t:s0" [ 1073.419883][ T6199] netlink: 60 bytes leftover after parsing attributes in process `syz.4.23758'. [ 1073.426284][ T6202] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1073.437956][ T29] audit: type=1400 audit(2000000253.999:116211): avc: denied { prog_load } for pid=6201 comm="syz.9.23760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1073.457410][ T29] audit: type=1400 audit(2000000253.999:116212): avc: denied { bpf } for pid=6201 comm="syz.9.23760" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1073.478316][ T29] audit: type=1400 audit(2000000253.999:116213): avc: denied { mounton } for pid=6201 comm="syz.9.23760" path="/3/file0" dev="tmpfs" ino=34 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1073.498651][ T3387] usb usb18-port1: unable to enumerate USB device [ 1073.517838][ T29] audit: type=1400 audit(2000000254.093:116214): avc: denied { create } for pid=6203 comm="syz.4.23762" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1073.541379][ T29] audit: type=1400 audit(2000000254.125:116215): avc: denied { map_create } for pid=6203 comm="syz.4.23762" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1073.582182][ T6208] netlink: 8 bytes leftover after parsing attributes in process `syz.4.23763'. [ 1073.700526][ T6218] hub 1-0:1.0: USB hub found [ 1073.705354][ T6218] hub 1-0:1.0: 8 ports detected [ 1073.793867][ T6231] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1073.817402][ T6235] bpf: Bad value for 'uid' [ 1073.917564][ T6233] netlink: 28 bytes leftover after parsing attributes in process `syz.7.23773'. [ 1074.174143][ T6260] bpf: Bad value for 'uid' [ 1074.335046][ T6267] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1074.348672][ T6263] netlink: 'syz.8.23784': attribute type 1 has an invalid length. [ 1074.360665][ T6270] 9p: Unknown Cache mode or invalid value mmap [ 1074.362320][ T6263] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1074.386736][ T6263] netlink: 4 bytes leftover after parsing attributes in process `syz.8.23784'. [ 1074.398755][ T6263] bond1 (unregistering): Released all slaves [ 1074.497569][ T6280] netlink: 60 bytes leftover after parsing attributes in process `syz.6.23790'. [ 1074.514669][ T6282] netlink: 8 bytes leftover after parsing attributes in process `syz.4.23792'. [ 1074.626316][ T6293] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1074.629578][ T6294] netlink: 76 bytes leftover after parsing attributes in process `syz.6.23793'. [ 1074.680041][ T6300] netlink: 12 bytes leftover after parsing attributes in process `syz.9.23798'. [ 1074.693965][ T6305] 9p: Unknown Cache mode or invalid value mmap [ 1074.782519][ T6310] netlink: 28 bytes leftover after parsing attributes in process `syz.6.23802'. [ 1074.877112][ T6325] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1074.895194][ T6324] usb usb1: usbfs: interface 0 claimed by hub while 'syz.8.23809' sets config #0 [ 1074.941534][ T6324] usb usb1: usbfs: interface 0 claimed by hub while 'syz.8.23809' sets config #1 [ 1074.955626][ T6337] sch_tbf: burst 19872 is lower than device lo mtu (11337746) ! [ 1074.963807][ T6330] SELinux: security_context_str_to_sid (-Xܘ7.H\ %u@) failed with errno=-22 [ 1075.050139][ T6331] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 1075.141895][ T6353] 9p: Unknown Cache mode or invalid value mmap [ 1075.267066][ T6368] usb usb1: usbfs: interface 0 claimed by hub while 'syz.4.23824' sets config #0 [ 1075.308696][ T6368] usb usb1: usbfs: interface 0 claimed by hub while 'syz.4.23824' sets config #1 [ 1075.413636][ T6382] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 1075.482962][ T6399] 9p: Unknown Cache mode or invalid value mmap [ 1075.568446][ T6414] can0: slcan on ptm0. [ 1075.574456][ T6414] netlink: 'syz.8.23842': attribute type 4 has an invalid length. [ 1075.632708][ T6413] can0 (unregistered): slcan off ptm0. [ 1075.694453][ T6431] usb usb1: usbfs: interface 0 claimed by hub while 'syz.6.23850' sets config #1 [ 1075.822829][ C1] ================================================================== [ 1075.830955][ C1] BUG: KCSAN: data-race in wq_worker_tick / wq_worker_tick [ 1075.838166][ C1] [ 1075.840483][ C1] read-write to 0xffff8881010780b8 of 8 bytes by interrupt on cpu 0: [ 1075.848551][ C1] wq_worker_tick+0x60/0x230 [ 1075.853138][ C1] sched_tick+0x11a/0x270 [ 1075.857468][ C1] update_process_times+0x15f/0x190 [ 1075.862667][ C1] tick_nohz_handler+0x249/0x2d0 [ 1075.867624][ C1] __hrtimer_run_queues+0x20f/0x5a0 [ 1075.873003][ C1] hrtimer_interrupt+0x21a/0x460 [ 1075.878044][ C1] __sysvec_apic_timer_interrupt+0x5f/0x1d0 [ 1075.883941][ C1] sysvec_apic_timer_interrupt+0x6f/0x80 [ 1075.889585][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1075.895567][ C1] __sanitizer_cov_trace_const_cmp8+0x0/0x90 [ 1075.901564][ C1] strncpy_from_user+0x47/0x230 [ 1075.906428][ C1] strncpy_from_user_nofault+0x68/0xf0 [ 1075.911892][ C1] bpf_probe_read_user_str+0x2a/0x70 [ 1075.917228][ C1] bpf_prog_af763033ab74285a+0x7b/0x83 [ 1075.922694][ C1] bpf_trace_run2+0x107/0x1c0 [ 1075.927384][ C1] __traceiter_kfree+0x2e/0x50 [ 1075.932153][ C1] kfree+0x351/0x400 [ 1075.936061][ C1] io_alloc_cache_free+0xc0/0xe0 [ 1075.941035][ C1] io_rsrc_cache_free+0x36/0x40 [ 1075.945895][ C1] io_free_alloc_caches+0x65/0x70 [ 1075.950927][ C1] io_ring_ctx_free+0x78/0x3a0 [ 1075.955698][ C1] io_ring_exit_work+0x529/0x560 [ 1075.960650][ C1] process_scheduled_works+0x4ce/0x9d0 [ 1075.966126][ C1] worker_thread+0x582/0x770 [ 1075.970716][ C1] kthread+0x489/0x510 [ 1075.974791][ C1] ret_from_fork+0x122/0x1b0 [ 1075.979381][ C1] ret_from_fork_asm+0x1a/0x30 [ 1075.984148][ C1] [ 1075.986471][ C1] read-write to 0xffff8881010780b8 of 8 bytes by interrupt on cpu 1: [ 1075.994543][ C1] wq_worker_tick+0x60/0x230 [ 1075.999139][ C1] sched_tick+0x11a/0x270 [ 1076.003470][ C1] update_process_times+0x15f/0x190 [ 1076.008669][ C1] tick_nohz_handler+0x249/0x2d0 [ 1076.013613][ C1] __hrtimer_run_queues+0x20f/0x5a0 [ 1076.018822][ C1] hrtimer_interrupt+0x21a/0x460 [ 1076.023768][ C1] __sysvec_apic_timer_interrupt+0x5f/0x1d0 [ 1076.029685][ C1] sysvec_apic_timer_interrupt+0x6f/0x80 [ 1076.035329][ C1] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1076.041312][ C1] strncpy_from_user+0x1f6/0x230 [ 1076.046273][ C1] strncpy_from_user_nofault+0x68/0xf0 [ 1076.051731][ C1] bpf_probe_read_user_str+0x2a/0x70 [ 1076.057029][ C1] bpf_prog_af763033ab74285a+0x7b/0x83 [ 1076.062501][ C1] bpf_trace_run2+0x107/0x1c0 [ 1076.067226][ C1] __traceiter_kfree+0x2e/0x50 [ 1076.072011][ C1] kfree+0x351/0x400 [ 1076.075919][ C1] io_alloc_cache_free+0xc0/0xe0 [ 1076.080857][ C1] io_free_alloc_caches+0x2f/0x70 [ 1076.085888][ C1] io_ring_ctx_free+0x78/0x3a0 [ 1076.090655][ C1] io_ring_exit_work+0x529/0x560 [ 1076.095597][ C1] process_scheduled_works+0x4ce/0x9d0 [ 1076.101096][ C1] worker_thread+0x582/0x770 [ 1076.105700][ C1] kthread+0x489/0x510 [ 1076.109784][ C1] ret_from_fork+0x122/0x1b0 [ 1076.114474][ C1] ret_from_fork_asm+0x1a/0x30 [ 1076.119251][ C1] [ 1076.121575][ C1] value changed: 0x00000000004371a0 -> 0x00000000004398b0 [ 1076.128729][ C1] [ 1076.131052][ C1] Reported by Kernel Concurrency Sanitizer on: [ 1076.137206][ C1] CPU: 1 UID: 0 PID: 593 Comm: kworker/u8:22 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1076.148674][ C1] Tainted: [W]=WARN [ 1076.152556][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1076.162613][ C1] Workqueue: iou_exit io_ring_exit_work [ 1076.168183][ C1] ==================================================================