last executing test programs: 1m50.874336828s ago: executing program 3 (id=48): r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00'}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000180100000100000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x18) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'netdevsim0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x2, 0x4, 0x40018000, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 1m50.841071938s ago: executing program 3 (id=49): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='blkio.bfq.io_queued\x00', 0x275a, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="0900000004000000e27f000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000500)=ANY=[@ANYRESDEC=r0, @ANYRESHEX=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x2101, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000080)={0x4e00, 0x0, 0x730, 0xbdff, 0x10, "fdffffffffffffff"}) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0xff2e) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x3, 0x0, 0x0, "0062ba7d82000000000000000000f7fffeff00"}) r2 = syz_open_pts(r1, 0x0) dup3(r2, r1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={0x0, r3}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) sendmsg$nl_route_sched(r4, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0), 0x401, 0x0) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) close_range(r5, 0xffffffffffffffff, 0x0) 1m49.963916024s ago: executing program 3 (id=61): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000001740), 0x121c02, 0x0) r2 = socket(0x2a, 0x2, 0x0) getsockname$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r4}, 0x10) sendmmsg(r2, &(0x7f0000001080)=[{{&(0x7f00000004c0)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @multicast1}, 0x2, 0x0, 0x3}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000540)="b957a7d3e1f8c887a5e933072bc24804f390d512f8fc804c36c07a3b744f4c554e3e407cf3cb3a2d3be30f4b9c3c04876ff89821aead274620dd68b778ac63856b744f0cfdb7ea6d0e858369548d507c314257733b740690a2acfe13a21f2134e9bb84f2f9cf1340fbb71b4b95947c0e4f5b4c0fb1cb91540624bafa1f1336baa8728c8d0abc2ec5187c4d4e794beabfd2749ad2401c7964cdfec8", 0x9b}, {&(0x7f00000006c0)="0133ca76f43a80651429d277c8ff6b7f3c749a646b4416257967f0ea07649dc902ec5181a4549d338595d080697a7b859ec2d11b72f43ef00a2fae0a23929ed596cbecbe5ae0734694b811d7fa4527e614f9612c3025e0b14504239ed62d9d7e8522d1deecd4dff61493e53d00952387d4a54677586c5765662716b49b0095f651655d0a1e75e41dba877cb93806eb0f5bd92410563d1f70372bf834478a31c33cd286ef3e01fa49dfaf21e26f801dd7adcff8f6c21a", 0xb6}, {&(0x7f0000000780)="ed940d9b7fac7e277be9c0c499e9960125914275895d16cd7fb0dbaf86bea87248e9a86de3330a9825043007551e5faf2906f03e8d6c1b4d585efa0314156aba05dcbc56bac73ed18ea2a028c553750d77d8baaef67f25544bfa4cb5f1f07f411938776494b7283b8a609b446310d5f6c1aa4e96ff4b00853cf4dd1fc5df67ec6825d15dd0136f45a8e4d63c89e4441b986eb0ff17093d65ca55dc6637853c7dc3ef2872754b21af1259785c794c2ac58f82ef6dcc", 0xb5}, {&(0x7f0000000840)="ab885e4423a81dc97e135348152b8d2c4701cb9797292652a1bc8da545c81a042c8ca86555980af104b6a4e12e67e2d86c758341dd9c5e4ac7bc42bc4b354f81114ea0d8496611d6efa64850cb28757267279fc9a312a19c5bd7c714c742f5821b0cbed3bd9569e337e50b7eead9a96c1bbdf057a351f8d5ad2cf8f309203791071e9d51b50345a5cf066fa8b73acfa0b8cdad0700ccffd7c88b6026aa4718bb03d0fa14643a5a06af23d7ce5116a15a3e077e3eaec103bf3dd053c2f92834378be5adabf62ea1", 0xc7}], 0x4, &(0x7f0000000b00)=[{0x80, 0x10c, 0x7, "2a820e2c05e4731fd71bfd2e171c7ea97da65ea9e996360d95cd0a712f414917e79d9a664f3ab728def488964a76c4bd729ec591b57989540b95eb3c192c2db3e1562eb39aff7dcec39bc950fe6274c0d687335601ace020441a5fe5f1eae789d99b2cc203dcb0ea08147b"}, {0xa8, 0x109, 0xfff, "705acaba7153f03a75b8407ba4bc2da7dd7453fd1ab9de7f0b210979c9b20f72c8aabe935ae0252a33b7da50f05ff01e1169fa3583902b142e76148923cee2738225cd5c0a18f75c9e4cfee2f4c6b275efc58ee89f99af8fc8e01681ed6bd627dfd3296f94a4c39593fdfa3b7f97f299612c67e3200a19b705fd56334ca8e53d37f604c15a3cbcec02c955decb30ed24f2b5"}], 0x128}}, {{&(0x7f0000000940)=@in6={0xa, 0x4e21, 0x6, @private0, 0xff}, 0x80, &(0x7f0000000f80)=[{&(0x7f00000009c0)="7cf73b0766dfb39ec69f4ce0062f12f6e5bb28ce4894873c031088a00c1b2731f74cf392484296d86b5c4de133e07234d49ffea41ba3ccc4b2abf72981802a3bce511f0f1518f0b22b4f253529c48e36b2f51ef54c5371e45ed35e59aa9166fab2345d1ed50afab81076bc", 0x6b}, {&(0x7f0000000c40)="441c85761634485b1b8640b5b791c5c3bfe7888b7fccc2cb54a703d24c784cd3a1f8136cf1cbd45e51e0109fbeb7744e6e59b9d0a6055dd5d29b0e0241183b004fc6387932db82b2ddc433eaee22c8ab8aa06396522866de7365a270833ad5d3ffdefb715a57f62ce178a0d947572d96c978d90da2050efaaed29f96db2d84", 0x7f}, {&(0x7f0000000cc0)="c731b2627f6b059f69e7e675ffd1f05ccbcca97e57f963f9597296432d15605deabba6fc0b251c84f2899974153ebaf8a391b1577072916ca04cc69b22c749d5b2627675a074487a4c8b3369df62f88fb37d1ca403c48c63fbbf41c433f2b06c84e538bca97c682b69542d19bebf0e05fb7068bcbbde08eb6db2dff444e7ab92286516b44c89a4f936df3a58d2517da790454c9d689e5dc76660f9d2f1aab4aace12641bf985ce31", 0xa8}, {&(0x7f0000000d80)="61f4280c3a9ebc8f7fad37ccb77280f98872e6a25f942e88e6810291ff42eb76941555ba2e46449a3c544b65ed36fc95adb5228cb0ca974e2d79573d6484b4da7d6f59632bf22ae86fe11afac3eb22fe15b438afc0d5785aa0e803c161488e5c6a15240bc9378f11c8e46dd7dbc649ba0fe59376b4f25fc9a4b9d7905692ba9ffd274d1f7a14f0b9fd3058cd02c2297f9d366f7a76e5a65a06353ba37f91930297fbfde1738749e30ab2b47d09b67a7249576b34b0d4f67a0f57d94730a8284cfce6895e2c63c0ec9e9b5d1a2fcab5353449d0b6f4c1233eb051", 0xda}, {&(0x7f0000000380)="fbf653eb0f6b18a3df1bf85e", 0xc}, {&(0x7f0000000e80)="105584c06d39448552468fea674035620f735d897a521be582fbed217a34e937fa817d230426835ebf2fbcb1dbd31f1b2a8bd1daa41ad8e05494f24c5df17cbba275fff478145a713fa45c79e39870d1a5a2ee8d5a707509143b4a6310f9cefe40", 0x61}, {&(0x7f0000000400)="265011517798e3f5bccd32fa0b62aada7264239168917b7eb875ba9ecf6489a7976a65ea44426a6b947bc2310b", 0x2d}, {&(0x7f0000000f00)="83bb6f34d94b44882f822c3c33c716f574d0272b1beb6f47af2911d06ddb0981ad34ffe8538487ac6901e40d42166dc1870a15a5a8a439ab6376b754e7f19cf0721a47c8007d7e75d208bbd3a1a33e6c791147e648e80abdf8c4b8e10db8642a4a7204c95a85727aae23e3", 0x6b}], 0x8, &(0x7f0000001000)=[{0x50, 0x118, 0xbff, "5dae9c88eda0d031d338cf6333ee2ccd985dcfb522bd6d03886a6833a9caf69d15a04fae97e1c43489592f97796cb9db0a89dd6ac61e8cc66b08b9aaa699e6"}], 0x50}}], 0x2, 0x20008801) r5 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fsetxattr$system_posix_acl(r5, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="02"], 0xfe44, 0x0) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000100)) ioctl$PPPIOCSACTIVE(r1, 0x40107446, &(0x7f00000003c0)={0x1, &(0x7f0000000080)=[{0x40, 0x1, 0x2, 0x9}]}) 1m49.413813062s ago: executing program 3 (id=68): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x1, 0x6}, 0x100000, 0x0, 0x0, 0x8, 0x40, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000040), 0xfe, 0x4f2, &(0x7f0000000b00)="$eJzs3d9rHFsdAPDvTHbvbdpcN1d9uF6wLbaSFO0maWwbfKgKok8Ftb7XmGxDyCZbkk3bhKIp/gGCiAq+6JMvgn+AIP0TRCjou6gooq0++FAd2d3ZmKa7+UE3u97s5wMnc8782O85GebsnJlhJ4ChdTEiJiMiy7LsSkSU8vlpnmKnlRrrvXj+eKGRksiyO39LIsnntT/r7Xx6Lt/sTER87csR30xej7uxtb0yX61W1vPyVH01eZll21eXV+eXKkuVtdnZmRtzN+euz033pJ3jEXHri3/6wXd/9qVbv/r0w9/f/cvkt1oNbNnbjl5qNb3Y/F+0FSJi/SSCDUih2cKW6wOuCwAAB2uc7384Ij4REVeiFCPNszkAAADgNMk+NxYvk9b9PwAAAOB0SiNiLJK0nD/vOxZpWi63nuH9aJxNq7WN+qey0u71gvEopveWq5Xp/NmB8SgmjfJM/oxtu3xtX3k2It6NiO+XRpvl8kKtujjQKx8AAAAwPM7tG///s9Qa/wMAAACnzPigKwAAAACcOON/AAAAOP2M/wEAAOBU+8rt242Utd9/vfhga3Ol9uDqYmVjpby6uVBeqK3fLy/VakvN3+xbPezzqrXa/c/E2uajqXploz61sbV9d7W2uVa/u/zKK7ABAACAPnr3wtPfJRGx89nRNCKyZM+yYkQ2snflQv/rB5yc9Dgr//Hk6gH038igKwAMjFN6GF7FQVcAGLjD+oGuD+/8uvd1AQAATsbEx3bv/zdTw1v5smSgNQNOWn7/P3Gsw/Bx/x+Gl/t/MLyKB50BGBTAqZce4VB/8/v/WXasSgEAAD031kxJWs7HAWORpuVyxDvN1wIUk3vL1cp0RHwoIn5bKr7dKM80t0xcHgAAAAAAAAAAAAAAAAAAAAAAAACAI8qyJLIuRnfXAQAAAD7IItI/J/n7vyZKl8f2Xx94K/lXqTmNiIc/vvPDR/P1+vpMY/7fd+fXf5TPv9bvqxcAAABAJ+1xenscDwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC99OL544V26mfcv34hIsY7xS/Emeb0TBQj4uw/kijs2S6JiJEexN95EhHvdYqfNKoV43kt9sdPI2J0wPHP9SA+DLOnjf7n852OvzQuNqedj79Cnt5U9/4v3e3/Rrr0f+90+sD09VnvP/vFVNf4TyLeL3Tuf9rxky7xLx2xjd/4+vZ2t2XZTyMmOn7/JK/EmkoK96c2travLq/OL1WWKmuzszM35m7OXZ+bnrq3XK3kfzvG+N7Hf/mfg9p/tkv88UPaf/mI7f/3s0fPP9LKFvctKsZPsmzyUuf9/16X+O3vvk/mu7tRnmjnd1r5vc7//DfnLxzQ/sUu7T9s/08esf1XvvqdPxxxVQCgDza2tlfmq9XK+vEyScTOG2wuM1yZ0ehj0Pk4aJ32SWwf6vPtPNT/xS44dmZwfRIAAHAy/nfSP+iaAAAAAAAAAAAAAAAAAAAAwPA67GfAogc/J7Y/5s5gmgoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAcKD/BgAA//+6ychX") r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000280)={0xfffffffffffffffe, 0x5}) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000080)=0x5, 0x4) bind$bt_hci(r2, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) recvmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}, 0x4000009}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=""/218, 0xda}, 0xf}], 0x2, 0x2040, 0x0) r3 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) r5 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101201) ioctl$USBDEVFS_CONTROL(r5, 0xc0105500, &(0x7f0000000040)={0x3, 0x17, 0x302, 0x0, 0x0, 0xff, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r6 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x200012, &(0x7f0000000100)=ANY=[@ANYRES8=r6, @ANYRESDEC, @ANYRES32=r6], 0x1, 0x52b, &(0x7f0000001600)="$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") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) syz_clone(0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa) 1m48.91610357s ago: executing program 3 (id=83): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000300)=@ipv4_newnexthop={0x1c, 0x68, 0x11, 0x0, 0x0, {}, [@NHA_GROUP={0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4008894}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYRES8=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = fsmount(0xffffffffffffffff, 0x0, 0xe) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'veth1_to_hsr\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)=@gettfilter={0x3c, 0x2e, 0x300, 0x70bd26, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, {0xfff2, 0xffe0}, {0x0, 0x3}, {0x0, 0xffff}}, [{0x8, 0xb, 0xc9d}, {0x8, 0xb, 0x4}, {0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4010}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="05000000050000000100000004"], 0x48) close(0x3) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$mptcp(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r6, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000200)={0x20, r7, 0x1, 0x0, 0x0, {0x7}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x1}]}]}, 0x20}}, 0x0) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r3, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000400)=ANY=[@ANYBLOB="02000000", @ANYRES16=r7, @ANYBLOB="010028bd7000ffdbdf250600000008000300000000001c00068008000700", @ANYRES32=r4, @ANYBLOB="060005004e240000060005004e2400000800040009000000"], 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x8800) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000140)=ANY=[@ANYBLOB="1802000000000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b703000000000000850000000400000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000300)='tlb_flush\x00', r8}, 0x10) syz_clone(0x40400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000006c0)='kmem_cache_free\x00', r2}, 0x10) r9 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r11}, 0x10) kcmp(r9, r9, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) clock_gettime(0x0, &(0x7f00000001c0)) 1m48.170565837s ago: executing program 3 (id=94): r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open$cgroup(&(0x7f00000001c0)={0x9, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0xa, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1700deedc69ad061db7e0000374c681fb6841b59ff0000000000000069dad99b8e84a8cc06c8c6d1d6e1d3169151e01082fe51b3c4c7e1284b69468f940812b8a5ab5f3e14319d2be601d9b463d1eb4126a2197a3cf0015c014bd1d6f3d4e03a21529a24afd0dfa80b8c744dc3c1a29cf9a86685a4b941587727ae56877b2d3ee35c16dc76dfdaf524a18d6965d5b35636fd22", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000001000d40000000000000000000000000a20000000000a03000000000000000000010000000900010073797a3000000000bc000000160a01000000000000000000010000000900010073797a30000000000900020073797a30000000009000038008000240000000007c00038014000100626f6e64300000000000000000000000140001006970766c616e31000000000000000000140001006970766c616e300000000000000000001400010073697430000000000000fbffffffffffffff0100776c616e300000000000000000000000140001006772653000000000000000000000040008000140000000005c000000180a01010000000000000000010000000900020073797a30000000000900010073797a3000000000300003802c0003"], 0x4b0}, 0x1, 0x0, 0x0, 0x44}, 0x40080c0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e02003c000b05d25a806f8c6394f90124fc600c05000f90c60100053582c137153e370a48018004f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x5}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0100000000000000000010000000080007000000002018000180140002006e657464657673696d300000000000000800080000000000080009"], 0x44}}, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000000)={0x23, 0x0, 0x4, 0x7, 0x915}) 1m48.150965817s ago: executing program 32 (id=94): r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open$cgroup(&(0x7f00000001c0)={0x9, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0xa, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1700deedc69ad061db7e0000374c681fb6841b59ff0000000000000069dad99b8e84a8cc06c8c6d1d6e1d3169151e01082fe51b3c4c7e1284b69468f940812b8a5ab5f3e14319d2be601d9b463d1eb4126a2197a3cf0015c014bd1d6f3d4e03a21529a24afd0dfa80b8c744dc3c1a29cf9a86685a4b941587727ae56877b2d3ee35c16dc76dfdaf524a18d6965d5b35636fd22", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x4b0}, 0x1, 0x0, 0x0, 0x44}, 0x40080c0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e02003c000b05d25a806f8c6394f90124fc600c05000f90c60100053582c137153e370a48018004f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x5}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0100000000000000000010000000080007000000002018000180140002006e657464657673696d300000000000000800080000000000080009"], 0x44}}, 0x0) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000000)={0x23, 0x0, 0x4, 0x7, 0x915}) 1m43.344920267s ago: executing program 1 (id=165): mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) pipe2(&(0x7f0000000040), 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='rtc_alarm_irq_enable\x00', 0xffffffffffffffff, 0x0, 0x4000000}, 0x18) mount(0x0, &(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)='devtmpfs\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x69) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000003000083850000002d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='kfree\x00', r0, 0x0, 0x8000000000000000}, 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={0x34, r2, 0x7, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_LINKMODES_OURS={0x8, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4}]}]}, 0x34}}, 0x0) unshare(0x40040080) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000005, 0x8031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$l2tp(0x2, 0x2, 0x73) socket(0x0, 0xa, 0x8) r3 = getpid() setreuid(0xee00, 0x0) r4 = syz_pidfd_open(r3, 0x0) setns(r4, 0x24020000) syz_clone3(&(0x7f00000008c0)={0x95340580, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r3], 0x1}, 0x58) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000580)={'veth1_virt_wifi\x00', 0x0}) bind$packet(r5, &(0x7f0000000080)={0x11, 0x0, r6, 0x1, 0x0, 0x6, @multicast}, 0x14) sendmsg$unix(r5, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=[@cred={{0x1c}}], 0x20, 0x4040011}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000900)={'bridge0\x00'}) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) 1m41.82836428s ago: executing program 1 (id=186): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x105740, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/netstat\x00') pread64(r3, &(0x7f000001a240)=""/102400, 0x19000, 0x100008) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000018c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r4, 0x4058534c, &(0x7f0000000080)={0x80, 0x0, 0x2}) dup3(r2, r4, 0x0) 1m41.80380591s ago: executing program 1 (id=189): mkdir(&(0x7f0000000400)='./file0\x00', 0x1c0) pipe2$9p(&(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x281c2, 0x0) fcntl$setlease(r2, 0x400, 0x1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000008c0)=ANY=[@ANYBLOB, @ANYRES32=r4, @ANYBLOB], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000000600)={[{@delalloc}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@dioread_lock}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x5}}, {@nobarrier}, {@data_err_ignore}, {@grpquota}, {@nobh}, {@user_xattr}, {@bh}, {@dioread_nolock}]}, 0x1, 0x55a, &(0x7f0000001600)="$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") fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) getdents64(r5, &(0x7f0000000100)=""/71, 0x47) getdents64(r5, 0x0, 0x44) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x6, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x764922f6ef795283}, 0x8, 0x0, 0x9, 0x0, 0x0, 0x40}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = dup(r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000500)='9p_client_req\x00', r6}, 0x10) mprotect(&(0x7f00002d3000/0x3000)=nil, 0x3000, 0x2) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[], [], 0x6b}}) ioctl$AUTOFS_IOC_FAIL(0xffffffffffffffff, 0x4c80, 0xffffffffffffffb6) 1m41.463669259s ago: executing program 1 (id=201): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800000000003}, 0x1100, 0x5dd8, 0x3, 0x5, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000f"], 0x48) r1 = accept4(0xffffffffffffffff, &(0x7f00000002c0)=@isdn, &(0x7f0000000040)=0x80, 0x1000) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000010000000850000000700000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r2}, 0x10) msgctl$MSG_STAT_ANY(0x0, 0xd, &(0x7f0000000180)=""/102) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f00000001c0)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x89101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000280)='./file0\x00', &(0x7f0000000480)='./file0/../file0\x00', 0x0, 0x21adc51, 0x0) unshare(0x22020600) open_tree(0xffffffffffffff9c, &(0x7f0000001800)='./file0/../file0/file0\x00', 0x89901) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000), r1) 1m41.348389938s ago: executing program 1 (id=204): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000059c0)='./bus\x00', 0x1400e, &(0x7f00000000c0)={[{@quota}]}, 0x1, 0x439, &(0x7f0000000580)="$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") r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r3, &(0x7f0000000140)='2', 0x1, 0x8000c61) r4 = open(&(0x7f0000000080)='./file1\x00', 0x40001, 0x0) fallocate(r4, 0x8, 0x2000, 0x10000) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000140)=0x7, 0x4) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f00000003c0)={0x0, 0xd4, "5f75475e1a8546bde5ad84e411573e8eeaef4b921ff492416404b8bb9614b4caa946a49f62d671546b1ef48badd457bc1a23a6e4061a31b2ceda452540af3198b68e57ee05d2044d0cf2871f3a5c2f5d1d642232b8fe6d6dace648ff260c60b596a311b151bab5f67e4e0d724ce2ce8be2fdaa91ec0253499a99aa0d06240cadfa33d70d3e130c63595262baa330dde737db292b9f3641a0595a7b585f24d3950011b418dea1136bcac95bf4d9a71695fc504e5171f11b1c43ef2c33a25a2a8e314ff6b5b1402ce22502d644e4ed1f62d9342f94"}, &(0x7f0000000200)=0xdc) setsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f00000002c0)={r5, 0x4, 0x8, 0x9, 0x0, 0x8}, 0x14) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000001280)=@newtaction={0x850, 0x31, 0x3d, 0x0, 0x0, {}, [{0x83c, 0x1, [@m_police={0x838, 0x0, 0x0, 0x0, {{0xb}, {0x80c, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x800000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, @TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcd, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8bf5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff]}]]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x850}}, 0x0) 1m41.082613787s ago: executing program 1 (id=212): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001940)=@newtaction={0xe98, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe84, 0x1, [@m_pedit={0xe80, 0x1, 0x0, 0x0, {{0xa}, {0xe54, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe50, 0x2, {{{}, 0x97, 0x0, [{}, {}]}, [{0x3}, {}, {}, {}, {}, {0x448eade7}, {0x0, 0x0, 0x80000000}, {}, {0x0, 0x8}, {0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x4}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, {}, {}, {0x2}, {}, {0xfffffffc}, {0x0, 0xe}, {}, {}, {0x0, 0x4, 0x0, 0x0, 0x4}, {}, {}, {0x0, 0x0, 0x0, 0xfffffffc, 0xca7}, {}, {}, {}, {}, {}, {}, {}, {}, {0xfffffffe}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x10}, {}, {}, {0x2, 0x0, 0x0, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x2, 0x0, 0x8000000}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x3}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, {0x0, 0x0, 0x0, 0x0, 0x6}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xe10}, {}, {}, {}, {}, {}, {}, {}, {0xffffffff}, {}, {0x9cb}, {}, {0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x10efa6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xb}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x5}, {0x0, 0x1}, {0x4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {0x5}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe98}}, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f0000001c00)='kmem_cache_free\x00', r3, 0x0, 0x8000000000}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f0000001c00)='kmem_cache_free\x00', r3, 0x0, 0x8000000000}, 0x18) open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) (async) r4 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r4, 0x400, 0x0) io_uring_register$IORING_REGISTER_RESTRICTIONS(r1, 0xb, &(0x7f00000001c0)=[@ioring_restriction_sqe_flags_allowed={0x2, 0x21}, @ioring_restriction_sqe_op={0x1, 0x13}], 0x2) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000000f4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000008c0)='sys_enter\x00', r6}, 0x10) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) (async) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) (async) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r8 = gettid() sendfile(r7, r5, &(0x7f00000004c0)=0x8000000000, 0x76) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) readv(r9, &(0x7f0000001340)=[{&(0x7f0000001280)=""/151, 0x97}], 0x1) readv(r9, &(0x7f0000001240)=[{0x0}], 0x1) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0100000004000000e27f00000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000ba626f18cfd54047388f00000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r11}, 0x10) r12 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r12, 0x11b, 0x6, &(0x7f0000000080)=0x1, 0x4) (async) setsockopt$XDP_UMEM_COMPLETION_RING(r12, 0x11b, 0x6, &(0x7f0000000080)=0x1, 0x4) close_range(r12, r12, 0x0) (async) close_range(r12, r12, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r8}, &(0x7f0000bbdffc)) (async) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r8}, &(0x7f0000bbdffc)) 1m41.064815587s ago: executing program 33 (id=212): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00', r0}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001940)=@newtaction={0xe98, 0x30, 0x871a15abc695fa3d, 0x0, 0x0, {}, [{0xe84, 0x1, [@m_pedit={0xe80, 0x1, 0x0, 0x0, {{0xa}, {0xe54, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe50, 0x2, {{{}, 0x97, 0x0, [{}, {}]}, [{0x3}, {}, {}, {}, {}, {0x448eade7}, {0x0, 0x0, 0x80000000}, {}, {0x0, 0x8}, {0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x4}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, {}, {}, {0x2}, {}, {0xfffffffc}, {0x0, 0xe}, {}, {}, {0x0, 0x4, 0x0, 0x0, 0x4}, {}, {}, {0x0, 0x0, 0x0, 0xfffffffc, 0xca7}, {}, {}, {}, {}, {}, {}, {}, {}, {0xfffffffe}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x10}, {}, {}, {0x2, 0x0, 0x0, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x2, 0x0, 0x8000000}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x3}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, {0x0, 0x0, 0x0, 0x0, 0x6}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0xe10}, {}, {}, {}, {}, {}, {}, {}, {0xffffffff}, {}, {0x9cb}, {}, {0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x10efa6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xb}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x5}, {0x0, 0x1}, {0x4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {0x5}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe98}}, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f0000001c00)='kmem_cache_free\x00', r3, 0x0, 0x8000000000}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f0000001c00)='kmem_cache_free\x00', r3, 0x0, 0x8000000000}, 0x18) open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) (async) r4 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) fcntl$setlease(r4, 0x400, 0x0) io_uring_register$IORING_REGISTER_RESTRICTIONS(r1, 0xb, &(0x7f00000001c0)=[@ioring_restriction_sqe_flags_allowed={0x2, 0x21}, @ioring_restriction_sqe_op={0x1, 0x13}], 0x2) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000000f4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000008c0)='sys_enter\x00', r6}, 0x10) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) (async) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) (async) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r8 = gettid() sendfile(r7, r5, &(0x7f00000004c0)=0x8000000000, 0x76) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) (async) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) readv(r9, &(0x7f0000001340)=[{&(0x7f0000001280)=""/151, 0x97}], 0x1) readv(r9, &(0x7f0000001240)=[{0x0}], 0x1) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0100000004000000e27f00000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000ba626f18cfd54047388f00000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r11}, 0x10) r12 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r12, 0x11b, 0x6, &(0x7f0000000080)=0x1, 0x4) (async) setsockopt$XDP_UMEM_COMPLETION_RING(r12, 0x11b, 0x6, &(0x7f0000000080)=0x1, 0x4) close_range(r12, r12, 0x0) (async) close_range(r12, r12, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r8}, &(0x7f0000bbdffc)) (async) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r8}, &(0x7f0000bbdffc)) 1m30.865174544s ago: executing program 2 (id=404): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x141a82, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000240000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r1}, 0x10) write$RDMA_USER_CM_CMD_REJECT(r0, 0x0, 0x0) 1m30.853176114s ago: executing program 2 (id=406): syz_emit_ethernet(0x17c, &(0x7f0000000a40)={@broadcast, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "e8ff00", 0x146, 0x3a, 0xff, @local, @mcast2, {[@hopopts={0x32, 0x10, '\x00', [@hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @padn={0x1, 0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x18, {0x2, 0x4, 0x4, 0x8000, [0xc, 0x7]}}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x9}, @enc_lim={0x4, 0x1, 0x8}, @enc_lim={0x4, 0x1, 0x3}, @calipso={0x7, 0x38, {0x2, 0xc, 0xd8, 0x7, [0x6, 0x3, 0x80000001, 0x0, 0x4, 0x54ac]}}]}], @ndisc_ns={0x87, 0x0, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, [{0x0, 0x14, "51689209c05602c38ea65a59a8d20cf10f4721a02aeae8ba6124599c49203dbc02733cd0d0698f44cdbd3f5d84ad37b5e7af38b258d90d4495f43100f47318f4bff0596d73f981a22fbb9e0efb5fd1fb8a580c161bc9cb5822a4233baf5b07941c6529c553e450a4d4f81ff19509fc97af68ed80ed63eb64e2ca76348c5a4f04b99b127e8e7425752a9d6a6a58a7643819048ae80b53e934528a999badd4d75f"}]}}}}}}, 0x0) mkdir(&(0x7f0000002880)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000002880)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000100), 0x80000) (async) pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$P9_RVERSION(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) (async) write$P9_RVERSION(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1500000065ffff018000000800395032303030"], 0x15) dup(r0) r1 = perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0xc0, 0x9, 0x2, 0xf, 0x0, 0x2f, 0x6b260, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000140), 0xc}, 0x100486, 0x7, 0x2, 0x9, 0x672, 0x4d78, 0x9, 0x0, 0x5, 0x0, 0x6d2a}, 0x0, 0xb, 0xffffffffffffffff, 0xa) ioctl$EXT4_IOC_GETFSUUID(r1, 0x8008662c, &(0x7f0000000240)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x6ca180, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYRES8=0x0], &(0x7f0000000100)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffee2, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0xffffffffffffffc3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x2000410, &(0x7f0000000000)={[{@commit={'commit', 0x3d, 0x5}}]}, 0x1, 0x79f, &(0x7f00000012c0)="$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") (async) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x2000410, &(0x7f0000000000)={[{@commit={'commit', 0x3d, 0x5}}]}, 0x1, 0x79f, &(0x7f00000012c0)="$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") r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x1, 0xa, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) open_tree(0xffffffffffffff9c, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x143042, 0x0) pwritev2(r6, &(0x7f0000000100)=[{&(0x7f0000000080)="ff", 0xabfb}], 0x1, 0x5405, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f00000001c0)='signal_generate\x00', r3}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f00000001c0)='signal_generate\x00', r3}, 0x10) r7 = socket$kcm(0x2, 0xa, 0x2) r8 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r8, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000051401"], 0x20}, 0x1, 0x0, 0x0, 0x2400c010}, 0x0) (async) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r8, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="20000000051401"], 0x20}, 0x1, 0x0, 0x0, 0x2400c010}, 0x0) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) (async) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0b000000080000000c0000000400000001"], 0x50) (async) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0b000000080000000c0000000400000001"], 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000001040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kfree\x00', r10}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x2405, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0xd) write$tun(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="034886dd09032800030030000000600000000032890081e949b93897bc3b0000000000007d01ff020000000000000000000000000001"], 0xfdef) 1m30.413209732s ago: executing program 2 (id=418): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000000c0)=ANY=[@ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000c00)=ANY=[@ANYBLOB="140000001000d40000000000000000000000000a20000000000a03000000000000000000010000000900010073797a3000000000bc000000160a01000000000000000000010000000900010073797a30000000000900020073797a300000000090000380"], 0x4b0}, 0x1, 0x0, 0x0, 0x44}, 0x0) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x5c, 0x2, 0x6, 0x401, 0x0, 0x0, {0x2, 0x0, 0x4}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004040}, 0x20004000) dup3(r0, r0, 0x80000) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000080)='kfree\x00', r3, 0x0, 0x2}, 0x18) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000080)=@chain={'key_or_keyring:', r4}) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f00000002c0)={0x1, {{0xa, 0x4e20, 0x1, @empty, 0x7fff}}}, 0x88) 1m30.314858051s ago: executing program 2 (id=421): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x1, 0x6}, 0x100000, 0x0, 0x0, 0x8, 0x40, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000040), 0xfe, 0x4f2, &(0x7f0000000b00)="$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") r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000280)={0xfffffffffffffffe, 0x5}) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$sock_int(r2, 0x1, 0x10, &(0x7f0000000080)=0x5, 0x4) bind$bt_hci(r2, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) recvmmsg(r2, &(0x7f0000000280)=[{{0x0, 0x0, 0x0}, 0x4000009}, {{0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=""/218, 0xda}, 0xf}], 0x2, 0x2040, 0x0) r3 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) r5 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101201) ioctl$USBDEVFS_CONTROL(r5, 0xc0105500, &(0x7f0000000040)={0x3, 0x17, 0x302, 0x0, 0x0, 0xff, 0x0}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) r6 = getuid() syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000040)='./file0\x00', 0x200012, &(0x7f0000000100)=ANY=[@ANYRES8=r6, @ANYRESDEC, @ANYRES32=r6], 0x1, 0x52b, &(0x7f0000001600)="$eJzs1bGKE1EUBuCz2bhGq63F4oKN1bLaWRmRLCwOCEoErQxsbDIiZJpJqn0EH8AHs/AhJNV2kWUS466WzkxIvq/J4f6ZOfdchpmPDz9PLr4Un75//Ra9/kF0+nGvc3UQx9GJtcsAAHbJ1XIZP5eVtvcCADTD9x8A9s/b9x9evciywZuUehGLy3JYDqvfKj87zwan6drRH1ctynJ4+Dt/kio38ztxf5U//Wd+FI8fVfl19vJ1diu/Gxe1Tw8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPvtJKVuRKSU0vFmdVGWw8MqP0lrt/KqOjvPBqerP9zMu/Gg29gYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwH9QzOaTUZ6PpztWRPyIhpv2Vkdae693EbFZ6a/absvJ11k8r+POzyJiWwZsuli/BjYP718RAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACwb4rZfDLK8/G0aHsnAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMC2KGbzySjPx9Mai7ZnBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANrxKwAA//9LaiYQ") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) syz_clone(0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xa) 1m29.391396717s ago: executing program 2 (id=430): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000980)=ANY=[@ANYBLOB="020000000000000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000300000002000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000002000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x210) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) close_range(r2, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000cc0)=@raw={'raw\x00', 0x8, 0x3, 0x368, 0x0, 0x43, 0xa0, 0x0, 0x98, 0x2d0, 0x178, 0x178, 0x2d0, 0x178, 0x49, 0x0, {[{{@ip={@empty=0x5107, @multicast2, 0x0, 0x0, 'veth0_to_bond\x00', 'ip6erspan0\x00', {0xff}, {}, 0x9}, 0x12a, 0x1a0, 0x1c0, 0x0, {0x0, 0x7a010000}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x4, 0x0, 'syz0\x00'}}, @common=@unspec=@connbytes={{0x38}, {[{}, {0xe}]}}]}, @unspec=@TRACE={0x20}}, {{@uncond, 0x0, 0xe0, 0x110, 0x0, {}, [@common=@unspec=@cluster={{0x30}, {0x2, 0x0, 0x1ff}}, @common=@unspec=@connlimit={{0x40}, {[0xffffff00, 0xff, 0xffffff00, 0xff000000], 0x3, 0x1, {0x4413}}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x0, 0x5}, {0x1, 0x4, 0x5}, 0xb}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x3c8) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f00000700000000df4f77", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYRESDEC=r5], 0x0, 0x8, 0x0, 0x0, 0x40f00, 0x22, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r7}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r6}, &(0x7f0000000000), &(0x7f0000000040)='%pB \x00'}, 0x20) kexec_load(0x0, 0x1, &(0x7f0000000140)=[{0x0, 0x3e00, 0x116094000, 0x41000000}], 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/26], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r9}, 0x10) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x0) 1m28.918121115s ago: executing program 2 (id=435): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0xa6) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close_range(r4, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) io_uring_setup(0x7d1, &(0x7f0000000580)={0x0, 0xddf9, 0x2, 0xfffffffe, 0x183}) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) r7 = io_uring_setup(0x6a0, &(0x7f0000000180)) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000100)={'vxcan1\x00'}) close_range(r7, 0xffffffffffffffff, 0x0) 1m28.903187405s ago: executing program 34 (id=435): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x4, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0xa6) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close_range(r4, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) io_uring_setup(0x7d1, &(0x7f0000000580)={0x0, 0xddf9, 0x2, 0xfffffffe, 0x183}) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) r7 = io_uring_setup(0x6a0, &(0x7f0000000180)) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000100)={'vxcan1\x00'}) close_range(r7, 0xffffffffffffffff, 0x0) 24.811220795s ago: executing program 5 (id=1175): creat(&(0x7f00000000c0)='./bus\x00', 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r0 = creat(&(0x7f0000000300)='./bus\x00', 0x14) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./file2\x00', 0x8c2050, &(0x7f0000000200)=ANY=[], 0x1, 0x1207, &(0x7f0000003bc0)="$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") dup3(r1, r0, 0x0) io_setup(0x6, &(0x7f0000000240)=0x0) io_submit(r2, 0x3f0a, &(0x7f0000000540)=[&(0x7f00000000c0)={0xf04aef, 0x3d8, 0x8, 0x0, 0x0, r0, &(0x7f0000000000), 0x200a00}]) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000010000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000500)='9p_client_req\x00', r3}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = dup(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000500)='9p_client_req\x00', r5}, 0x10) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[], [], 0x6b}}) 24.379291893s ago: executing program 5 (id=1181): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e0000000400000008"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0)=@gcm_128={{0x304}, "a71b753cd82e7936", "bd5040d66b3a4ad07b777982ae21755a", "f17853f2", "19b65d8e71d81de0"}, 0x28) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f0000000040)=0xa, 0x1959cc36) sendmmsg$inet6(r0, &(0x7f0000001200)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4000040) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r1, &(0x7f0000000a80)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @remote, 0x19}, 0x1c, &(0x7f0000000c40)=[{&(0x7f00000001c0)="4bd48e7c9cc05ee68ff2d5594112b8fe14214cc23e1859ef1d3bca97462d97fdcc5bf2f7eb59fef416b76956d8f3b56331725c3216e55bc5c87f0ec06e53756c", 0x40}, {&(0x7f0000000d40)="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", 0x581}], 0x2, 0x0, 0x590}}], 0x1, 0x8000001) 24.273388112s ago: executing program 5 (id=1183): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, @void, @value}, 0x94) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) shutdown(r1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0xa, @remote, 0xc}]}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000001c0)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xd4}, 0x9c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000340)={r2, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x9c) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='mm_page_free\x00', r0}, 0x10) 24.065141722s ago: executing program 5 (id=1187): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000072000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000200000000000000001809"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1b0000000000d43d0663a42b3f00000000000000001a0000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000df000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='workqueue_activate_work\x00', r3, 0x0, 0xb}, 0x18) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000100)={0x4c, 0x2, 0x6, 0x801, 0x0, 0x0, {0x0, 0x0, 0x40}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}]}, 0x4c}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000100)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006, 0x0, 0x6, 0x3ff}]}, 0x10) sendmsg$nl_route(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="20000100", @ANYRES32, @ANYBLOB="00032500200100ed00"], 0x38}}, 0x8040) sendmsg$IPSET_CMD_ADD(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)={0x4c, 0x9, 0x6, 0x201, 0x0, 0x0, {0x5, 0x0, 0xffff}, [@IPSET_ATTR_DATA={0x24, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @rand_addr=0x64010100}}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x400002}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x40c0080) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r8 = socket$igmp6(0xa, 0x3, 0x3a) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=ANY=[@ANYBLOB="14000000100001000000000000a739bfe0cc2f0000000000000a28000000000a0101000000005e1affd50200000009000100737968300000000008000240000000032bd39ad4030a01030000e6ff000011cde4d6d9621763b3c4070000020000000900010073697a30000000cebd994194000900030073797a32"], 0x7c}}, 0x4008050) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB="50e40000000000000000000000000000000000009244f526e4682cbbd37ccecc169a97095505933356ea4ff05f1c09e319306361775c406ad8126bffffe4a7734862154734b0ac3e883df9a67455657c3adb2772177352d59632d4b020d059272dfa0b8ab639952922188c28c373a38062549db953ce57a071521ee1973e539427ced7b046520429e6e84fa96b9acf45e66315a06a226d5d094044f2d108e6148d2d0bf21be4bdbf35136df8dcfea5aaee8a0fb60d783952c513ed072e2182f461ca0e9b2a91e7b66dd9f560d5512486ec1139b0a54e6b40f4", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r10}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r10, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) setsockopt$MRT6_ADD_MFC(r8, 0x29, 0x22, &(0x7f0000000080)={{0xa, 0x0, 0x101, @rand_addr=' \x01\x00'}, {0xa, 0x0, 0x0, @dev}, 0x0, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}}, 0x9e) syz_emit_ethernet(0x72, &(0x7f0000000000)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "e400ff", 0x3c, 0x3a, 0x0, @private2, @mcast2, {[], @param_prob={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, '\x00', 0x0, 0x11, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast1}, [], "17c17f079171000700880000"}}}}}}}, 0x0) 21.771711952s ago: executing program 5 (id=1198): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e25, 0x4000000a, @mcast2, 0x7}, 0x1c) write(r1, &(0x7f0000000300)="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", 0xfc4c) 21.570223811s ago: executing program 5 (id=1199): r0 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000100), 0x120) sendmsg$kcm(r0, &(0x7f0000000380)={&(0x7f0000000040)=@ax25={{0x3, @bcast, 0x1}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, 0x0}, 0x240440d1) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='kmem_cache_free\x00'}, 0x10) r2 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0xa042) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYRES64=r2], &(0x7f0000000340)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) sendto$packet(r4, &(0x7f0000000000)="60008104", 0x4, 0x0, &(0x7f0000000080)={0x11, 0x8100, r5, 0x1, 0xff, 0x6, @local}, 0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='netlink_extack\x00'}, 0x10) ioctl$PTP_PEROUT_REQUEST2(r1, 0xc0603d0f, &(0x7f00000003c0)={{}, {0x0, 0x1}}) socket$nl_netfilter(0x10, 0x3, 0xc) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000fc850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x57, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x2041, 0x0) ioctl$TCSETS(r7, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, "0062ba7d82000000000000000000f7ffffff00"}) r8 = syz_open_pts(r7, 0x0) ioctl$TIOCGSOFTCAR(r8, 0x5419, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r6}, 0x18) setitimer(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0xffffffff, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sync() pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r9 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r9, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0xffff, 0x0, @empty, 0x10000}}, {{0xa, 0x0, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}}}, 0x108) sync() syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000001240)='./file0\x00', 0x0, &(0x7f0000002480)=ANY=[], 0x1, 0x11f4, &(0x7f0000001280)="$eJzs3M+LG2UYB/DHbWvr1v2h1moL0he96GXo7sGLgiyyBWlAaRuhFYSpO9GQMQmZsBARV09e/TvEozdBvOllL/4N3vbisQdxxMTapsRDqXTa8Plc8pD3/cLzkjDwDvPO0ZvffNrrVFknH8fKE2/FyjAi3UqRYiVu+zJee+PnX166ev3G5Z1Wa/dKSpd2rm29nlJav/DjB59/9/JP49Pvf7/+w8k43Pzw6Pft3w7PHp47+vPaJ90qdavUH4xTnm4OBuP8ZlmkvW7Vy1J6ryzyqkjdflWM5sY75WA4nKS8v7e2OhwVVZXy/iT1ikkaD9J4NEn5x3m3n7IsS2urwYNof3urruuIuj4RT0Zd1/VTsRqn4+lYi/XYiM14Jp6N5+JMPB9n44V4Mc5NZzXdNwAAAAAAAAAAAAAAAAAAACyXBzr/f6Hh5gEAAAAAAAAAAAAAAAAAAGBJXL1+4/JOq7V7JaVTEeXX++399uxzNr7TiW6UUcTF2Ig/Ynr6f2ZWX3qntXsxTW3GV+XBP/mD/fax+fzW9HUCC/Nbs3yaz5+M1bvz27ERZxbntxfmT8Wrr9yVz2Ijfv0oBlHGXvydvZP/Yiult99t3ZM/P50HAAAAyyBL/1q4f8+y/xqf5e/j/sA9++vjcf54s2snopp81svLshg1XtzuaPbNQUQ8Io0tcXHi0Wjj/y2Ozf2Rmu/nMS2auybx8Nz50ZvuBAAAAAAAAAAAgPvxMB4nbHqNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/MUOHAsAAAAACPO3TqNjAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4KgAA//86R81g") 7.518592932s ago: executing program 4 (id=1260): r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x11, &(0x7f0000000100)={[{@nombcache}, {@resgid}, {@norecovery}, {@commit={'commit', 0x3d, 0x5}}, {@nombcache}]}, 0x8, 0x601, &(0x7f0000000ac0)="$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") quotactl$Q_QUOTAOFF(0xffffffff80000300, &(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={0x0, r0, 0x0, 0xffffffff00000000}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00'], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) r3 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x2) ioctl$SCSI_IOCTL_STOP_UNIT(r3, 0x5319) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='kfree\x00', r4}, 0x10) syz_mount_image$vfat(&(0x7f0000000440), &(0x7f0000000040)='./file0\x00', 0x2000081, &(0x7f0000000480)=ANY=[@ANYRES8=0x0, @ANYRESHEX=0x0, @ANYRES64, @ANYRES64=0x0], 0x0, 0x23e, &(0x7f0000000bc0)="$eJzs3c9qE1EUB+AzSdqmukgWrkRwQBeuStsnSJEKYldKFupCi21BklCwEGgVQ1c+gU/ic7jxDXwAoTtdFEYmSZsWUm0wf0r9vk0uzP3NOTe5Iau5eX2n1dja3ds5/PA9yuUkCrWoJUcR1ShEbiEAgOvmV5bFUdYzWrJUmFRPAMBkXfL3f3GKLQEAE/bs+Ysnaxsb60/TtBzR+tSuJ9F77V1f24m30YztWI5KHEdkp3rjR4831qOU5qpxv9Vp1/Nk69XX/v3XfkR08ytRierw/Eracybfadfn4ka/fi3Pr0Ylbg3Prw7JR30+Htw70/9SVOLbm9iNZmxFnh3kP66k6cPs88/3L/OO83zSadcXuvMGsuLUPxwAAAAAAAAAAAAAAAAAAAAAAK6tpTRN0yz7kmVZ1jl3/k7xuHt9KT1RPX8+Ty9/0flAnTPn6yznJZLe/EG+FLdLUZrl2gEAAAAAAAAAAAAAAAAAAOCq2Ns/aGw2m9vvxjo4eax//Hf+10EU+601k4gr0E93sJj3M51ad2PEWrURS0Rh/6Bxsrsam0n8JVWe0CbJhmy/4oWp+TFVn7853lUkETF3+mb+aXIh5sb8TQEAAAAAAAAAAAAAAAAAAKZs8NDvkIuHM2gIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGZg8P//Iww6/fAlUzNeIgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+B3wEAAP//bkR7Lg==") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r5, 0xa02000000000000, 0x60, &(0x7f0000000000)={'filter\x00', 0xb001, 0x4, 0x3e8, 0x0, 0x0, 0x130, 0x300, 0x300, 0x300, 0x7fffffe, 0x0, {[{{@arp={@local, @empty, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'pimreg\x00', 'veth0_to_bridge\x00'}, 0xc0, 0x130}, @unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "f67b23ffdfa27f907a03732da3acbc6518e62a77ca06f258762e88c0d9f9d2f413b94a105f4bdf01425ce81c5d000000000000000500ffffffff00"}}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_to_team\x00', 'ip6tnl0\x00'}, 0xc0, 0xe8}, @unspec=@CLASSIFY={0x28}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE3={0x28}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 7.317201891s ago: executing program 6 (id=1262): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040), 0x80000, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000a00)=@newqdisc={0x6c, 0x24, 0xd0f, 0x0, 0xffffffff, {0x60, 0x0, 0x0, r2, {0x0, 0xffe0}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x40, 0x2, [@TCA_TBF_PRATE64={0xc, 0x5, 0x3d5653a0b35cd406}, @TCA_TBF_BURST={0x8, 0x6, 0x1}, @TCA_TBF_PARMS={0x28, 0x1, {{0x6, 0x1, 0x6, 0x8, 0x1, 0xc}, {0xd, 0x1, 0x0, 0x5, 0x5e1d, 0x8}, 0x80000000, 0x20003, 0x99}}]}}]}, 0x6c}}, 0x40000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'veth1_vlan\x00'}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000200)={'dummy0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000006c0)=@newqdisc={0xf0, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, r5, {0x0, 0xb}, {0xfff1, 0xffff}, {0x1, 0x1}}, [@qdisc_kind_options=@q_clsact={0xb}, @TCA_RATE={0x6, 0x5, {0x3, 0x1}}, @TCA_STAB={0x43, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x0, 0x7, 0x200, 0x6, 0x2, 0xf137, 0x2, 0x7}}, {0x12, 0x2, [0x0, 0xff, 0x3a9, 0x1000, 0x0, 0x6, 0xc82]}}, {{0x1c, 0x1, {0xa, 0x5, 0x978c, 0x2000005, 0x2, 0x0, 0x1000, 0x8}}, {0x14, 0x2, [0x8, 0x7, 0x9, 0x0, 0x1, 0x7, 0x1, 0x7fff]}}, {{0x1c, 0x1, {0x9, 0x4, 0x7, 0x8, 0x1, 0x40, 0x0, 0x2}}, {0x8, 0x2, [0x8, 0xe3d]}}, {{0x1c, 0x1, {0xe, 0x6, 0x8, 0x3752ae84, 0x0, 0x800, 0x6}}, {0x4}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x3}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x9}]}, 0xf0}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, &(0x7f0000000240)=[0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x68, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000300), &(0x7f0000000340), 0x8, 0x34, 0x8, 0x8, &(0x7f0000000380)}}, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) r6 = syz_io_uring_setup(0x24fc, &(0x7f0000000080)={0x0, 0x0, 0x10100, 0x3}, &(0x7f0000000180)=0x0, &(0x7f0000000140)=0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r9, &(0x7f0000000180)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x9, 0x12, r9, 0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000000)=@IORING_OP_READ_FIXED) io_uring_enter(r6, 0x2d3e, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000240)='kmem_cache_free\x00', 0xffffffffffffffff, 0x0, 0x20000000000000}, 0x18) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r10) r11 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r10, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r11, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000080)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @remote, @local, {[], {{0xfffd, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x2, 0x5, 0x12}}}}}}}, 0x0) 7.07210323s ago: executing program 6 (id=1265): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xb, &(0x7f0000000500)=ANY=[@ANYRESDEC], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x64) getdents64(r0, &(0x7f0000000f80)=""/4096, 0x1000) fchmodat(r0, &(0x7f0000000000)='./file0\x00', 0x2a) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x67, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x10c288, 0x40, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000780)={[{@errors_remount}, {@resuid}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@resgid}, {@block_validity}, {@quota}]}, 0x3, 0x42f, &(0x7f0000000940)="$eJzs289rHFUcAPDvzCat/WViqT+aVo1WMfgjadJae/CiKHhQEPRQjzFJS+y2kSaCLUGjSD1Kwbt4FPwLPOlF1JPgVe9SKJJLq6eV2Z1Jdje7aZJustX9fGCS92be8t53Z97ue/N2AuhZw9mfJGJ/RPweEQO1bGOB4dq/W8uLU38vL04lUam89VdSLXdzeXGqKFq8bl+R6YtIP0viSIt65y9fOT9ZLs9cyvNjCxfeH5u/fOW52QuT52bOzVycOH365InxF05NPN+ROLO4bg59NHf08GvvXHtj6sy1d3/+Ninib4qjQ4bXO/hkpdLh6rrrQF066etiQ9iUUq2bRn+1/w9EKVZP3kC8+mlXGwdsq0qlUnmg/eGlCvA/lkS3WwB0R/FFn81/i22Hhh53hRsv1SZAWdy38q12pC/SvEx/0/y2k4Yj4szSP19lW2zPfQgAgAbfZ+OfZ1uN/9Kovy90b76GMhgR90XEwYg4FRGHIuL+iGrZByPioU3W37xIsnb8k17fUmAblI3/XszXthrHf8XoLwZLee5ANf7+5OxseeZ4/p6MRP/uLD++Th0/vPLbF+2O1Y//si2rvxgL5u243re78TXTkwuTdxJzvRufRAz1tYo/WVkJSCLicEQMbbGO2ae/Odru2O3jX0cH1pkqX0c8VTv/S9EUfyFZf31y7J4ozxwfK66KtX759eqb7eq/o/g7IDv/e1te/yvxDyb167Xzm6/j6h+ft53TbPX635W83bDvw8mFhUvjEbuS12uNrt8/0VRuYrV8Fv/Isdb9/2CsvhNHIiK7iB+OiEci4tG87Y9FxOMRcWyd+H96+Yn3th7/9srin97U+V9N7IrmPa0TpfM/ftdQ6eBm4s/O/8lqaiTfs5HPv420a2tXMwAAAPz3pBGxP5J0dCWdpqOjtd/wH4q9aXlufuGZs3MfXJyuPSMwGP1pcadroO5+6Hg+rS/yE035E/l94y9Le6r50am58nS3g4cet69N/8/8Wep264Bt53kt6F36P/Qu/R96l/4PvatF/9/TjXYAO6/V9//HXWgHsPOa+r9lP+gh5v/Qu/R/6F36P/Sk+T1x+4fkJSTWJCK9K5ohsU2Jbn8yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdMa/AQAA//9QOObV") lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000580)=ANY=[@ANYBLOB="0d3c272a37112d2ccbd7b9a8f86300734d92fed889eac8af1d614321fdcb188eb9413df7a441f07b3c2184b484764824d15d7c9a282de295883198ecd524b3deb261036669663ad8658186506f9cffc189d2ba195ff1b80ea29eef854d344047790d82a22a518752907caf40a961d39ec3d3018128f0a85c1668e2a57633e5ca55a8843790742b6457142a8dee39c7e9aaa9c19900141e737e889ae2ed904e0f04a85ce3e4b8d79983c93f9c58ebc194357d29c98a41", @ANYRES16=r0], 0xfe37, 0x1) creat(&(0x7f0000000140)='./file2\x00', 0x1ad) unlink(&(0x7f0000000180)='./file1\x00') 6.859284599s ago: executing program 4 (id=1267): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1000, 0x0, &(0x7f00008b5000/0x1000)=nil) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x0, 0x5, 0xfffffffd}) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, 0x0) 6.561338978s ago: executing program 6 (id=1269): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xb, &(0x7f0000000500)=ANY=[@ANYRESDEC], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x64) getdents64(r0, &(0x7f0000000f80)=""/4096, 0x1000) fchmodat(r0, &(0x7f0000000000)='./file0\x00', 0x2a) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x67, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x10c288, 0x40, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000780)={[{@errors_remount}, {@resuid}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@resgid}, {@block_validity}, {@quota}]}, 0x3, 0x42f, &(0x7f0000000940)="$eJzs289rHFUcAPDvzCat/WViqT+aVo1WMfgjadJae/CiKHhQEPRQjzFJS+y2kSaCLUGjSD1Kwbt4FPwLPOlF1JPgVe9SKJJLq6eV2Z1Jdje7aZJustX9fGCS92be8t53Z97ue/N2AuhZw9mfJGJ/RPweEQO1bGOB4dq/W8uLU38vL04lUam89VdSLXdzeXGqKFq8bl+R6YtIP0viSIt65y9fOT9ZLs9cyvNjCxfeH5u/fOW52QuT52bOzVycOH365InxF05NPN+ROLO4bg59NHf08GvvXHtj6sy1d3/+Ninib4qjQ4bXO/hkpdLh6rrrQF066etiQ9iUUq2bRn+1/w9EKVZP3kC8+mlXGwdsq0qlUnmg/eGlCvA/lkS3WwB0R/FFn81/i22Hhh53hRsv1SZAWdy38q12pC/SvEx/0/y2k4Yj4szSP19lW2zPfQgAgAbfZ+OfZ1uN/9Kovy90b76GMhgR90XEwYg4FRGHIuL+iGrZByPioU3W37xIsnb8k17fUmAblI3/XszXthrHf8XoLwZLee5ANf7+5OxseeZ4/p6MRP/uLD++Th0/vPLbF+2O1Y//si2rvxgL5u243re78TXTkwuTdxJzvRufRAz1tYo/WVkJSCLicEQMbbGO2ae/Odru2O3jX0cH1pkqX0c8VTv/S9EUfyFZf31y7J4ozxwfK66KtX759eqb7eq/o/g7IDv/e1te/yvxDyb167Xzm6/j6h+ft53TbPX635W83bDvw8mFhUvjEbuS12uNrt8/0VRuYrV8Fv/Isdb9/2CsvhNHIiK7iB+OiEci4tG87Y9FxOMRcWyd+H96+Yn3th7/9srin97U+V9N7IrmPa0TpfM/ftdQ6eBm4s/O/8lqaiTfs5HPv420a2tXMwAAAPz3pBGxP5J0dCWdpqOjtd/wH4q9aXlufuGZs3MfXJyuPSMwGP1pcadroO5+6Hg+rS/yE035E/l94y9Le6r50am58nS3g4cet69N/8/8Wep264Bt53kt6F36P/Qu/R96l/4PvatF/9/TjXYAO6/V9//HXWgHsPOa+r9lP+gh5v/Qu/R/6F36P/Sk+T1x+4fkJSTWJCK9K5ohsU2Jbn8yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdMa/AQAA//9QOObV") lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000580)=ANY=[@ANYBLOB="0d3c272a37112d2ccbd7b9a8f86300734d92fed889eac8af1d614321fdcb188eb9413df7a441f07b3c2184b484764824d15d7c9a282de295883198ecd524b3deb261036669663ad8658186506f9cffc189d2ba195ff1b80ea29eef854d344047790d82a22a518752907caf40a961d39ec3d3018128f0a85c1668e2a57633e5ca55a8843790742b6457142a8dee39c7e9aaa9c19900141e737e889ae2ed904e0f04a85ce3e4b8d79983c93f9c58ebc194357d29c98a41", @ANYRES16=r0], 0xfe37, 0x1) creat(&(0x7f0000000140)='./file2\x00', 0x1ad) unlink(&(0x7f0000000180)='./file1\x00') 6.509464828s ago: executing program 35 (id=1199): r0 = socket$kcm(0xa, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x21, &(0x7f0000000100), 0x120) sendmsg$kcm(r0, &(0x7f0000000380)={&(0x7f0000000040)=@ax25={{0x3, @bcast, 0x1}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x80, 0x0}, 0x240440d1) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001540)={&(0x7f0000001500)='kmem_cache_free\x00'}, 0x10) r2 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0xa042) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x11, 0x4, &(0x7f0000000400)=ANY=[@ANYRES64=r2], &(0x7f0000000340)='syzkaller\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f00000001c0)={'batadv0\x00', 0x0}) sendto$packet(r4, &(0x7f0000000000)="60008104", 0x4, 0x0, &(0x7f0000000080)={0x11, 0x8100, r5, 0x1, 0xff, 0x6, @local}, 0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='netlink_extack\x00'}, 0x10) ioctl$PTP_PEROUT_REQUEST2(r1, 0xc0603d0f, &(0x7f00000003c0)={{}, {0x0, 0x1}}) socket$nl_netfilter(0x10, 0x3, 0xc) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000fc850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x57, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x2041, 0x0) ioctl$TCSETS(r7, 0x40045431, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, "0062ba7d82000000000000000000f7ffffff00"}) r8 = syz_open_pts(r7, 0x0) ioctl$TIOCGSOFTCAR(r8, 0x5419, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r6}, 0x18) setitimer(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0xffffffff, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sync() pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r9 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r9, 0x29, 0x2f, &(0x7f0000000200)={0x0, {{0xa, 0xffff, 0x0, @empty, 0x10000}}, {{0xa, 0x0, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}}}, 0x108) sync() syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000001240)='./file0\x00', 0x0, &(0x7f0000002480)=ANY=[], 0x1, 0x11f4, &(0x7f0000001280)="$eJzs3M+LG2UYB/DHbWvr1v2h1moL0he96GXo7sGLgiyyBWlAaRuhFYSpO9GQMQmZsBARV09e/TvEozdBvOllL/4N3vbisQdxxMTapsRDqXTa8Plc8pD3/cLzkjDwDvPO0ZvffNrrVFknH8fKE2/FyjAi3UqRYiVu+zJee+PnX166ev3G5Z1Wa/dKSpd2rm29nlJav/DjB59/9/JP49Pvf7/+w8k43Pzw6Pft3w7PHp47+vPaJ90qdavUH4xTnm4OBuP8ZlmkvW7Vy1J6ryzyqkjdflWM5sY75WA4nKS8v7e2OhwVVZXy/iT1ikkaD9J4NEn5x3m3n7IsS2urwYNof3urruuIuj4RT0Zd1/VTsRqn4+lYi/XYiM14Jp6N5+JMPB9n44V4Mc5NZzXdNwAAAAAAAAAAAAAAAAAAACyXBzr/f6Hh5gEAAAAAAAAAAAAAAAAAAGBJXL1+4/JOq7V7JaVTEeXX++399uxzNr7TiW6UUcTF2Ig/Ynr6f2ZWX3qntXsxTW3GV+XBP/mD/fax+fzW9HUCC/Nbs3yaz5+M1bvz27ERZxbntxfmT8Wrr9yVz2Ijfv0oBlHGXvydvZP/Yiult99t3ZM/P50HAAAAyyBL/1q4f8+y/xqf5e/j/sA9++vjcf54s2snopp81svLshg1XtzuaPbNQUQ8Io0tcXHi0Wjj/y2Ozf2Rmu/nMS2auybx8Nz50ZvuBAAAAAAAAAAAgPvxMB4nbHqNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA/MUOHAsAAAAACPO3TqNjAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4KgAA//86R81g") 6.198168126s ago: executing program 0 (id=1272): syz_usb_connect$cdc_ecm(0x0, 0x121, &(0x7f0000000400)={{0x12, 0x1, 0x48a, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x10f, 0x1, 0x1, 0x10, 0x30, 0x5, [{{0x9, 0x4, 0x0, 0x4, 0x3, 0x2, 0x6, 0x0, 0x4, {{0xb, 0x24, 0x6, 0x0, 0x0, "5ec58f34b132"}, {0x5, 0x24, 0x0, 0x1}, {0xd, 0x24, 0xf, 0x1, 0xd7, 0x44, 0x8, 0xe3}, [@obex={0x5, 0x24, 0x15, 0x2b}, @mdlm_detail={0xaa, 0x24, 0x13, 0xde, "dcb859de1976bca175deb927aef77dd8715dcabc66874cd1d24c4118bc5e17ee8cf135f19d66586945a5022ad16fa2ec3e9b42c82ed5e911eef4553b4190b166084568edd3cb3d089a8efa1d5f3ad9380a0bb4410e354604b110807a760ee1a20d303d5718ad4efc99b64478c1427c551869c65b866685982b2fc50e78129dde3be29f45225cda9d6e265c2b19a68ffe10f2ed01c2c13b6c3ee1c0420bac3935057f38bd8cf5"}, @network_terminal={0x7, 0x24, 0xa, 0x4, 0x8, 0x8, 0x6}, @country_functional={0xc, 0x24, 0x7, 0x4, 0x5a2, [0x3, 0x6, 0x6]}, @country_functional={0xc, 0x24, 0x7, 0xff, 0x1, [0x2, 0x7fff, 0x2]}]}, {[], {{0x9, 0x5, 0x82, 0x2, 0x40, 0x7, 0x8, 0x31}}, {{0x9, 0x5, 0x3, 0x2, 0x20, 0xf6, 0x3b, 0x6}}}}}]}}]}}, &(0x7f00000005c0)={0xa, &(0x7f0000000080)={0xa, 0x6, 0x200, 0x3, 0x5, 0x9, 0x40}, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="050f539e00"], 0x2, [{0x4, &(0x7f0000000380)=@lang_id={0x4, 0x3, 0xfcff}}, {0x0, 0x0}]}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="9febdeff17"], 0x0, 0x37, 0x0, 0x8, 0xffffffff, 0x0, @void, @value}, 0x28) r0 = socket$inet_smc(0x2b, 0x1, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./bus\x00', 0x400e, &(0x7f0000000180)={[{@data_journal}, {@inlinecrypt}, {@errors_continue}, {@nodelalloc}, {@init_itable_val={'init_itable', 0x3d, 0x4}}, {@acl}]}, 0x1, 0x42f, &(0x7f0000000280)="$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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000700)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1e, 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000001c0)='syzkaller\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) getpid() ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000780)={'syztnl2\x00', 0x0, 0x2f, 0x6, 0x0, 0x7, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, @loopback, 0x8, 0x7, 0x7c, 0x1}}) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000340)='./file0\x00', 0xc0000f70) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, 0x0, &(0x7f0000000540)=0x11e) timer_create(0x3, 0x0, &(0x7f00000003c0)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000024000000240000000900"], 0x0, 0x45, 0x0, 0x1, 0x4, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="b80000001300e9990000000000000000fc000000000000000000000000000000ac1e000100000000000000000000000000000000000000000a00407000000000", @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000101000000000004000000b86b6e000000000000"], 0xb8}}, 0x8004) 5.541640374s ago: executing program 4 (id=1273): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) write$tun(r0, &(0x7f0000000080)={@val={0x8, 0x800}, @val={0x0, 0x0, 0x12}, @ipv4=@tcp={{0x5, 0x4, 0x0, 0x0, 0x8012, 0x0, 0x0, 0x0, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast}, {{0x12, 0x6558, 0x41424344, 0x41424344, 0x0, 0x0, 0x4}}}}, 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x25, 0x360, &(0x7f0000000400)="$eJzs3T9onGUYAPDn+iW5JFhzg1B08XQTpDQRB50SSoViBq0c/ls8bOqf3FnI4UEccrlFKU6Ki6CTWwcdO4uDiJuDg4sVpCoudis0+Mndffcvd2eS4WKkv99QHp73fb73ea8ffF8O8ua1Rmxeno0rt2/fivn5XMysnl+NO7koxKlIomM3xvpwbnweADjh7qRp/JV2HDz748Vu5NkPAP9f7ef/G6f7iXw/TA4qvnbftNoCAKbokD//Pzc2e3VqbQEAU9R5/jf6z/9Hh4b3fc0/c/B3AgDAiffCy688u7YecalYnI+oflAv1UvxdH987Uq8FZXYiHOxFHsRnReFzttC699nLq5fOFds+a0QpVZFvRRRbdRLnTeFtaRdn4/lWIpCVp/26pNW/XK7vhgRu432+lHN1UuzsZit//NibMRKLMUDI/URF9cvrBSzC5Sq3fpGRDPmu5to9X82luKH1+NqVOJytGr7/e8sF4vn0/Wh+vr1fHseAAAAAAAAAAAAAAAAAAAAAABMw9liT6F3/k1abdTfv7R/QmHofJxSZzg7H6jZOR8ozXdP57mW7D8faPh8nnppJk79pzsHAAAAAAAAAAAAAAAAAACAk6O2PRflSmVjq7b93uZg0BjIvPPdl98sRHdoJit9O+lXRZYcuk534sCVk+gtkfbK02RoThYkEd3Ju+XrN3odD87J93YxUt4K8iNDuayncqVy+pFfPxtX9Xcr2G1nkhj5WIaDXLb+wFD1/lZiPiL2JlVNDlYOmHMzTdN+Zm5o9Z1PR6siFzETEy/409E77Abf3nrzwSdqZ55sZ77ODn147PGlF29+8sUfm+VKNB/Oupvbqu2lh7hyq9fRoWTg/sllO82NuRPGB81+prlV2y4nP/750kMffb9vcjL+/kkHM+9OXuur/Zm5TpCLKHQa/fe9z465+ccHr97t3b1H/4878/lq+cbOL78ftioiuh+0gzoAAAAAAAAAAAAAAAAAAOBYDPyu+BE89fz0OgIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA49f/+/8DQXMkMzZYiIiBzN1GjM7Jb2zVJi6+cKxbBQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgHvZPAAAA//+Fkm00") openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x40000100) utimensat(0xffffffffffffff9c, &(0x7f00000003c0)='.\x00', 0x0, 0x0) 5.051726811s ago: executing program 6 (id=1274): r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x11, &(0x7f0000000100)={[{@nombcache}, {@resgid}, {@norecovery}, {@commit={'commit', 0x3d, 0x5}}, {@nombcache}]}, 0x8, 0x601, &(0x7f0000000ac0)="$eJzs3c9vFGUfAPDvTH/Svu+7hbxR8SBNjIFEaWkBQ4yJcCcEf9w8VVoIUiihNVoksSR4MTFePJh48iD+F0ri1YNXD148GRJiDAcxRNbMdqdMt7ulv3a37H4+ydDnmWHneabZb7+zzz4zE0DXGs3+SSP2R8TVJKJU2NYb1Y2jy//v/p83zmVLEuXy238kceOTZKm4r6T6c7j64n9KkfycRuzrWdvu/OL1S1OzszPXqvXxhctXx+cXrx++eHnqwsyFmSuTr06eOH7s+ImJI9s6vrRQPn3r/Q9Ln51599uvHyYT3/16JomT8ajat+y4al87sK2Ws9/ZaJSXPSiuz36vJ7a5793ir1L+PnksqV3BrnW++n7si4hnoxQ9hXd9KT59s62dA5qqnESeo4Cuk2wp/gd3viNAi+XnAfln+3qfg9dKm3xWArTCvVPLAwDLsd8XEXn89y6PDcZgZWxg6H6yapwniYjtjcwty9r46cczt7IlGozDAc2xdDMf76vN/0klNkdisFIbup+uiv+0sGTr39pi+6M1dfEPrbN0MyKeq+b//thU/I8W4v+9LbYv/gEAAAAAAGDn3DkVEa/Um/+Xrsz/6a8z/2c4Ik7uQPtP/v4vvVstJDvQHFBw71TE63Xn/67M8R3pqdb+W5kP0Jecvzg7cyQi/hcRh6JvIKtP1Oy3OEP48Of7vmrUfnH+X7Zk7edzAat7uttbcyHu9NTC1HaPG4i4dzPi+cr83wPVNavn/2T5P6mT/7P4vrrBNva9dPtso21Pjn+gWcrfRBysm/8fn24n69+fY7xyPjCenxWs9cLHX3zfqH3xD+2T5f+h9eN/ICner2d+c/vvj4iji73lRtu3ev7fn7zTk+8/89HUwsK1iYj+5PTa9ZOb6zN0qjwe8njJ4v/Qi+uP/62c/xficE9ELG2wzWceDf/WaJv8D+2Txf/0+vl/ZHX+33xh8vbID43aP7uh/H+sktMPVdcY/4Oitffj2GiAtqW7AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPCUSyPiP5GkYyvlNB0bixiOiP/HUDo7N7/w8vm5D65MZ9sqz/9P8yf9lpbrSf78/5FCfbKmfjQi9kbElz17KvWxc3Oz0+0+eAAAAAAAAAAAAAAAAAAAANglhivX/JcHaq//z/ze0+7eAU3XW/0p3qH79G75leWBHe0I0HJbj3/gabfx+O9raj+A1msc/w8elita2h2ghZz/Q/faYvz7ugA6gPwP3WqDY3qDze4H0A7yPwAAAAAAdJS9B+78kkTE0mt7Kkumv7rNZH/obGm7OwC0jTm80L1659rdA6BdfMYHkpXS33Uv9m88+z9pTocAAAAAAAAAAAAAgDUO7nf9P3Sr9a//N7cfOtk61//XC363C4AO0vjRH3I/dDqf8aGrlUsbyPau/wcAAAAAAAAAAACAXWDw+qWp2dmZa/OLT1/hjd3Rjc0VlqZ2RTd2tPCoOXvui4jdcYCtLuS34GhjN9r8dwkAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFjxbwAAAP//1RUojg==") quotactl$Q_QUOTAOFF(0xffffffff80000300, &(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={0x0, r0, 0x0, 0xffffffff00000000}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00'], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x2) ioctl$SCSI_IOCTL_STOP_UNIT(r2, 0x5319) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='kfree\x00', r3}, 0x10) syz_mount_image$vfat(&(0x7f0000000440), &(0x7f0000000040)='./file0\x00', 0x2000081, &(0x7f0000000480)=ANY=[@ANYRES8=0x0, @ANYRESHEX=0x0, @ANYRES64, @ANYRES64=0x0], 0x0, 0x23e, &(0x7f0000000bc0)="$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") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r4, 0xa02000000000000, 0x60, &(0x7f0000000000)={'filter\x00', 0xb001, 0x4, 0x3e8, 0x0, 0x0, 0x130, 0x300, 0x300, 0x300, 0x7fffffe, 0x0, {[{{@arp={@local, @empty, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'pimreg\x00', 'veth0_to_bridge\x00'}, 0xc0, 0x130}, @unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "f67b23ffdfa27f907a03732da3acbc6518e62a77ca06f258762e88c0d9f9d2f413b94a105f4bdf01425ce81c5d000000000000000500ffffffff00"}}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_to_team\x00', 'ip6tnl0\x00'}, 0xc0, 0xe8}, @unspec=@CLASSIFY={0x28}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE3={0x28}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 4.6870583s ago: executing program 6 (id=1275): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000002000000fd0f000003"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000380)='xprtrdma_post_recvs\x00', 0xffffffffffffffff, 0x0, 0x802}, 0x18) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="180000f1ff000000000000000000000085000008ae00000095c3a70e2327daabd9f79d592bfe5b739aab9d2707cc978df2d797cd638f3b6e8b66fd20cc5ce7a02861fe7a8595a50b6828b1b434fb2ce3565a0ca09c25b87cfe3b9866182b9ed30700cb99dab874cffa0f761507b865b7d6712a8b4aa9d436c5"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00') llistxattr(&(0x7f0000002040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="020000000400000008000000"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="190a00", @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) sendfile(r1, r1, &(0x7f0000000400)=0x9d5b, 0x4) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYBLOB="004000000000000a0000f2500c4400f6ff000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) setresuid(0xee00, 0xee00, 0x0) open_by_handle_at(r6, 0x0, 0xc02) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r5}, &(0x7f0000000000), &(0x7f0000000080)=r2}, 0x20) recvmsg$unix(r3, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000002c0)=""/139, 0x8b}], 0x1}, 0x0) r7 = openat$dir(0xffffffffffffff9c, &(0x7f0000004000)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x18200, 0x0) futimesat(r7, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={{0x77359400}, {0x0, 0xea60}}) sendmsg$inet(r4, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) shmctl$SHM_INFO(0x0, 0xe, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) 4.032920637s ago: executing program 7 (id=1278): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000f1ff007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) open(&(0x7f0000000780)='./bus\x00', 0x14507e, 0x0) munmap(&(0x7f0000002000/0x4000)=nil, 0x4000) mount(&(0x7f00000002c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000040)='./file2\x00', 0x1c45b1, &(0x7f0000002080)=ANY=[], 0x1, 0x120e, &(0x7f00000004c0)="$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") r2 = open(&(0x7f0000000040)='./bus\x00', 0x44842, 0x0) pwritev2(r2, &(0x7f0000000240)=[{&(0x7f0000000000)='$', 0x3fec00}], 0x2, 0x1400, 0x0, 0x3) 3.949839016s ago: executing program 7 (id=1279): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x4, &(0x7f0000000180)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r0}, 0xc) 3.905097016s ago: executing program 7 (id=1280): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000980)=ANY=[@ANYBLOB="020000000000000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000300000002000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000002000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x210) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) close_range(r2, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000cc0)=@raw={'raw\x00', 0x8, 0x3, 0x368, 0x0, 0x43, 0xa0, 0x0, 0x98, 0x2d0, 0x178, 0x178, 0x2d0, 0x178, 0x49, 0x0, {[{{@ip={@empty=0x5107, @multicast2, 0x0, 0x0, 'veth0_to_bond\x00', 'ip6erspan0\x00', {0xff}, {}, 0x9}, 0x12a, 0x1a0, 0x1c0, 0x0, {0x0, 0x7a010000}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x4, 0x0, 'syz0\x00'}}, @common=@unspec=@connbytes={{0x38}, {[{}, {0xe}]}}]}, @unspec=@TRACE={0x20}}, {{@uncond, 0x0, 0xe0, 0x110, 0x0, {}, [@common=@unspec=@cluster={{0x30}, {0x2, 0x0, 0x1ff}}, @common=@unspec=@connlimit={{0x40}, {[0xffffff00, 0xff, 0xffffff00, 0xff000000], 0x3, 0x1, {0x4413}}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x0, 0x5}, {0x1, 0x4, 0x5}, 0xb}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x3c8) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f00000700000000df4f77", @ANYRES32, @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYRESDEC=r5], 0x0, 0x8, 0x0, 0x0, 0x40f00, 0x22, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r8}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r7}, &(0x7f0000000000), &(0x7f0000000040)='%pB \x00'}, 0x20) kexec_load(0x0, 0x1, &(0x7f0000000140)=[{0x0, 0x3e00, 0x116094000, 0x41000000}], 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/26], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r10}, 0x10) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x0) 3.778980656s ago: executing program 6 (id=1281): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = fsopen(&(0x7f0000000300)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x1, 0x80) fchdir(r1) socket$inet6(0xa, 0x3, 0xb6) syz_genetlink_get_family_id$nl80211(0x0, r1) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0xa00008, &(0x7f0000000200)={[{@delalloc}]}, 0x1, 0x7bd, &(0x7f0000001280)="$eJzs3c9rHNcdAPDvrH5adisVCq17EhRagfGqclW7hUJdeiiFGgzt2bZYrYWjldZoV8YSAtuEQC45JOQQiC8+x4lz8zU/rsklf0MOwcZJZBOHHILC7M7GK2lXlmztrhN9PjDSezOzeu87b+bN084wE8CBNZ7+yEUcjRhIk6PZ/CSyGdEfcbq+3uP1tUI6JbGx8b+vkto6j9bXCtH0mdThLPPbiPjolYhjue3lVlZW52dKpeJSlp+sLlyerKysHr+0MDNXnCsunpyanj5x6i+nTu5frN98unrk/uv//uN7p797+Td3Xvs4idNxJFvWHMd+GY/xbJsMpJtwk3/td2E9lvS6AjyT9NDsqx/lcTRGo2+HlvxHV2sGAHTKtYjYAAAOmMT5HwAOmMb3AI/W1wqNKerXc6739IuJLnnwz4gYrsffuL5ZX9Jfv2b32XDtOujIo6R2jaQhiYixfSh/PCJu3j13O52iQ9chAVq5fiMiLoyNb+3/0x5u6z0Le/WnXawzviWv/4Pu+SAd//x1+/gvIpcd/8O1n1vHP0Mtjt1n8fTjP3dvU3ZgHwptko7//t50b9vjpvgzY31Z7he1Md9AcvFSqZj2bb+MiIkYGErzUzuUMfHw+4ftljWP/75+46V30vLT30/WyN3rH9r8mdmZ6szzxNzswY2I3/W3ij/5sf2TNuPfs7ss4z9/e/XtdsvS+NN4G9P2+Dtr41bEH1q2/5P7oJId70+crO0Ok42dosX++f7nb420K7+5/W/eTUtaKzT+F+iGtP1Hdo5/LGm+X7Oy9zI+uTX6Ybtlm+M/dzstf3P8rff/weT/tfRgNu/qTLW6NBUxmPx3+/wTTz7byDfWT+Of+H3r43+n/T9t5gtZeuMpNz/23//y3WePv7PS+GfT9k+yIJ7a/ntP3Hk839eu/N21/3QtNZHN2d7/9W/7u7ut4HNtPAAAAAAAAAAAAAAAAAAAAAAAAADYpVxEHMme8VpP53L5fP0d3r+OkVypXKkeu1heXpyN2ruyx2Ig13jU5WjT81CnsufhN/IntuT/HBG/iog3hw7V8vlCuTTb6+ABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIHO49s7/JJff8v7/1BdDva4dANAxw72uAADQdc7/AHDwtDn/D7aefaijdQEAuqN2/k/6e10NAKCLfP8PAAeP8z8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAddvbMmXTa+HZ9rZDmZ6+sLM+XrxyfLVbm8wvLhXyhvHQ5P1cuz5WK+UJ5oe0ful7/VSqXL0/H4vLVyWqxUp2srKyeXygvL1bPX1qYmSueLw50LTIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA2L3Kyur8TKlUXJLYOXHthajGjazZer01fk6JC9k2fVHqs4fEUER0qojmXuJQ9zsmAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgJ+IHwIAAP//TXIcnw==") r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000180)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000200)=0x400000bce) r4 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r4, &(0x7f0000019680)=""/102392, 0x18ff8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r5 = mq_open(&(0x7f0000000000)='--)&^+\\Wq\x00', 0x40, 0x4, 0x0) mq_timedsend(r5, 0x0, 0x0, 0x1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000100", @ANYRES8, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) set_mempolicy(0x6, &(0x7f0000000040)=0x3, 0x6) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000f00850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = socket$inet6(0xa, 0x3, 0x5) r7 = socket$l2tp6(0xa, 0x2, 0x73) dup3(r7, r6, 0x0) setsockopt$inet6_int(r6, 0x29, 0x1000000000021, &(0x7f0000000000)=0xffffffc3, 0x4) 3.092564103s ago: executing program 0 (id=1282): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000850000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000600), r1) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r3 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000300)={0x0, "eee32168441e148d1d5abf08342d1b466136a26ec618804e146111f9bc880bd9350e0a544c37d7e8f3133e6f402e2029b96e833b7a50c5d45835b5204aac9679", 0x38}, 0x48, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000380)=@keyring={'key_or_keyring:', r3}) add_key$keyring(&(0x7f0000000540), &(0x7f0000000080)={'syz', 0x0}, 0xfeffff, 0x0, r2) llistxattr(&(0x7f0000000e40)='./file1\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x103042, 0x0) pwritev(r4, &(0x7f0000000000)=[{&(0x7f0000000200)='s', 0x1}], 0x1, 0xb9c4, 0x0) bind$inet(r4, &(0x7f00000005c0)={0x2, 0x4e21, @remote}, 0x10) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x4, 0xfffffffeffffffff}, 0x8000, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0x1008014, &(0x7f0000000000)=ANY=[], 0x3, 0x7bf, &(0x7f0000000d80)="$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") socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r5, &(0x7f0000004a40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000017c0)=@file={0x1, './file1\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x20000004}}], 0x2, 0x4000090) 3.056460333s ago: executing program 0 (id=1283): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000980)=ANY=[@ANYBLOB="020000000000000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000300000002000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000002000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x210) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000300)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) close_range(r2, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000cc0)=@raw={'raw\x00', 0x8, 0x3, 0x368, 0x0, 0x43, 0xa0, 0x0, 0x98, 0x2d0, 0x178, 0x178, 0x2d0, 0x178, 0x49, 0x0, {[{{@ip={@empty=0x5107, @multicast2, 0x0, 0x0, 'veth0_to_bond\x00', 'ip6erspan0\x00', {0xff}, {}, 0x9}, 0x12a, 0x1a0, 0x1c0, 0x0, {0x0, 0x7a010000}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x4, 0x0, 'syz0\x00'}}, @common=@unspec=@connbytes={{0x38}, {[{}, {0xe}]}}]}, @unspec=@TRACE={0x20}}, {{@uncond, 0x0, 0xe0, 0x110, 0x0, {}, [@common=@unspec=@cluster={{0x30}, {0x2, 0x0, 0x1ff}}, @common=@unspec=@connlimit={{0x40}, {[0xffffff00, 0xff, 0xffffff00, 0xff000000], 0x3, 0x1, {0x4413}}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x0, 0x5}, {0x1, 0x4, 0x5}, 0xb}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x3c8) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f00000700000000df4f77", @ANYRES32, @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYRESDEC=r5], 0x0, 0x8, 0x0, 0x0, 0x40f00, 0x22, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r8}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r7}, &(0x7f0000000000), &(0x7f0000000040)='%pB \x00'}, 0x20) kexec_load(0x0, 0x1, &(0x7f0000000140)=[{0x0, 0x3e00, 0x116094000, 0x41000000}], 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/26], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r10}, 0x10) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x0) 633.937602ms ago: executing program 7 (id=1284): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000072000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000200000000000000001809"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1b0000000000d43d0663a42b3f00000000000000001a0000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000df000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = socket$igmp6(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r2, 0x29, 0x22, &(0x7f0000000080)={{0xa, 0x0, 0x101, @rand_addr=' \x01\x00'}, {0xa, 0x0, 0x0, @dev}, 0x0, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}}, 0x9e) syz_emit_ethernet(0x72, &(0x7f0000000000)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "e400ff", 0x3c, 0x3a, 0x0, @private2, @mcast2, {[], @param_prob={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, '\x00', 0x0, 0x11, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast1}, [], "17c17f079171000700880000"}}}}}}}, 0x0) 632.673182ms ago: executing program 0 (id=1285): r0 = semget$private(0x0, 0x6, 0x0) semtimedop(r0, &(0x7f0000000300)=[{0x3, 0x0, 0x1000}, {0x2, 0x32d6, 0x1800}, {0x2, 0x8bd}, {0x3, 0x5, 0x1000}], 0x2aaaaaaaaaaaae17, 0x0) r1 = add_key$keyring(&(0x7f0000000400), 0x0, 0x0, 0x0, 0x0) request_key(&(0x7f0000000200)='blacklist\x00', &(0x7f0000000380)={'syz', 0x0}, &(0x7f0000000540)='syz', 0xfffffffffffffff8) request_key(0x0, &(0x7f0000000340)={'syz', 0x3}, &(0x7f00000003c0)='kmem_cache_free\x00', r1) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000080)=[0x3]) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) flock(0xffffffffffffffff, 0x5) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x8) flock(r3, 0x2) dup3(r3, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x12, &(0x7f0000000000)=ANY=[@ANYBLOB="7d041816be2cb54fa0aaaa000004424203"], 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xac, 0xac, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2, 0x1}}, @typedef={0x8, 0x0, 0x0, 0x8, 0x2}, @enum={0xe, 0x6, 0x0, 0x6, 0x4, [{0x8, 0x7}, {0x3, 0x6}, {0x4, 0xffffffff}, {0x3}, {0x1, 0x9}, {0x1, 0x101}]}, @enum={0x4, 0x8, 0x0, 0x6, 0x4, [{0xe, 0x8}, {0x5, 0x10000}, {0xe, 0x6}, {0x3, 0x58000}, {0x10, 0x2}, {0x5, 0x1}, {0xd, 0xf206}, {0x4, 0x1}]}]}, {0x0, [0x2e]}}, &(0x7f0000000280)=""/89, 0xc7, 0x59, 0x1, 0x3, 0x0, @void, @value}, 0x28) 576.786442ms ago: executing program 4 (id=1286): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000072000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000200000000000000001809"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1b0000000000d43d0663a42b3f00000000000000001a0000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000df000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$igmp6(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r2, 0x29, 0x22, &(0x7f0000000080)={{0xa, 0x0, 0x101, @rand_addr=' \x01\x00'}, {0xa, 0x0, 0x0, @dev}, 0x0, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}}, 0x9e) syz_emit_ethernet(0x72, &(0x7f0000000000)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "e400ff", 0x3c, 0x3a, 0x0, @private2, @mcast2, {[], @param_prob={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, '\x00', 0x0, 0x11, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast1}, [], "17c17f079171000700880000"}}}}}}}, 0x0) 502.671292ms ago: executing program 0 (id=1287): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xb, &(0x7f0000000500)=ANY=[@ANYRESDEC], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x64) getdents64(r1, &(0x7f0000000f80)=""/4096, 0x1000) fchmodat(r1, &(0x7f0000000000)='./file0\x00', 0x2a) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x67, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x10c288, 0x40, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000780)={[{@errors_remount}, {@resuid}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@resgid}, {@block_validity}, {@quota}]}, 0x3, 0x42f, &(0x7f0000000940)="$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") lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000580)=ANY=[@ANYBLOB="0d3c272a37112d2ccbd7b9a8f86300734d92fed889eac8af1d614321fdcb188eb9413df7a441f07b3c2184b484764824d15d7c9a282de295883198ecd524b3deb261036669663ad8658186506f9cffc189d2ba195ff1b80ea29eef854d344047790d82a22a518752907caf40a961d39ec3d3018128f0a85c1668e2a57633e5ca55a8843790742b6457142a8dee39c7e9aaa9c19900141e737e889ae2ed904e0f04a85ce3e4b8d79983c93f9c58ebc194357d29c98a41", @ANYRES16=r1], 0xfe37, 0x1) creat(&(0x7f0000000140)='./file2\x00', 0x1ad) unlink(&(0x7f0000000180)='./file1\x00') keyctl$chown(0x4, r2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000200)='rxrpc_congest\x00', r0}, 0x18) r3 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'bond0\x00'}) socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001440)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, @void, @value}, 0x94) creat(&(0x7f0000000040)='./bus\x00', 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) creat(&(0x7f0000000100)='./bus\x00', 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000040)='./file0\x00', 0x20c593, &(0x7f0000000180)=ANY=[], 0x1, 0x1215, &(0x7f0000004000)="$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") bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) open(&(0x7f0000000040)='./bus\x00', 0x44842, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYRESOCT=r5, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 501.641252ms ago: executing program 7 (id=1288): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000072000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000200000000000000001809"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="1b0000000000d43d0663a42b3f00000000000000001a0000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r0 = socket$igmp6(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r0, 0x29, 0x22, &(0x7f0000000080)={{0xa, 0x0, 0x101, @rand_addr=' \x01\x00'}, {0xa, 0x0, 0x0, @dev}, 0x0, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}}, 0x9e) syz_emit_ethernet(0x72, &(0x7f0000000000)={@local, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "e400ff", 0x3c, 0x3a, 0x0, @private2, @mcast2, {[], @param_prob={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, '\x00', 0x0, 0x11, 0x0, @empty, @ipv4={'\x00', '\xff\xff', @multicast1}, [], "17c17f079171000700880000"}}}}}}}, 0x0) 479.190512ms ago: executing program 4 (id=1289): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0x4, &(0x7f0000000180)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7b}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r0}, 0xc) 392.887241ms ago: executing program 7 (id=1290): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='map_files\x00') getdents(r2, &(0x7f0000000440)=""/4096, 0x1000) syz_read_part_table(0x1065, &(0x7f0000001b80)="$eJzsz71Rw0AUBOA9JECKKIAAFUABhGRUQAU0QAf+KcctuAOX4DYcODyP5qwWbAffF9zO3c2bnRfuaixJuv6rXO/dfLwn6bNpL895Sv6zP/RlnXxklVpf54/hnHyeavPWDUnJ8Wfajm2u1pZ/S1XJyxzTUvVd8ru73aYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8LguAQAA//9qWxTZ") prctl$PR_GET_DUMPABLE(0x3) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) llistxattr(&(0x7f0000002c00)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', &(0x7f0000000040)=""/102, 0x66) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r3}, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00'}, 0x10) r4 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newqdisc={0x78, 0x24, 0xf0b, 0x0, 0x0, {0x60, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0x6}, {0xffffffffffffff7f, 0x2, [@TCA_FQ_CODEL_CE_THRESHOLD_MASK={0x5, 0xb, 0x1}, @TCA_FQ_CODEL_LIMIT={0x8, 0x2, 0x2}, @TCA_FQ_CODEL_INTERVAL={0x8, 0x3, 0xf384}, @TCA_FQ_CODEL_FLOWS={0x8, 0x5, 0xffffffff}, @TCA_FQ_CODEL_FLOWS={0x8}, @TCA_FQ_CODEL_DROP_BATCH_SIZE={0x8}, @TCA_FQ_CODEL_ECN={0x8}]}}, @TCA_RATE={0x6, 0x5, {0x4}}]}, 0x78}}, 0x0) 344.711781ms ago: executing program 4 (id=1291): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xb, &(0x7f0000000500)=ANY=[@ANYRESDEC], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x64) getdents64(r1, &(0x7f0000000f80)=""/4096, 0x1000) fchmodat(r1, &(0x7f0000000000)='./file0\x00', 0x2a) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x820, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x67, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0x10c288, 0x40, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000780)={[{@errors_remount}, {@resuid}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@resgid}, {@block_validity}, {@quota}]}, 0x3, 0x42f, &(0x7f0000000940)="$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") lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000580)=ANY=[@ANYBLOB="0d3c272a37112d2ccbd7b9a8f86300734d92fed889eac8af1d614321fdcb188eb9413df7a441f07b3c2184b484764824d15d7c9a282de295883198ecd524b3deb261036669663ad8658186506f9cffc189d2ba195ff1b80ea29eef854d344047790d82a22a518752907caf40a961d39ec3d3018128f0a85c1668e2a57633e5ca55a8843790742b6457142a8dee39c7e9aaa9c19900141e737e889ae2ed904e0f04a85ce3e4b8d79983c93f9c58ebc194357d29c98a41", @ANYRES16=r1], 0xfe37, 0x1) creat(&(0x7f0000000140)='./file2\x00', 0x1ad) unlink(&(0x7f0000000180)='./file1\x00') keyctl$chown(0x4, r2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000200)='rxrpc_congest\x00', r0}, 0x18) r3 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'bond0\x00'}) socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001440)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, @void, @value}, 0x94) creat(&(0x7f0000000040)='./bus\x00', 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) creat(&(0x7f0000000100)='./bus\x00', 0x0) syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000040)='./file0\x00', 0x20c593, &(0x7f0000000180)=ANY=[], 0x1, 0x1215, &(0x7f0000004000)="$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") bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) open(&(0x7f0000000040)='./bus\x00', 0x44842, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYRESOCT=r5, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 0s ago: executing program 0 (id=1292): bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = socket(0x1d, 0x2, 0x6) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000740)='fsi_slave_invalid_cfam\x00', r2}, 0x18) r3 = fsopen(&(0x7f0000000400)='autofs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r3, 0x1, &(0x7f0000000240)=',-\x10*\x00', &(0x7f0000000380)='$\x00', 0x0) close(r3) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000780)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, r4, 0x3}, 0x18) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) r5 = syz_io_uring_setup(0xd2, &(0x7f00000000c0)={0x0, 0x0, 0x3010}, &(0x7f0000000040)=0x0, &(0x7f0000000080)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r6, r7, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}) io_uring_enter(r5, 0x47ba, 0x0, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[], 0x30}}, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f0000000240)={[{@grpquota}, {@auto_da_alloc}, {@minixdf}]}, 0x1, 0x50c, &(0x7f0000000ac0)="$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") r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpu.stat\x00', 0x275a, 0x0) write$UHID_INPUT(r8, &(0x7f0000000940)={0x8, {"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", 0xfffffffffffffe43}}, 0x1006) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r8, 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000280), r0) syz_usb_connect$cdc_ncm(0x0, 0xfffffffffffffcae, 0x0, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_STOP(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) r9 = syz_open_dev$usbfs(&(0x7f0000000000), 0x8, 0x200001) ioctl$USBDEVFS_ALLOW_SUSPEND(r9, 0x5522) syz_usb_connect$cdc_ncm(0x0, 0xbd, &(0x7f0000000180)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xab, 0x2, 0x1, 0xdd, 0x20, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x6, 0x24, 0x6, 0x0, 0x1, 'H'}, {0x5, 0x24, 0x0, 0x5}, {0xd, 0x24, 0xf, 0x1, 0x9, 0x4, 0x9, 0xfc}, {0x6, 0x24, 0x1a, 0x8, 0x10}, [@mdlm_detail={0x2d, 0x24, 0x13, 0xd7, "92af0be4bc167135cd93f8b2c3f030553964d45ca7e89a18bb5efc1457038d90dab40686bc07f124fe"}, @call_mgmt={0x5, 0x24, 0x1, 0x2, 0x8}, @dmm={0x7, 0x24, 0x14, 0xaec, 0x3}, @mbim_extended={0x8, 0x24, 0x1c, 0x0, 0x0, 0x9}, @call_mgmt={0x5, 0x24, 0x1, 0x2}, @mbim_extended={0x8, 0x24, 0x1c, 0xfffb, 0x8, 0x401}]}, {{0x9, 0x5, 0x81, 0x3, 0x10, 0x10, 0xff, 0x8}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x400, 0xc, 0x6, 0x4}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x6, 0x7, 0x7}}}}}}}]}}, &(0x7f00000007c0)={0xa, &(0x7f0000000080)={0xa, 0x6, 0x250, 0x80, 0x1, 0x8, 0x20, 0xca}, 0x13, &(0x7f0000000240)={0x5, 0xf, 0x13, 0x2, [@ptm_cap={0x3}, @wireless={0xb, 0x10, 0x1, 0x8, 0x4, 0x6, 0x5, 0x9, 0x2}]}, 0x7, [{0x90, &(0x7f0000000300)=@string={0x90, 0x3, "e91ff89b16c182944fda3db1ea536f0fb3a2beb3910b2c70471131847caa057d3e9d1a72cf747f74a0b6ad7897837e61e23320ae71bb3ad0648fc764455dfce8ce8d6d1b66bdd8b0b2b88ca0c95039acec8b5a0df9f01526fa49e9fb423903d9b48fd447db4a187cdc619064cb1f4a91efdf423cf0f73c1bc8b757654765e2fe21e348da2ea90bd862efb3efdb59"}}, {0x4, &(0x7f00000003c0)=@lang_id={0x4, 0x3, 0x3c0a}}, {0xc7, &(0x7f00000004c0)=@string={0xc7, 0x3, "9f9b428a904f76951f4845503ceb58a0eefc34a06f3488a946a69608e90ed7873b6647470c4123dcefca5ce267c998fefb7a14b09acea3f28d8ceb98c627b59ec413e3ad9def8c2e88d1f08c5be3396bed8d25c227a683358a1264bd4c19ed9a039f3db28ab52d8bba36ef3b2fc7f614d6b46976c9c07de94c83383fa19e0c3ce0a7eeeff307fdc3254f51e8fb4843b57cea1c888c0943bbdc6594fa6dc19d60e7495d837c3f94d21700b4a6247e2a00bac92b39a204e482e649cb187b14dc3e439241a650"}}, {0x4, &(0x7f0000000440)=@lang_id={0x4, 0x3, 0x2809}}, {0xcb, &(0x7f00000005c0)=ANY=[@ANYBLOB="cb03f468fdfb1485974465b8f812bf7c2901836f2633f074f7a9c0c6af2d0092c9f257fe0c0e1fb2898236f1c1055993e8eef86a7a2ea46adb3839d33a2fee24ecc36851f256a1b65f272b3d4687f6be3c290a709a6ce07215c7ac30fba3c5ccc489e496f371bbfc5f24b93c2af2a39b74d1465a7c5e4cee515897817d623e192de5cd9604770192b02c0a6b38a9958b2260ad9ed31db6d2ef5b7175b0fb81c94134cf9ba76c96144c8ac2997661c33fc9900964e521312c86c6c100"/203]}, {0x4, &(0x7f00000006c0)=@lang_id={0x4, 0x3, 0x447}}, {0x4, &(0x7f0000000700)=@lang_id={0x4, 0x3, 0x416}}]}) kernel console output (not intermixed with test programs): 4-fs error (device loop5): ext4_orphan_get:1394: comm syz.5.637: couldn't read orphan inode 15 (err -117) [ 73.786495][ T5957] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 73.802748][ T5957] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 74.032028][ T5973] loop6: detected capacity change from 0 to 1024 [ 74.043429][ T5973] EXT4-fs (loop6): ext4_check_descriptors: Checksum for group 0 failed (1764!=20869) [ 74.054226][ T5973] EXT4-fs (loop6): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 74.082283][ T5973] EXT4-fs (loop6): invalid journal inode [ 74.088263][ T5973] EXT4-fs (loop6): can't get journal size [ 74.095473][ T5973] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 74.110783][ T5973] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 74.166147][ T4210] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 74.263814][ T5992] loop4: detected capacity change from 0 to 512 [ 74.281894][ T5992] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 74.294852][ T5992] ext4 filesystem being mounted at /121/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 74.305583][ T5996] loop7: detected capacity change from 0 to 512 [ 74.348162][ T5992] netlink: 92 bytes leftover after parsing attributes in process `syz.4.647'. [ 74.349327][ T5996] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 74.370749][ T5996] ext4 filesystem being mounted at /36/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 74.396652][ T3302] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 74.431631][ T5996] netlink: 92 bytes leftover after parsing attributes in process `syz.7.649'. [ 74.480354][ T5114] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 74.483313][ T6006] netlink: 'syz.4.651': attribute type 13 has an invalid length. [ 74.498597][ T6006] gretap0: refused to change device tx_queue_len [ 74.505268][ T6006] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 74.526373][ T6006] random: crng reseeded on system resumption [ 74.541450][ T3737] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 74.565345][ T6010] bpf_get_probe_write_proto: 5 callbacks suppressed [ 74.565368][ T6010] syz.7.652[6010] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.579020][ T6010] syz.7.652[6010] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.598206][ T6010] syz.7.652[6010] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 74.621156][ T6010] netlink: 'syz.7.652': attribute type 1 has an invalid length. [ 74.640441][ T6010] netlink: 220 bytes leftover after parsing attributes in process `syz.7.652'. [ 74.694967][ T6019] loop7: detected capacity change from 0 to 512 [ 74.720873][ T6019] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 74.733449][ T6019] ext4 filesystem being mounted at /38/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 74.841379][ T6031] loop0: detected capacity change from 0 to 512 [ 74.848396][ T6031] EXT4-fs (loop0): can't mount with both data=journal and delalloc [ 74.898366][ T6035] loop5: detected capacity change from 0 to 1024 [ 74.909742][ T6035] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (1764!=20869) [ 74.919692][ T6035] EXT4-fs (loop5): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 74.949333][ T6035] EXT4-fs (loop5): invalid journal inode [ 74.963932][ T6035] EXT4-fs (loop5): can't get journal size [ 75.176621][ T6035] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 75.243360][ T6035] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 75.415646][ T6048] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 75.461707][ T3737] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 75.473107][ T6048] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 75.611391][ T5114] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 75.632254][ T6048] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 75.699718][ T6048] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 75.786042][ T6048] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.830012][ T6048] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.843980][ T6048] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.866172][ T6048] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 75.985878][ T6083] loop4: detected capacity change from 0 to 512 [ 76.011697][ T6083] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 76.037271][ T6083] ext4 filesystem being mounted at /125/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 76.059575][ T6095] netlink: 'syz.7.676': attribute type 13 has an invalid length. [ 76.113836][ T6099] random: crng reseeded on system resumption [ 76.145331][ T6101] loop0: detected capacity change from 0 to 1024 [ 76.209865][ T6101] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (1764!=20869) [ 76.240555][ T6095] gretap0: refused to change device tx_queue_len [ 76.247029][ T6095] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 76.263830][ T6083] netlink: 92 bytes leftover after parsing attributes in process `syz.4.673'. [ 76.272841][ T6101] EXT4-fs (loop0): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 76.283787][ T6101] EXT4-fs (loop0): invalid journal inode [ 76.289592][ T6101] EXT4-fs (loop0): can't get journal size [ 76.296274][ T6101] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 76.311972][ T6101] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 76.313862][ T3302] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 76.401063][ T3306] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 76.450294][ T6114] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 76.500580][ T6114] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 76.526431][ T6121] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=6121 comm=syz.7.686 [ 76.539096][ T6121] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=6121 comm=syz.7.686 [ 76.553156][ T6121] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=47 sclass=netlink_audit_socket pid=6121 comm=syz.7.686 [ 76.567034][ T6114] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 76.610458][ T6114] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 76.621748][ T6126] loop7: detected capacity change from 0 to 8192 [ 76.630208][ T6126] FAT-fs (loop7): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 76.644350][ T6126] FAT-fs (loop7): error, fat_get_cluster: invalid cluster chain (i_pos 1046) [ 76.653359][ T6126] FAT-fs (loop7): Filesystem has been set read-only [ 76.660865][ T6126] FAT-fs (loop7): error, fat_get_cluster: invalid cluster chain (i_pos 1046) [ 76.667823][ T6129] netlink: 20 bytes leftover after parsing attributes in process `syz.5.688'. [ 76.669917][ T6126] FAT-fs (loop7): error, fat_get_cluster: invalid cluster chain (i_pos 1046) [ 76.688443][ T6126] FAT-fs (loop7): error, fat_get_cluster: invalid cluster chain (i_pos 1046) [ 76.698034][ T6126] FAT-fs (loop7): error, fat_get_cluster: invalid cluster chain (i_pos 1046) [ 76.707692][ T6126] FAT-fs (loop7): error, fat_get_cluster: invalid cluster chain (i_pos 1046) [ 76.709161][ T6130] netlink: 8 bytes leftover after parsing attributes in process `syz.7.687'. [ 76.717554][ T6126] FAT-fs (loop7): error, fat_get_cluster: invalid cluster chain (i_pos 1046) [ 76.734903][ T6126] FAT-fs (loop7): error, fat_get_cluster: invalid cluster chain (i_pos 1046) [ 76.744068][ T6126] FAT-fs (loop7): error, fat_get_cluster: invalid cluster chain (i_pos 1046) [ 76.753912][ T6126] FAT-fs (loop7): error, fat_get_cluster: invalid cluster chain (i_pos 1046) [ 76.932812][ T6147] FAULT_INJECTION: forcing a failure. [ 76.932812][ T6147] name failslab, interval 1, probability 0, space 0, times 0 [ 76.945652][ T6147] CPU: 1 UID: 0 PID: 6147 Comm: syz.5.696 Not tainted 6.13.0-rc5-syzkaller-00161-g63676eefb7a0 #0 [ 76.956269][ T6147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 76.966386][ T6147] Call Trace: [ 76.969675][ T6147] [ 76.972625][ T6147] dump_stack_lvl+0xf2/0x150 [ 76.977259][ T6147] dump_stack+0x15/0x1a [ 76.981463][ T6147] should_fail_ex+0x223/0x230 [ 76.986196][ T6147] should_failslab+0x8f/0xb0 [ 76.990869][ T6147] __kmalloc_node_track_caller_noprof+0xa8/0x410 [ 76.997206][ T6147] ? __kthread_create_on_node+0xce/0x230 [ 77.002947][ T6147] kvasprintf+0x8c/0x110 [ 77.007289][ T6147] ? __kmalloc_cache_noprof+0x186/0x320 [ 77.012847][ T6147] ? __pfx_batadv_tp_send+0x10/0x10 [ 77.018098][ T6147] __kthread_create_on_node+0xce/0x230 [ 77.023645][ T6147] ? __pfx_batadv_tp_send+0x10/0x10 [ 77.028930][ T6147] kthread_create_on_node+0x8a/0xc0 [ 77.034248][ T6147] ? batadv_tp_start+0x1a7/0x7b0 [ 77.039197][ T6147] ? batadv_tp_start+0x617/0x7b0 [ 77.044158][ T6147] ? init_timer_key+0x7a/0x170 [ 77.049001][ T6147] batadv_tp_start+0x640/0x7b0 [ 77.053806][ T6147] batadv_netlink_tp_meter_start+0x10b/0x260 [ 77.059802][ T6147] genl_rcv_msg+0x61b/0x6c0 [ 77.064431][ T6147] ? __pfx_batadv_pre_doit+0x10/0x10 [ 77.069729][ T6147] ? __pfx_batadv_netlink_tp_meter_start+0x10/0x10 [ 77.076254][ T6147] ? __pfx_batadv_post_doit+0x10/0x10 [ 77.081643][ T6147] ? __dev_queue_xmit+0xb6e/0x2090 [ 77.086800][ T6147] netlink_rcv_skb+0x12c/0x230 [ 77.091712][ T6147] ? __pfx_genl_rcv_msg+0x10/0x10 [ 77.096764][ T6147] genl_rcv+0x28/0x40 [ 77.100857][ T6147] netlink_unicast+0x599/0x670 [ 77.105640][ T6147] netlink_sendmsg+0x5cc/0x6e0 [ 77.110555][ T6147] ? __pfx_netlink_sendmsg+0x10/0x10 [ 77.115853][ T6147] __sock_sendmsg+0x140/0x180 [ 77.120615][ T6147] ____sys_sendmsg+0x312/0x410 [ 77.125400][ T6147] __sys_sendmsg+0x19d/0x230 [ 77.130055][ T6147] __x64_sys_sendmsg+0x46/0x50 [ 77.134827][ T6147] x64_sys_call+0x2734/0x2dc0 [ 77.139548][ T6147] do_syscall_64+0xc9/0x1c0 [ 77.144060][ T6147] ? clear_bhb_loop+0x55/0xb0 [ 77.148834][ T6147] ? clear_bhb_loop+0x55/0xb0 [ 77.153532][ T6147] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 77.159465][ T6147] RIP: 0033:0x7f815a885d29 [ 77.163945][ T6147] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 77.183647][ T6147] RSP: 002b:00007f8158ef7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 77.192154][ T6147] RAX: ffffffffffffffda RBX: 00007f815aa75fa0 RCX: 00007f815a885d29 [ 77.200134][ T6147] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 77.208110][ T6147] RBP: 00007f8158ef7090 R08: 0000000000000000 R09: 0000000000000000 [ 77.216158][ T6147] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 77.224134][ T6147] R13: 0000000000000000 R14: 00007f815aa75fa0 R15: 00007ffd46f2f328 [ 77.232119][ T6147] [ 77.235513][ T6147] batman_adv: batadv: cannot create tp meter kthread [ 77.263419][ T6149] loop5: detected capacity change from 0 to 164 [ 77.270095][ T6149] iso9660: Unknown parameter '017777777777777777777770x000000000000000001777777777777777777777' [ 77.326357][ T6154] loop5: detected capacity change from 0 to 512 [ 77.360683][ T6154] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 77.375287][ T6154] ext4 filesystem being mounted at /140/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 77.424738][ T6154] netlink: 92 bytes leftover after parsing attributes in process `syz.5.699'. [ 77.493315][ T3737] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 77.505910][ T6171] FAULT_INJECTION: forcing a failure. [ 77.505910][ T6171] name failslab, interval 1, probability 0, space 0, times 0 [ 77.518705][ T6171] CPU: 0 UID: 0 PID: 6171 Comm: +}[@ Not tainted 6.13.0-rc5-syzkaller-00161-g63676eefb7a0 #0 [ 77.528994][ T6171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 77.539176][ T6171] Call Trace: [ 77.542461][ T6171] [ 77.545433][ T6171] dump_stack_lvl+0xf2/0x150 [ 77.550166][ T6171] dump_stack+0x15/0x1a [ 77.554352][ T6171] should_fail_ex+0x223/0x230 [ 77.559106][ T6171] should_failslab+0x8f/0xb0 [ 77.563778][ T6171] kmem_cache_alloc_noprof+0x52/0x320 [ 77.569288][ T6171] ? skb_clone+0x154/0x1f0 [ 77.573745][ T6171] skb_clone+0x154/0x1f0 [ 77.578007][ T6171] __netlink_deliver_tap+0x2bd/0x4f0 [ 77.583316][ T6171] netlink_unicast+0x64a/0x670 [ 77.588304][ T6171] netlink_sendmsg+0x5cc/0x6e0 [ 77.593087][ T6171] ? __pfx_netlink_sendmsg+0x10/0x10 [ 77.598389][ T6171] __sock_sendmsg+0x140/0x180 [ 77.603199][ T6171] sock_write_iter+0x15e/0x1a0 [ 77.607983][ T6171] do_iter_readv_writev+0x394/0x450 [ 77.613203][ T6171] vfs_writev+0x2d4/0x880 [ 77.617539][ T6171] ? proc_fail_nth_write+0x12a/0x150 [ 77.623004][ T6171] do_writev+0xf4/0x220 [ 77.627187][ T6171] __x64_sys_writev+0x45/0x50 [ 77.631883][ T6171] x64_sys_call+0x1fab/0x2dc0 [ 77.636630][ T6171] do_syscall_64+0xc9/0x1c0 [ 77.641246][ T6171] ? clear_bhb_loop+0x55/0xb0 [ 77.646025][ T6171] ? clear_bhb_loop+0x55/0xb0 [ 77.650750][ T6171] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 77.656759][ T6171] RIP: 0033:0x7f2646f35d29 [ 77.661179][ T6171] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 77.680960][ T6171] RSP: 002b:00007f26455a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 77.689385][ T6171] RAX: ffffffffffffffda RBX: 00007f2647125fa0 RCX: 00007f2646f35d29 [ 77.697391][ T6171] RDX: 0000000000000001 RSI: 00000000200003c0 RDI: 0000000000000010 [ 77.705540][ T6171] RBP: 00007f26455a7090 R08: 0000000000000000 R09: 0000000000000000 [ 77.713519][ T6171] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 77.721561][ T6171] R13: 0000000000000000 R14: 00007f2647125fa0 R15: 00007fff1b4c23d8 [ 77.729581][ T6171] [ 77.732698][ T6171] netlink: '+}[@': attribute type 4 has an invalid length. [ 77.769501][ T29] kauditd_printk_skb: 121 callbacks suppressed [ 77.769517][ T29] audit: type=1326 audit(1736001906.167:2320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6176 comm="syz.7.709" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2646f35d29 code=0x7ffc0000 [ 77.784386][ T6177] netlink: 16 bytes leftover after parsing attributes in process `syz.7.709'. [ 77.801940][ T29] audit: type=1326 audit(1736001906.167:2321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6176 comm="syz.7.709" exe="/root/syz-executor" sig=0 arch=c000003e syscall=425 compat=0 ip=0x7f2646f35d29 code=0x7ffc0000 [ 77.807947][ T6177] tipc: Started in network mode [ 77.807972][ T6177] tipc: Node identity 00000000000000000000000000000001, cluster identity 4711 [ 77.831983][ T29] audit: type=1326 audit(1736001906.167:2322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6176 comm="syz.7.709" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f2646f35d63 code=0x7ffc0000 [ 77.836195][ T6177] tipc: Enabling of bearer rejected, failed to enable media [ 77.845096][ T29] audit: type=1326 audit(1736001906.167:2323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6176 comm="syz.7.709" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2646f35d29 code=0x7ffc0000 [ 77.845177][ T29] audit: type=1326 audit(1736001906.167:2324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6176 comm="syz.7.709" exe="/root/syz-executor" sig=0 arch=c000003e syscall=427 compat=0 ip=0x7f2646f35d29 code=0x7ffc0000 [ 77.845209][ T29] audit: type=1326 audit(1736001906.167:2325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6176 comm="syz.7.709" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2646f35d29 code=0x7ffc0000 [ 77.845240][ T29] audit: type=1326 audit(1736001906.167:2326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6176 comm="syz.7.709" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2646f35d29 code=0x7ffc0000 [ 77.909140][ T6180] loop5: detected capacity change from 0 to 512 [ 77.924825][ T29] audit: type=1326 audit(1736001906.167:2327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6176 comm="syz.7.709" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f2646f35d29 code=0x7ffc0000 [ 78.001152][ T29] audit: type=1326 audit(1736001906.167:2328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6176 comm="syz.7.709" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2646f35d29 code=0x7ffc0000 [ 78.025188][ T29] audit: type=1326 audit(1736001906.167:2329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6176 comm="syz.7.709" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2646f35d29 code=0x7ffc0000 [ 78.149143][ T6195] syz.4.716[6195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.149284][ T6195] syz.4.716[6195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.161892][ T6195] syz.4.716[6195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 78.197828][ T6199] loop4: detected capacity change from 0 to 512 [ 78.250091][ T6199] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 78.262816][ T6199] ext4 filesystem being mounted at /137/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 78.286267][ T6208] loop6: detected capacity change from 0 to 512 [ 78.294408][ T6208] EXT4-fs: Ignoring removed nomblk_io_submit option [ 78.313069][ T6208] EXT4-fs error (device loop6): ext4_xattr_ibody_find:2240: inode #15: comm syz.6.721: corrupted in-inode xattr: invalid ea_ino [ 78.327128][ T6208] EXT4-fs error (device loop6): ext4_orphan_get:1394: comm syz.6.721: couldn't read orphan inode 15 (err -117) [ 78.345769][ T6208] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 78.385086][ T6199] netlink: 92 bytes leftover after parsing attributes in process `syz.4.718'. [ 78.415110][ T6114] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.430235][ T6114] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.445932][ T6114] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.455460][ T4210] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 78.467505][ T6114] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.501899][ T3302] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 78.595171][ T6245] netlink: 'syz.6.723': attribute type 13 has an invalid length. [ 78.630218][ T6245] gretap0: refused to change device tx_queue_len [ 78.636646][ T6245] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 78.689958][ T6251] random: crng reseeded on system resumption [ 78.820493][ T6259] FAULT_INJECTION: forcing a failure. [ 78.820493][ T6259] name failslab, interval 1, probability 0, space 0, times 0 [ 78.833291][ T6259] CPU: 0 UID: 0 PID: 6259 Comm: syz.4.729 Not tainted 6.13.0-rc5-syzkaller-00161-g63676eefb7a0 #0 [ 78.843900][ T6259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 78.854004][ T6259] Call Trace: [ 78.857291][ T6259] [ 78.860277][ T6259] dump_stack_lvl+0xf2/0x150 [ 78.864919][ T6259] dump_stack+0x15/0x1a [ 78.869153][ T6259] should_fail_ex+0x223/0x230 [ 78.873973][ T6259] should_failslab+0x8f/0xb0 [ 78.878591][ T6259] kmem_cache_alloc_noprof+0x52/0x320 [ 78.884025][ T6259] ? skb_clone+0x154/0x1f0 [ 78.888495][ T6259] skb_clone+0x154/0x1f0 [ 78.892821][ T6259] pfkey_sendmsg+0x2de/0x970 [ 78.897452][ T6259] ? selinux_socket_sendmsg+0x185/0x1c0 [ 78.903126][ T6259] ? __pfx_pfkey_sendmsg+0x10/0x10 [ 78.908299][ T6259] __sock_sendmsg+0x140/0x180 [ 78.913080][ T6259] ____sys_sendmsg+0x312/0x410 [ 78.917915][ T6259] __sys_sendmsg+0x19d/0x230 [ 78.922616][ T6259] __x64_sys_sendmsg+0x46/0x50 [ 78.927398][ T6259] x64_sys_call+0x2734/0x2dc0 [ 78.932139][ T6259] do_syscall_64+0xc9/0x1c0 [ 78.936658][ T6259] ? clear_bhb_loop+0x55/0xb0 [ 78.941474][ T6259] ? clear_bhb_loop+0x55/0xb0 [ 78.946173][ T6259] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 78.952107][ T6259] RIP: 0033:0x7fc778cb5d29 [ 78.956538][ T6259] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 78.976178][ T6259] RSP: 002b:00007fc777327038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 78.984703][ T6259] RAX: ffffffffffffffda RBX: 00007fc778ea5fa0 RCX: 00007fc778cb5d29 [ 78.992705][ T6259] RDX: 0000000000000000 RSI: 00000000200002c0 RDI: 0000000000000009 [ 79.000740][ T6259] RBP: 00007fc777327090 R08: 0000000000000000 R09: 0000000000000000 [ 79.008732][ T6259] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 79.016748][ T6259] R13: 0000000000000000 R14: 00007fc778ea5fa0 R15: 00007ffe64ec6a58 [ 79.024759][ T6259] [ 79.089378][ T6275] FAULT_INJECTION: forcing a failure. [ 79.089378][ T6275] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 79.102558][ T6275] CPU: 1 UID: 0 PID: 6275 Comm: syz.4.735 Not tainted 6.13.0-rc5-syzkaller-00161-g63676eefb7a0 #0 [ 79.113175][ T6275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 79.123322][ T6275] Call Trace: [ 79.126611][ T6275] [ 79.129628][ T6275] dump_stack_lvl+0xf2/0x150 [ 79.134280][ T6275] dump_stack+0x15/0x1a [ 79.138459][ T6275] should_fail_ex+0x223/0x230 [ 79.143314][ T6275] should_fail+0xb/0x10 [ 79.147477][ T6275] should_fail_usercopy+0x1a/0x20 [ 79.152517][ T6275] _copy_to_user+0x20/0xa0 [ 79.156982][ T6275] simple_read_from_buffer+0xa0/0x110 [ 79.162398][ T6275] proc_fail_nth_read+0xf9/0x140 [ 79.167463][ T6275] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 79.173028][ T6275] vfs_read+0x1a2/0x700 [ 79.177197][ T6275] ? __se_sys_mount+0x2a0/0x2d0 [ 79.182070][ T6275] ? __rcu_read_unlock+0x4e/0x70 [ 79.187026][ T6275] ? __fget_files+0x17c/0x1c0 [ 79.191809][ T6275] ksys_read+0xe8/0x1b0 [ 79.195981][ T6275] __x64_sys_read+0x42/0x50 [ 79.200577][ T6275] x64_sys_call+0x2874/0x2dc0 [ 79.205299][ T6275] do_syscall_64+0xc9/0x1c0 [ 79.209903][ T6275] ? clear_bhb_loop+0x55/0xb0 [ 79.214620][ T6275] ? clear_bhb_loop+0x55/0xb0 [ 79.219321][ T6275] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 79.225259][ T6275] RIP: 0033:0x7fc778cb473c [ 79.229689][ T6275] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 79.249419][ T6275] RSP: 002b:00007fc777327030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 79.257896][ T6275] RAX: ffffffffffffffda RBX: 00007fc778ea5fa0 RCX: 00007fc778cb473c [ 79.265872][ T6275] RDX: 000000000000000f RSI: 00007fc7773270a0 RDI: 0000000000000006 [ 79.273924][ T6275] RBP: 00007fc777327090 R08: 0000000000000000 R09: 0000000000000000 [ 79.282000][ T6275] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 79.290023][ T6275] R13: 0000000000000000 R14: 00007fc778ea5fa0 R15: 00007ffe64ec6a58 [ 79.298096][ T6275] [ 79.319848][ T6273] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 79.347468][ T6281] loop4: detected capacity change from 0 to 256 [ 79.419763][ T6273] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 79.510347][ T6273] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 79.533733][ T6296] FAULT_INJECTION: forcing a failure. [ 79.533733][ T6296] name failslab, interval 1, probability 0, space 0, times 0 [ 79.546538][ T6296] CPU: 0 UID: 0 PID: 6296 Comm: syz.6.742 Not tainted 6.13.0-rc5-syzkaller-00161-g63676eefb7a0 #0 [ 79.557412][ T6296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 79.567521][ T6296] Call Trace: [ 79.570833][ T6296] [ 79.573800][ T6296] dump_stack_lvl+0xf2/0x150 [ 79.578462][ T6296] dump_stack+0x15/0x1a [ 79.582666][ T6296] should_fail_ex+0x223/0x230 [ 79.587388][ T6296] should_failslab+0x8f/0xb0 [ 79.592057][ T6296] kmem_cache_alloc_noprof+0x52/0x320 [ 79.597473][ T6296] ? skb_clone+0x154/0x1f0 [ 79.601954][ T6296] skb_clone+0x154/0x1f0 [ 79.606226][ T6296] __netlink_deliver_tap+0x2bd/0x4f0 [ 79.611589][ T6296] netlink_unicast+0x64a/0x670 [ 79.616385][ T6296] netlink_sendmsg+0x5cc/0x6e0 [ 79.621204][ T6296] ? __pfx_netlink_sendmsg+0x10/0x10 [ 79.626553][ T6296] __sock_sendmsg+0x140/0x180 [ 79.631306][ T6296] ____sys_sendmsg+0x312/0x410 [ 79.636111][ T6296] __sys_sendmmsg+0x227/0x4b0 [ 79.640832][ T6296] __x64_sys_sendmmsg+0x57/0x70 [ 79.645728][ T6296] x64_sys_call+0x29aa/0x2dc0 [ 79.650436][ T6296] do_syscall_64+0xc9/0x1c0 [ 79.655025][ T6296] ? clear_bhb_loop+0x55/0xb0 [ 79.659714][ T6296] ? clear_bhb_loop+0x55/0xb0 [ 79.664405][ T6296] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 79.670328][ T6296] RIP: 0033:0x7feded635d29 [ 79.674817][ T6296] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 79.694622][ T6296] RSP: 002b:00007fedebca7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 79.703053][ T6296] RAX: ffffffffffffffda RBX: 00007feded825fa0 RCX: 00007feded635d29 [ 79.711032][ T6296] RDX: 040000000000009f RSI: 00000000200002c0 RDI: 0000000000000005 [ 79.719035][ T6296] RBP: 00007fedebca7090 R08: 0000000000000000 R09: 0000000000000000 [ 79.727019][ T6296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 79.734995][ T6296] R13: 0000000000000000 R14: 00007feded825fa0 R15: 00007ffcf31d8418 [ 79.742978][ T6296] [ 79.799780][ T6273] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 79.952857][ T6373] loop6: detected capacity change from 0 to 512 [ 79.966788][ T6373] EXT4-fs (loop6): feature flags set on rev 0 fs, running e2fsck is recommended [ 80.002107][ T6373] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 80.017856][ T6373] EXT4-fs error (device loop6): ext4_do_update_inode:5153: inode #2: comm syz.6.746: corrupted inode contents [ 80.042858][ T6373] EXT4-fs error (device loop6): ext4_dirty_inode:6041: inode #2: comm syz.6.746: mark_inode_dirty error [ 80.055240][ T6373] EXT4-fs error (device loop6): ext4_do_update_inode:5153: inode #2: comm syz.6.746: corrupted inode contents [ 80.095275][ T4210] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 80.303442][ T6417] loop7: detected capacity change from 0 to 512 [ 80.322165][ T6417] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 80.336158][ T6417] ext4 filesystem being mounted at /62/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 80.387903][ T6417] netlink: 92 bytes leftover after parsing attributes in process `syz.7.756'. [ 80.388885][ T6425] FAULT_INJECTION: forcing a failure. [ 80.388885][ T6425] name failslab, interval 1, probability 0, space 0, times 0 [ 80.409786][ T6425] CPU: 1 UID: 0 PID: 6425 Comm: syz.6.758 Not tainted 6.13.0-rc5-syzkaller-00161-g63676eefb7a0 #0 [ 80.420408][ T6425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 80.430470][ T6425] Call Trace: [ 80.433800][ T6425] [ 80.436800][ T6425] dump_stack_lvl+0xf2/0x150 [ 80.441446][ T6425] dump_stack+0x15/0x1a [ 80.445723][ T6425] should_fail_ex+0x223/0x230 [ 80.450486][ T6425] should_failslab+0x8f/0xb0 [ 80.455155][ T6425] kmem_cache_alloc_noprof+0x52/0x320 [ 80.460539][ T6425] ? __anon_vma_prepare+0x73/0x310 [ 80.465671][ T6425] __anon_vma_prepare+0x73/0x310 [ 80.470687][ T6425] ? handle_mm_fault+0x1c6e/0x2ac0 [ 80.475877][ T6425] handle_mm_fault+0x1c76/0x2ac0 [ 80.480831][ T6425] exc_page_fault+0x3b9/0x650 [ 80.485573][ T6425] asm_exc_page_fault+0x26/0x30 [ 80.490579][ T6425] RIP: 0033:0x7feded4f8ba3 [ 80.494999][ T6425] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 80.514702][ T6425] RSP: 002b:00007fedebca64a0 EFLAGS: 00010202 [ 80.520795][ T6425] RAX: 0000000000008000 RBX: 00007fedebca6540 RCX: 00007fede3887000 [ 80.528862][ T6425] RDX: 00007fedebca66e0 RSI: 0000000000000002 RDI: 00007fedebca65e0 [ 80.536929][ T6425] RBP: 0000000000000102 R08: 0000000000000006 R09: 000000000000000c [ 80.544919][ T6425] R10: 000000000000001a R11: 00007fedebca6540 R12: 0000000000000001 [ 80.552989][ T6425] R13: 00007feded6c9040 R14: 0000000000000001 R15: 00007fedebca65e0 [ 80.560978][ T6425] [ 80.564070][ T6425] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 80.575812][ T6425] loop6: detected capacity change from 0 to 164 [ 80.588050][ T6425] rock: corrupted directory entry. extent=41, offset=65536, size=8 [ 80.590591][ T5114] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 80.714187][ T6435] netlink: 4 bytes leftover after parsing attributes in process `syz.6.762'. [ 80.736143][ T6437] 9pnet: p9_errstr2errno: server reported unknown error @í΂Í(ááí«Q00000000000000000008 [ 80.748013][ T6435] team0 (unregistering): Port device team_slave_0 removed [ 80.758124][ T6435] team0 (unregistering): Port device team_slave_1 removed [ 80.841962][ T6444] syz.7.767[6444] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.842071][ T6444] syz.7.767[6444] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.853918][ T6444] syz.7.767[6444] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 80.972658][ T6455] netlink: 4 bytes leftover after parsing attributes in process `syz.7.771'. [ 81.131746][ T6469] netlink: 16178 bytes leftover after parsing attributes in process `syz.4.775'. [ 81.149957][ T6474] loop6: detected capacity change from 0 to 1024 [ 81.162910][ T6469] netlink: 'syz.4.775': attribute type 4 has an invalid length. [ 81.193396][ T6474] EXT4-fs (loop6): ext4_check_descriptors: Checksum for group 0 failed (62631!=20869) [ 81.228044][ T6474] EXT4-fs (loop6): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 81.232061][ T6484] loop7: detected capacity change from 0 to 164 [ 81.258894][ T6474] jbd2_journal_init_inode: Cannot locate journal superblock [ 81.266510][ T6474] EXT4-fs (loop6): Could not load journal inode [ 81.278089][ T6484] rock: directory entry would overflow storage [ 81.285064][ T6484] rock: sig=0x66, size=4, remaining=3 [ 81.319961][ T6484] rock: directory entry would overflow storage [ 81.326240][ T6484] rock: sig=0x66, size=4, remaining=3 [ 81.336685][ T6484] iso9660: Corrupted directory entry in block 4 of inode 1792 [ 81.363806][ T6484] rock: directory entry would overflow storage [ 81.370788][ T6484] rock: sig=0x66, size=4, remaining=3 [ 81.378993][ T6484] iso9660: Corrupted directory entry in block 4 of inode 1792 [ 81.750618][ T6540] netlink: 16178 bytes leftover after parsing attributes in process `syz.6.792'. [ 81.812996][ T6540] netlink: 'syz.6.792': attribute type 4 has an invalid length. [ 82.138700][ T6573] loop7: detected capacity change from 0 to 8192 [ 82.326684][ T6585] netem: change failed [ 82.331693][ T6586] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6586 comm=syz.5.804 [ 82.374099][ T6590] FAULT_INJECTION: forcing a failure. [ 82.374099][ T6590] name failslab, interval 1, probability 0, space 0, times 0 [ 82.386953][ T6590] CPU: 0 UID: 0 PID: 6590 Comm: syz.5.805 Not tainted 6.13.0-rc5-syzkaller-00161-g63676eefb7a0 #0 [ 82.397580][ T6590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 82.407745][ T6590] Call Trace: [ 82.411069][ T6590] [ 82.414038][ T6590] dump_stack_lvl+0xf2/0x150 [ 82.418719][ T6590] dump_stack+0x15/0x1a [ 82.422972][ T6590] should_fail_ex+0x223/0x230 [ 82.427727][ T6590] should_failslab+0x8f/0xb0 [ 82.432404][ T6590] kmem_cache_alloc_node_noprof+0x59/0x320 [ 82.438270][ T6590] ? __alloc_skb+0x10b/0x310 [ 82.442893][ T6590] __alloc_skb+0x10b/0x310 [ 82.447394][ T6590] ? audit_log_start+0x34c/0x6b0 [ 82.452357][ T6590] audit_log_start+0x368/0x6b0 [ 82.457157][ T6590] audit_seccomp+0x4b/0x130 [ 82.461724][ T6590] __seccomp_filter+0x6fa/0x1180 [ 82.466747][ T6590] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 82.472499][ T6590] ? vfs_write+0x596/0x920 [ 82.477006][ T6590] ? putname+0xcf/0xf0 [ 82.481106][ T6590] __secure_computing+0x9f/0x1c0 [ 82.486108][ T6590] syscall_trace_enter+0xd1/0x1f0 [ 82.491300][ T6590] ? fpregs_assert_state_consistent+0x83/0xa0 [ 82.497396][ T6590] do_syscall_64+0xaa/0x1c0 [ 82.501994][ T6590] ? clear_bhb_loop+0x55/0xb0 [ 82.504126][ T6599] syz.7.809[6599] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.506684][ T6590] ? clear_bhb_loop+0x55/0xb0 [ 82.518139][ T6599] syz.7.809[6599] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.522553][ T6590] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 82.522603][ T6590] RIP: 0033:0x7f815a885d29 [ 82.522623][ T6590] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 82.534151][ T6599] syz.7.809[6599] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.539674][ T6590] RSP: 002b:00007f8158ef7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000072 [ 82.539713][ T6590] RAX: ffffffffffffffda RBX: 00007f815aa75fa0 RCX: 00007f815a885d29 [ 82.539730][ T6590] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 82.599441][ T6590] RBP: 00007f8158ef7090 R08: 0000000000000000 R09: 0000000000000000 [ 82.607435][ T6590] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 82.615437][ T6590] R13: 0000000000000000 R14: 00007f815aa75fa0 R15: 00007ffd46f2f328 [ 82.623439][ T6590] [ 82.645665][ T6273] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.661602][ T6273] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.674692][ T6273] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.690683][ T6273] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.888697][ T6623] loop4: detected capacity change from 0 to 128 [ 82.895079][ T29] kauditd_printk_skb: 359 callbacks suppressed [ 82.895095][ T29] audit: type=1400 audit(1736001911.287:2687): avc: denied { ioctl } for pid=6617 comm="syz.6.816" path="socket:[15549]" dev="sockfs" ino=15549 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 82.934251][ T6625] syz.7.820[6625] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.934384][ T6625] syz.7.820[6625] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.960379][ T6618] rdma_op ffff88812c19bd80 conn xmit_rdma 0000000000000000 [ 82.995605][ T6625] syz.7.820[6625] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.026949][ T6357] kworker/u8:66: attempt to access beyond end of device [ 83.026949][ T6357] loop4: rw=1, sector=145, nr_sectors = 896 limit=128 [ 83.062769][ T29] audit: type=1400 audit(1736001911.357:2688): avc: denied { setopt } for pid=6617 comm="syz.6.816" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 83.083068][ T29] audit: type=1400 audit(1736001911.387:2689): avc: denied { read write } for pid=6624 comm="syz.7.820" name="rdma_cm" dev="devtmpfs" ino=251 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 83.106468][ T29] audit: type=1400 audit(1736001911.387:2690): avc: denied { open } for pid=6624 comm="syz.7.820" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=251 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 83.130542][ T29] audit: type=1326 audit(1736001911.457:2691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6624 comm="syz.7.820" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2646f35d29 code=0x7ffc0000 [ 83.154080][ T29] audit: type=1326 audit(1736001911.457:2692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6624 comm="syz.7.820" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2646f35d29 code=0x7ffc0000 [ 83.174882][ T6639] Cannot find add_set index 0 as target [ 83.177533][ T29] audit: type=1326 audit(1736001911.457:2693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6624 comm="syz.7.820" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f2646f34690 code=0x7ffc0000 [ 83.206520][ T29] audit: type=1326 audit(1736001911.457:2694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6624 comm="syz.7.820" exe="/root/syz-executor" sig=0 arch=c000003e syscall=308 compat=0 ip=0x7f2646f37557 code=0x7ffc0000 [ 83.230004][ T29] audit: type=1326 audit(1736001911.457:2695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6624 comm="syz.7.820" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f2646f35d29 code=0x7ffc0000 [ 83.253426][ T29] audit: type=1326 audit(1736001911.457:2696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6624 comm="syz.7.820" exe="/root/syz-executor" sig=0 arch=c000003e syscall=308 compat=0 ip=0x7f2646f37557 code=0x7ffc0000 [ 83.321205][ T6612] netlink: 92 bytes leftover after parsing attributes in process `syz.0.814'. [ 83.888207][ T6654] netlink: 8 bytes leftover after parsing attributes in process `syz.5.830'. [ 83.973188][ T6673] Cannot find add_set index 0 as target [ 84.102696][ T6683] batman_adv: batadv0: Adding interface: dummy0 [ 84.109056][ T6683] batman_adv: batadv0: The MTU of interface dummy0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 84.157646][ T6683] batman_adv: batadv0: Interface activated: dummy0 [ 84.467128][ T6741] Cannot find add_set index 0 as target [ 84.526637][ T6747] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 84.621495][ T6753] loop6: detected capacity change from 0 to 512 [ 84.653315][ T6753] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 84.674439][ T6753] ext4 filesystem being mounted at /110/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 84.697417][ T6753] netlink: 12 bytes leftover after parsing attributes in process `syz.6.855'. [ 84.707096][ T6753] netlink: 12 bytes leftover after parsing attributes in process `syz.6.855'. [ 84.707404][ T6757] netlink: 8 bytes leftover after parsing attributes in process `syz.5.856'. [ 84.745102][ T4210] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 84.784459][ T6773] xt_connbytes: Forcing CT accounting to be enabled [ 84.791277][ T6773] Cannot find add_set index 0 as target [ 84.926481][ T6788] tipc: Enabling of bearer rejected, failed to enable media [ 85.673659][ T6800] loop7: detected capacity change from 0 to 512 [ 86.131887][ T6800] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 86.175387][ T6800] ext4 filesystem being mounted at /97/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 86.337147][ T6799] netlink: 92 bytes leftover after parsing attributes in process `syz.7.871'. [ 86.457199][ T5114] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 86.607385][ T6821] netlink: 4 bytes leftover after parsing attributes in process `syz.6.882'. [ 86.644846][ T6821] bridge_slave_1: left allmulticast mode [ 86.650581][ T6821] bridge_slave_1: left promiscuous mode [ 86.656361][ T6821] bridge0: port 2(bridge_slave_1) entered disabled state [ 86.748009][ T6845] loop6: detected capacity change from 0 to 256 [ 86.772175][ T6821] bridge_slave_0: left allmulticast mode [ 86.777887][ T6821] bridge_slave_0: left promiscuous mode [ 86.784357][ T6821] bridge0: port 1(bridge_slave_0) entered disabled state [ 86.823673][ T6847] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 87.282444][ T6857] Cannot find add_set index 0 as target [ 87.472736][ T6875] netlink: 12 bytes leftover after parsing attributes in process `syz.4.896'. [ 87.615927][ T6874] FAULT_INJECTION: forcing a failure. [ 87.615927][ T6874] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 87.630185][ T6874] CPU: 0 UID: 0 PID: 6874 Comm: syz.6.893 Not tainted 6.13.0-rc5-syzkaller-00161-g63676eefb7a0 #0 [ 87.640906][ T6874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 87.650985][ T6874] Call Trace: [ 87.654314][ T6874] [ 87.657258][ T6874] dump_stack_lvl+0xf2/0x150 [ 87.661889][ T6874] dump_stack+0x15/0x1a [ 87.666124][ T6874] should_fail_ex+0x223/0x230 [ 87.670865][ T6874] should_fail_alloc_page+0xfd/0x110 [ 87.676198][ T6874] __alloc_pages_noprof+0x109/0x340 [ 87.681509][ T6874] alloc_pages_mpol_noprof+0xb1/0x1e0 [ 87.686928][ T6874] vma_alloc_folio_noprof+0x1a0/0x2f0 [ 87.692407][ T6874] do_wp_page+0x64b/0x2340 [ 87.696849][ T6874] ? __rcu_read_lock+0x36/0x50 [ 87.701690][ T6874] handle_mm_fault+0xc63/0x2ac0 [ 87.706703][ T6874] exc_page_fault+0x3b9/0x650 [ 87.711428][ T6874] asm_exc_page_fault+0x26/0x30 [ 87.716342][ T6874] RIP: 0033:0x7feded4f8c50 [ 87.720775][ T6874] Code: 39 4f 08 72 4c 8d 4d ff 85 ed 74 33 66 0f 1f 44 00 00 48 39 f0 72 1b 4d 8b 07 49 89 c1 49 29 f1 47 0f b6 0c 08 45 84 c9 74 08 <45> 88 0c 00 49 8b 47 10 48 83 c0 01 49 89 47 10 83 e9 01 73 d3 41 [ 87.740409][ T6874] RSP: 002b:00007fedebca64a0 EFLAGS: 00010202 [ 87.746539][ T6874] RAX: 0000000000007005 RBX: 00007fedebca6540 RCX: 0000000000000018 [ 87.754575][ T6874] RDX: 00000000000003ff RSI: 0000000000001000 RDI: 00007fedebca65e0 [ 87.762574][ T6874] RBP: 0000000000000019 R08: 00007fede3887000 R09: 0000000000000010 [ 87.770570][ T6874] R10: 0000000020001cc2 R11: 00000000000004c3 R12: 0000000000000c01 [ 87.778562][ T6874] R13: 00007feded6c9040 R14: 0000000000000017 R15: 00007fedebca65e0 [ 87.786560][ T6874] [ 87.790374][ T6874] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 87.861271][ T6890] loop5: detected capacity change from 0 to 1024 [ 87.894498][ T6890] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (1764!=20869) [ 87.916211][ T6893] netlink: 8 bytes leftover after parsing attributes in process `syz.4.903'. [ 87.928296][ T6874] loop6: detected capacity change from 0 to 512 [ 87.938891][ T6890] EXT4-fs (loop5): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 87.977682][ T6874] EXT4-fs: Mount option(s) incompatible with ext3 [ 88.003653][ T6890] EXT4-fs (loop5): invalid journal inode [ 88.046523][ T6890] EXT4-fs (loop5): can't get journal size [ 88.066420][ T29] kauditd_printk_skb: 102 callbacks suppressed [ 88.066437][ T29] audit: type=1326 audit(1736001916.457:2799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6896 comm="syz.0.904" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbec0685d29 code=0x7ffc0000 [ 88.110944][ T6890] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 88.143455][ T6901] SELinux: Context system_u:object_r:mouse_device_t:s0 is not valid (left unmapped). [ 88.161846][ T6901] batman_adv: batadv0: Adding interface: ip6gretap1 [ 88.168493][ T6901] batman_adv: batadv0: The MTU of interface ip6gretap1 is too small (1434) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 88.195553][ T6901] batman_adv: batadv0: Interface activated: ip6gretap1 [ 88.252748][ T6906] lo: entered promiscuous mode [ 88.257750][ T6906] lo: entered allmulticast mode [ 88.265346][ T29] audit: type=1326 audit(1736001916.487:2800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6896 comm="syz.0.904" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbec0685d29 code=0x7ffc0000 [ 88.289491][ T29] audit: type=1326 audit(1736001916.497:2801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6896 comm="syz.0.904" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fbec0685d29 code=0x7ffc0000 [ 88.312822][ T29] audit: type=1326 audit(1736001916.497:2802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6896 comm="syz.0.904" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbec0685d29 code=0x7ffc0000 [ 88.336812][ T29] audit: type=1326 audit(1736001916.497:2803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6896 comm="syz.0.904" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbec0685d29 code=0x7ffc0000 [ 88.361019][ T29] audit: type=1326 audit(1736001916.497:2804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6896 comm="syz.0.904" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fbec0685d29 code=0x7ffc0000 [ 88.384357][ T29] audit: type=1326 audit(1736001916.497:2805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6896 comm="syz.0.904" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbec0685d29 code=0x7ffc0000 [ 88.408614][ T29] audit: type=1326 audit(1736001916.497:2806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6896 comm="syz.0.904" exe="/root/syz-executor" sig=0 arch=c000003e syscall=272 compat=0 ip=0x7fbec0685d29 code=0x7ffc0000 [ 88.433254][ T29] audit: type=1326 audit(1736001916.497:2807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6896 comm="syz.0.904" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbec0685d29 code=0x7ffc0000 [ 88.456668][ T29] audit: type=1326 audit(1736001916.497:2808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6896 comm="syz.0.904" exe="/root/syz-executor" sig=0 arch=c000003e syscall=64 compat=0 ip=0x7fbec0685d29 code=0x7ffc0000 [ 88.491700][ T6890] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 88.677172][ T6914] can0: slcan on ttyS3. [ 88.686667][ T3737] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 88.706924][ T6914] netlink: 'syz.6.912': attribute type 21 has an invalid length. [ 88.744933][ T6914] netlink: 132 bytes leftover after parsing attributes in process `syz.6.912'. [ 88.869420][ T6926] loop7: detected capacity change from 0 to 128 [ 88.952954][ T6920] loop5: detected capacity change from 0 to 8192 [ 88.985227][ T6920] FAT-fs (loop5): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 89.136060][ T6934] 9pnet_fd: Insufficient options for proto=fd [ 89.239654][ T6920] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 1044) [ 89.248487][ T6920] FAT-fs (loop5): Filesystem has been set read-only [ 89.292931][ T6941] loop7: detected capacity change from 0 to 512 [ 89.311252][ T6920] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 1044) [ 89.339174][ T6941] EXT4-fs error (device loop7): ext4_orphan_get:1389: inode #15: comm syz.7.921: casefold flag without casefold feature [ 89.360439][ T6920] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 1044) [ 89.419841][ T6941] EXT4-fs error (device loop7): ext4_orphan_get:1394: comm syz.7.921: couldn't read orphan inode 15 (err -117) [ 89.442990][ T6932] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 1044) [ 89.470079][ T6941] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 89.648479][ T5114] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 89.676357][ T3737] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 1044) [ 89.758827][ T6913] can0 (unregistered): slcan off ttyS3. [ 89.777466][ T6956] loop7: detected capacity change from 0 to 1024 [ 89.847902][ T6956] EXT4-fs (loop7): ext4_check_descriptors: Checksum for group 0 failed (1764!=20869) [ 89.921915][ T6956] EXT4-fs (loop7): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 89.982466][ T6956] EXT4-fs (loop7): invalid journal inode [ 90.014444][ T6956] EXT4-fs (loop7): can't get journal size [ 90.036950][ T6956] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 90.192277][ T6956] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 90.254532][ T6991] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6991 comm=syz.6.930 [ 90.393240][ T6998] netlink: 8 bytes leftover after parsing attributes in process `syz.0.935'. [ 90.465181][ T5114] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 90.475665][ T7005] loop4: detected capacity change from 0 to 128 [ 90.492841][ T6998] bond1: entered promiscuous mode [ 90.498032][ T6998] bond1: entered allmulticast mode [ 90.503694][ T6998] 8021q: adding VLAN 0 to HW filter on device bond1 [ 90.565381][ T7004] netlink: 4 bytes leftover after parsing attributes in process `syz.5.933'. [ 90.655966][ T7005] syz.4.936: attempt to access beyond end of device [ 90.655966][ T7005] loop4: rw=2049, sector=145, nr_sectors = 896 limit=128 [ 90.789963][ T7018] loop6: detected capacity change from 0 to 1024 [ 90.813930][ T7018] EXT4-fs (loop6): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 90.824872][ T7018] EXT4-fs (loop6): group descriptors corrupted! [ 91.001824][ T7031] netlink: 28 bytes leftover after parsing attributes in process `syz.4.941'. [ 91.295901][ T7048] loop7: detected capacity change from 0 to 8192 [ 91.484058][ T7059] Cannot find add_set index 0 as target [ 91.665292][ T7069] FAULT_INJECTION: forcing a failure. [ 91.665292][ T7069] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 91.678443][ T7069] CPU: 0 UID: 0 PID: 7069 Comm: syz.4.954 Not tainted 6.13.0-rc5-syzkaller-00161-g63676eefb7a0 #0 [ 91.689108][ T7069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 91.699215][ T7069] Call Trace: [ 91.702509][ T7069] [ 91.705459][ T7069] dump_stack_lvl+0xf2/0x150 [ 91.710157][ T7069] dump_stack+0x15/0x1a [ 91.714370][ T7069] should_fail_ex+0x223/0x230 [ 91.719078][ T7069] should_fail+0xb/0x10 [ 91.723341][ T7069] should_fail_usercopy+0x1a/0x20 [ 91.728394][ T7069] _copy_from_user+0x1e/0xb0 [ 91.733074][ T7069] copy_msghdr_from_user+0x54/0x2a0 [ 91.738371][ T7069] ? __fget_files+0x17c/0x1c0 [ 91.743113][ T7069] __sys_sendmsg+0x13e/0x230 [ 91.747850][ T7069] __x64_sys_sendmsg+0x46/0x50 [ 91.752760][ T7069] x64_sys_call+0x2734/0x2dc0 [ 91.757464][ T7069] do_syscall_64+0xc9/0x1c0 [ 91.761989][ T7069] ? clear_bhb_loop+0x55/0xb0 [ 91.766686][ T7069] ? clear_bhb_loop+0x55/0xb0 [ 91.771423][ T7069] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 91.777414][ T7069] RIP: 0033:0x7fc778cb5d29 [ 91.781850][ T7069] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 91.801489][ T7069] RSP: 002b:00007fc777327038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 91.809928][ T7069] RAX: ffffffffffffffda RBX: 00007fc778ea5fa0 RCX: 00007fc778cb5d29 [ 91.817964][ T7069] RDX: 0000000000000000 RSI: 0000000020001540 RDI: 0000000000000005 [ 91.825978][ T7069] RBP: 00007fc777327090 R08: 0000000000000000 R09: 0000000000000000 [ 91.833971][ T7069] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 91.841965][ T7069] R13: 0000000000000000 R14: 00007fc778ea5fa0 R15: 00007ffe64ec6a58 [ 91.850127][ T7069] [ 92.293944][ T7085] loop4: detected capacity change from 0 to 512 [ 92.368472][ T7088] FAULT_INJECTION: forcing a failure. [ 92.368472][ T7088] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 92.382413][ T7088] CPU: 0 UID: 0 PID: 7088 Comm: syz.7.962 Not tainted 6.13.0-rc5-syzkaller-00161-g63676eefb7a0 #0 [ 92.393030][ T7088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 92.403111][ T7088] Call Trace: [ 92.406406][ T7088] [ 92.409352][ T7088] dump_stack_lvl+0xf2/0x150 [ 92.413984][ T7088] dump_stack+0x15/0x1a [ 92.418279][ T7088] should_fail_ex+0x223/0x230 [ 92.422986][ T7088] should_fail+0xb/0x10 [ 92.427195][ T7088] should_fail_usercopy+0x1a/0x20 [ 92.432262][ T7088] _copy_from_user+0x1e/0xb0 [ 92.436919][ T7088] autofs_dev_ioctl+0xd6/0x660 [ 92.441724][ T7088] ? __pfx_autofs_dev_ioctl+0x10/0x10 [ 92.447134][ T7088] __se_sys_ioctl+0xc9/0x140 [ 92.451808][ T7088] __x64_sys_ioctl+0x43/0x50 [ 92.456426][ T7088] x64_sys_call+0x1690/0x2dc0 [ 92.461128][ T7088] do_syscall_64+0xc9/0x1c0 [ 92.465698][ T7088] ? clear_bhb_loop+0x55/0xb0 [ 92.470452][ T7088] ? clear_bhb_loop+0x55/0xb0 [ 92.475221][ T7088] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 92.481173][ T7088] RIP: 0033:0x7f2646f35d29 [ 92.485624][ T7088] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 92.505300][ T7088] RSP: 002b:00007f26455a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 92.513773][ T7088] RAX: ffffffffffffffda RBX: 00007f2647125fa0 RCX: 00007f2646f35d29 [ 92.521765][ T7088] RDX: 0000000020001040 RSI: 00000000c018937e RDI: 0000000000000007 [ 92.529757][ T7088] RBP: 00007f26455a7090 R08: 0000000000000000 R09: 0000000000000000 [ 92.537752][ T7088] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 92.545786][ T7088] R13: 0000000000000000 R14: 00007f2647125fa0 R15: 00007fff1b4c23d8 [ 92.553855][ T7088] [ 92.610665][ T7085] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 92.624038][ T7085] ext4 filesystem being mounted at /199/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 92.701259][ T7085] netlink: 92 bytes leftover after parsing attributes in process `syz.4.961'. [ 92.810417][ T3302] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 93.120511][ T7106] loop6: detected capacity change from 0 to 512 [ 93.133723][ T7104] loop7: detected capacity change from 0 to 8192 [ 93.143307][ T7106] EXT4-fs (loop6): unsupported inode size: 8192 [ 93.149604][ T7106] EXT4-fs (loop6): blocksize: 2048 [ 93.244115][ T7104] 9pnet_fd: Insufficient options for proto=fd [ 93.437305][ T7106] (unnamed net_device) (uninitialized): option arp_validate: mode dependency failed, not supported in mode balance-alb(6) [ 93.452424][ T29] kauditd_printk_skb: 321 callbacks suppressed [ 93.452441][ T29] audit: type=1400 audit(1736001921.847:3130): avc: denied { write } for pid=7108 comm="syz.7.970" name="001" dev="devtmpfs" ino=171 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 93.516132][ T7106] netlink: 36 bytes leftover after parsing attributes in process `syz.6.969'. [ 93.525212][ T7106] netlink: 36 bytes leftover after parsing attributes in process `syz.6.969'. [ 93.556430][ T29] audit: type=1400 audit(1736001921.887:3131): avc: denied { create } for pid=7108 comm="syz.7.970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 93.576710][ T29] audit: type=1400 audit(1736001921.887:3132): avc: denied { write } for pid=7108 comm="syz.7.970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 93.616286][ T7106] netlink: 36 bytes leftover after parsing attributes in process `syz.6.969'. [ 93.637249][ T7115] loop7: detected capacity change from 0 to 2048 [ 93.701846][ T7106] netlink: 36 bytes leftover after parsing attributes in process `syz.6.969'. [ 93.710806][ T7106] netlink: 36 bytes leftover after parsing attributes in process `syz.6.969'. [ 93.723350][ T29] audit: type=1400 audit(1736001922.007:3133): avc: denied { name_bind } for pid=7108 comm="syz.7.970" src=24097 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 93.745910][ T29] audit: type=1400 audit(1736001922.007:3134): avc: denied { node_bind } for pid=7108 comm="syz.7.970" saddr=100.1.1.0 src=24097 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 93.770226][ T7106] netlink: 36 bytes leftover after parsing attributes in process `syz.6.969'. [ 93.813530][ T7106] netlink: 36 bytes leftover after parsing attributes in process `syz.6.969'. [ 93.822540][ T7106] netlink: 36 bytes leftover after parsing attributes in process `syz.6.969'. [ 93.835558][ T7106] netlink: 36 bytes leftover after parsing attributes in process `syz.6.969'. [ 93.854051][ T29] audit: type=1400 audit(1736001922.177:3135): avc: denied { setopt } for pid=7108 comm="syz.7.970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 93.910405][ T29] audit: type=1400 audit(1736001922.287:3136): avc: denied { sqpoll } for pid=7125 comm="syz.0.972" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 93.930377][ T29] audit: type=1400 audit(1736001922.287:3137): avc: denied { bind } for pid=7125 comm="syz.0.972" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 93.949677][ T29] audit: type=1400 audit(1736001922.287:3138): avc: denied { name_bind } for pid=7125 comm="syz.0.972" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=dccp_socket permissive=1 [ 93.971112][ T29] audit: type=1400 audit(1736001922.287:3139): avc: denied { node_bind } for pid=7125 comm="syz.0.972" saddr=::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=dccp_socket permissive=1 [ 94.276928][ T7148] xt_CONNSECMARK: invalid mode: 6 [ 94.292312][ T7147] loop5: detected capacity change from 0 to 1024 [ 94.331479][ T7147] EXT4-fs (loop5): ext4_check_descriptors: Checksum for group 0 failed (1764!=20869) [ 94.394395][ T7147] EXT4-fs (loop5): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 94.434464][ T7147] EXT4-fs (loop5): invalid journal inode [ 94.451319][ T7147] EXT4-fs (loop5): can't get journal size [ 94.472531][ T7147] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 94.626036][ T7153] loop7: detected capacity change from 0 to 8192 [ 94.655404][ T7153] vfat: Unknown parameter 'é‚éÒ;?±È°Oôs´š˜sŽÅ)18446744073709551615ÿÿÿÿ01777777777777777777777ÿ0177777777777777777777718446744073709551615' [ 94.729844][ T7147] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 94.835934][ T7165] veth0_to_team: entered promiscuous mode [ 94.841842][ T7165] veth0_to_team: entered allmulticast mode [ 95.054098][ T7170] netlink: 'syz.7.987': attribute type 13 has an invalid length. [ 95.085869][ T3737] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 95.100475][ T7170] syz_tun: refused to change device tx_queue_len [ 95.106902][ T7170] A link change request failed with some changes committed already. Interface syz_tun may have been left with an inconsistent configuration, please check. [ 95.230367][ T7180] loop6: detected capacity change from 0 to 512 [ 95.431961][ T7178] loop5: detected capacity change from 0 to 8192 [ 95.445963][ T7198] loop7: detected capacity change from 0 to 1024 [ 95.490205][ T7198] EXT4-fs (loop7): ext4_check_descriptors: Checksum for group 0 failed (1764!=20869) [ 95.503977][ T7199] loop4: detected capacity change from 0 to 512 [ 95.524592][ T7198] EXT4-fs (loop7): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 95.546922][ T7199] journal_path: Lookup failure for './file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa' [ 95.570878][ T7199] EXT4-fs: error: could not find journal device path [ 95.582807][ T7198] EXT4-fs (loop7): invalid journal inode [ 95.594282][ T7198] EXT4-fs (loop7): can't get journal size [ 95.620599][ T7180] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 95.637120][ T7198] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 95.779567][ T7180] ext4 filesystem being mounted at /130/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 95.799876][ T7180] syz.6.990 (7180) used greatest stack depth: 9320 bytes left [ 95.894638][ T4210] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 96.101243][ T7218] xt_bpf: check failed: parse error [ 96.230386][ T7198] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 96.333278][ T7221] loop6: detected capacity change from 0 to 512 [ 96.625139][ T7222] loop5: detected capacity change from 0 to 512 [ 96.666165][ T7221] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 96.685483][ T7221] ext4 filesystem being mounted at /131/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 96.691484][ T7222] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 96.766058][ T7222] ext4 filesystem being mounted at /183/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 96.925253][ T7231] netlink: 'syz.4.1001': attribute type 1 has an invalid length. [ 97.088474][ T7243] FAULT_INJECTION: forcing a failure. [ 97.088474][ T7243] name failslab, interval 1, probability 0, space 0, times 0 [ 97.101232][ T7243] CPU: 0 UID: 0 PID: 7243 Comm: syz.0.1007 Not tainted 6.13.0-rc5-syzkaller-00161-g63676eefb7a0 #0 [ 97.111953][ T7243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 97.122022][ T7243] Call Trace: [ 97.125311][ T7243] [ 97.128257][ T7243] dump_stack_lvl+0xf2/0x150 [ 97.132941][ T7243] dump_stack+0x15/0x1a [ 97.137153][ T7243] should_fail_ex+0x223/0x230 [ 97.141855][ T7243] should_failslab+0x8f/0xb0 [ 97.146516][ T7243] __kmalloc_node_track_caller_noprof+0xa8/0x410 [ 97.152877][ T7243] ? sidtab_sid2str_get+0xb8/0x140 [ 97.158019][ T7243] kmemdup_noprof+0x2a/0x60 [ 97.162639][ T7243] sidtab_sid2str_get+0xb8/0x140 [ 97.167605][ T7243] security_sid_to_context_core+0x1eb/0x2f0 [ 97.173564][ T7243] security_sid_to_context+0x27/0x30 [ 97.178879][ T7243] selinux_lsmprop_to_secctx+0x2c/0x40 [ 97.184402][ T7243] security_lsmprop_to_secctx+0x4a/0x90 [ 97.190012][ T7243] audit_log_task_context+0x93/0x1c0 [ 97.195329][ T7243] audit_log_task+0xf9/0x1c0 [ 97.199946][ T7243] audit_seccomp+0x68/0x130 [ 97.204532][ T7243] __seccomp_filter+0x6fa/0x1180 [ 97.209538][ T7243] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 97.215203][ T7243] ? vfs_write+0x596/0x920 [ 97.219648][ T7243] ? __schedule+0x6fa/0x930 [ 97.224182][ T7243] __secure_computing+0x9f/0x1c0 [ 97.229150][ T7243] syscall_trace_enter+0xd1/0x1f0 [ 97.234206][ T7243] do_syscall_64+0xaa/0x1c0 [ 97.238768][ T7243] ? clear_bhb_loop+0x55/0xb0 [ 97.243468][ T7243] ? clear_bhb_loop+0x55/0xb0 [ 97.248170][ T7243] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 97.254106][ T7243] RIP: 0033:0x7fbec0685d29 [ 97.258555][ T7243] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 97.278222][ T7243] RSP: 002b:00007fbebecf7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000019 [ 97.286661][ T7243] RAX: ffffffffffffffda RBX: 00007fbec0875fa0 RCX: 00007fbec0685d29 [ 97.294713][ T7243] RDX: 0000000000600002 RSI: 0000000000600002 RDI: 0000000020000000 [ 97.302710][ T7243] RBP: 00007fbebecf7090 R08: 0000000020a00000 R09: 0000000000000000 [ 97.310699][ T7243] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000000000001 [ 97.318684][ T7243] R13: 0000000000000000 R14: 00007fbec0875fa0 R15: 00007ffca77745e8 [ 97.326677][ T7243] [ 97.816827][ T7257] capability: warning: `syz.0.1012' uses deprecated v2 capabilities in a way that may be insecure [ 98.302490][ T7265] vhci_hcd: invalid port number 255 [ 98.334318][ T7267] netlink: 'syz.0.1016': attribute type 39 has an invalid length. [ 98.531053][ T29] kauditd_printk_skb: 177 callbacks suppressed [ 98.531072][ T29] audit: type=1326 audit(1736001926.927:3316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7274 comm="syz.4.1020" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc778cb5d29 code=0x7ffc0000 [ 98.565342][ T7275] __nla_validate_parse: 3 callbacks suppressed [ 98.565357][ T7275] netlink: 48 bytes leftover after parsing attributes in process `syz.4.1020'. [ 98.602454][ T29] audit: type=1326 audit(1736001926.957:3317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7274 comm="syz.4.1020" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc778cb5d29 code=0x7ffc0000 [ 98.626635][ T29] audit: type=1326 audit(1736001926.957:3318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7274 comm="syz.4.1020" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc778cb5d29 code=0x7ffc0000 [ 98.651065][ T29] audit: type=1326 audit(1736001926.957:3319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7274 comm="syz.4.1020" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc778cb5d29 code=0x7ffc0000 [ 98.674554][ T29] audit: type=1326 audit(1736001926.957:3320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7274 comm="syz.4.1020" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc778cb5d29 code=0x7ffc0000 [ 98.698714][ T29] audit: type=1326 audit(1736001926.957:3321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7274 comm="syz.4.1020" exe="/root/syz-executor" sig=0 arch=c000003e syscall=187 compat=0 ip=0x7fc778cb5d29 code=0x7ffc0000 [ 98.722942][ T29] audit: type=1326 audit(1736001926.957:3322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7274 comm="syz.4.1020" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc778cb5d29 code=0x7ffc0000 [ 98.746351][ T29] audit: type=1326 audit(1736001926.957:3323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7274 comm="syz.4.1020" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fc778cb5d29 code=0x7ffc0000 [ 98.770450][ T29] audit: type=1326 audit(1736001926.957:3324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7274 comm="syz.4.1020" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc778cb5d29 code=0x7ffc0000 [ 98.793881][ T29] audit: type=1326 audit(1736001926.957:3325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7274 comm="syz.4.1020" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fc778cb5d29 code=0x7ffc0000 [ 98.961822][ T7283] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1023'. [ 99.142885][ T7291] Cannot find add_set index 0 as target [ 99.164519][ T7289] sch_tbf: peakrate 8 is lower than or equals to rate 12 ! [ 99.408553][ T7293] loop4: detected capacity change from 0 to 8192 [ 99.485850][ T7306] netlink: 76 bytes leftover after parsing attributes in process `syz.4.1025'. [ 99.541153][ T7305] tap0: tun_chr_ioctl cmd 35108 [ 99.546198][ T7293] loop4: p1 p2 p3 p4 [ 99.559436][ T7293] loop4: p1 start 51380223 is beyond EOD, truncated [ 99.566181][ T7293] loop4: p2 size 65535 extends beyond EOD, truncated [ 99.588957][ T7280] netlink: 92 bytes leftover after parsing attributes in process `syz.0.1022'. [ 99.638653][ T7293] loop4: p3 size 100663552 extends beyond EOD, truncated [ 99.681704][ T7293] loop4: p4 size 81920 extends beyond EOD, truncated [ 99.984934][ T7325] xt_connbytes: Forcing CT accounting to be enabled [ 100.052957][ T7325] Cannot find add_set index 0 as target [ 100.491310][ T7353] loop4: detected capacity change from 0 to 512 [ 100.552786][ T7353] EXT4-fs mount: 3 callbacks suppressed [ 100.552837][ T7353] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 100.642890][ T7353] ext4 filesystem being mounted at /217/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 100.747904][ T7357] loop6: detected capacity change from 0 to 8192 [ 100.801358][ T7353] netlink: 92 bytes leftover after parsing attributes in process `syz.4.1048'. [ 100.902102][ T7367] Cannot find add_set index 0 as target [ 100.948938][ T3302] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 101.020335][ T7370] netlink: 52 bytes leftover after parsing attributes in process `syz.7.1054'. [ 101.084395][ T7375] netlink: 4 bytes leftover after parsing attributes in process `syz.7.1054'. [ 101.225802][ T7381] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 101.236370][ T7382] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 101.309873][ T7382] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 101.466556][ T7397] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 101.515244][ T7399] loop5: detected capacity change from 0 to 512 [ 101.531325][ T7397] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 101.581153][ T7399] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 101.633223][ T7399] ext4 filesystem being mounted at /200/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 101.821058][ T7410] Cannot find add_set index 0 as target [ 109.336878][ T7399] netlink: 92 bytes leftover after parsing attributes in process `syz.5.1065'. [ 109.462015][ T29] kauditd_printk_skb: 224 callbacks suppressed [ 109.462031][ T29] audit: type=1400 audit(1736001937.857:3550): avc: denied { kernel } for pid=7412 comm="syz.6.1068" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 109.498777][ T7414] netlink: zone id is out of range [ 109.503982][ T7414] netlink: zone id is out of range [ 109.510114][ T7414] netlink: zone id is out of range [ 109.515276][ T7414] netlink: zone id is out of range [ 109.520412][ T7414] netlink: zone id is out of range [ 109.525613][ T7414] netlink: zone id is out of range [ 109.530822][ T7414] netlink: zone id is out of range [ 109.535933][ T7414] netlink: zone id is out of range [ 109.541824][ T7414] netlink: zone id is out of range [ 109.546987][ T7414] netlink: zone id is out of range [ 109.584411][ T3737] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 109.632457][ T29] audit: type=1400 audit(1736001937.887:3551): avc: denied { write } for pid=7412 comm="syz.6.1068" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 109.652748][ T29] audit: type=1400 audit(1736001938.017:3552): avc: denied { execmem } for pid=7418 comm="syz.0.1071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 109.672026][ T29] audit: type=1400 audit(1736001938.027:3553): avc: denied { create } for pid=7419 comm="syz.7.1072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 109.944974][ T7423] loop4: detected capacity change from 0 to 8192 [ 109.990467][ T29] audit: type=1400 audit(1736001938.097:3554): avc: denied { getopt } for pid=7419 comm="syz.7.1072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 110.022695][ T7428] netlink: 8 bytes leftover after parsing attributes in process `4¹ßs'. [ 110.036796][ T3377] IPVS: starting estimator thread 0... [ 110.050235][ T7432] netlink: 76 bytes leftover after parsing attributes in process `syz.4.1073'. [ 110.079947][ T7423] loop4: p1 p2 p3 p4 [ 110.090554][ T29] audit: type=1400 audit(1736001938.457:3555): avc: denied { read } for pid=7430 comm="syz.6.1075" name="ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 110.114020][ T29] audit: type=1400 audit(1736001938.457:3556): avc: denied { open } for pid=7430 comm="syz.6.1075" path="/dev/ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 110.137276][ T29] audit: type=1400 audit(1736001938.457:3557): avc: denied { ioctl } for pid=7430 comm="syz.6.1075" path="/dev/ppp" dev="devtmpfs" ino=140 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 110.162642][ T29] audit: type=1326 audit(1736001938.487:3558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7430 comm="syz.6.1075" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7feded635d29 code=0x0 [ 110.196321][ T7423] loop4: p1 start 51380223 is beyond EOD, truncated [ 110.203041][ T7423] loop4: p2 size 65535 extends beyond EOD, truncated [ 110.219478][ T7429] IPVS: using max 2208 ests per chain, 110400 per kthread [ 110.281369][ T7438] netlink: 8216 bytes leftover after parsing attributes in process `syz.6.1075'. [ 110.290981][ T7423] loop4: p3 size 100663552 extends beyond EOD, truncated [ 110.319416][ T7423] loop4: p4 size 81920 extends beyond EOD, truncated [ 110.550940][ T7413] udevd[7413]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 110.565163][ T7439] udevd[7439]: inotify_add_watch(7, /dev/loop4p2, 10) failed: No such file or directory [ 110.577922][ T7442] udevd[7442]: inotify_add_watch(7, /dev/loop4p3, 10) failed: No such file or directory [ 110.623446][ T29] audit: type=1400 audit(1736001938.617:3559): avc: denied { name_bind } for pid=7430 comm="syz.6.1075" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 110.663705][ T7454] netlink: 'syz.5.1081': attribute type 13 has an invalid length. [ 110.688031][ T7458] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 110.694633][ T7458] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 110.702872][ T7458] vhci_hcd vhci_hcd.0: Device attached [ 110.714810][ T7449] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1079'. [ 110.756850][ T7462] vhci_hcd vhci_hcd.0: pdev(4) rhport(1) sockfd(6) [ 110.763645][ T7462] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 110.772113][ T7462] vhci_hcd vhci_hcd.0: Device attached [ 110.822373][ T7458] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 110.865511][ T7458] vhci_hcd vhci_hcd.0: pdev(4) rhport(3) sockfd(10) [ 110.872170][ T7458] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 110.880498][ T7458] vhci_hcd vhci_hcd.0: Device attached [ 110.904693][ T3352] vhci_hcd: vhci_device speed not set [ 110.979457][ T3352] usb 9-1: new full-speed USB device number 2 using vhci_hcd [ 110.999843][ T7458] vhci_hcd vhci_hcd.0: pdev(4) rhport(4) sockfd(8) [ 111.006402][ T7458] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 111.014809][ T7458] vhci_hcd vhci_hcd.0: Device attached [ 111.231396][ T3377] IPVS: starting estimator thread 0... [ 111.262387][ T7469] vhci_hcd: connection closed [ 111.262583][ T6312] vhci_hcd: stop threads [ 111.271709][ T6312] vhci_hcd: release socket [ 111.276153][ T6312] vhci_hcd: disconnect device [ 111.283942][ T7463] vhci_hcd: connection closed [ 111.284062][ T7459] vhci_hcd: connection reset by peer [ 111.295552][ T7475] vhci_hcd: connection closed [ 111.304010][ T7489] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1088'. [ 111.349602][ T7487] IPVS: using max 1776 ests per chain, 88800 per kthread [ 111.359976][ T6312] vhci_hcd: stop threads [ 111.364251][ T6312] vhci_hcd: release socket [ 111.368833][ T6312] vhci_hcd: disconnect device [ 111.387416][ T6312] vhci_hcd: stop threads [ 111.391866][ T6312] vhci_hcd: release socket [ 111.396453][ T6312] vhci_hcd: disconnect device [ 111.458361][ T6312] vhci_hcd: stop threads [ 111.462781][ T6312] vhci_hcd: release socket [ 111.467248][ T6312] vhci_hcd: disconnect device [ 111.554171][ T7497] loop5: detected capacity change from 0 to 2048 [ 111.640697][ T7497] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 111.722849][ T3737] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 111.805017][ T7507] netlink: 8 bytes leftover after parsing attributes in process `syz.5.1093'. [ 111.814044][ T7507] netlink: 12 bytes leftover after parsing attributes in process `syz.5.1093'. [ 111.823088][ T7507] netlink: 'syz.5.1093': attribute type 20 has an invalid length. [ 112.088625][ T7515] netlink: 76 bytes leftover after parsing attributes in process `syz.5.1097'. [ 112.170457][ T7517] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 112.400614][ T7532] smc: net device bond0 applied user defined pnetid SYZ0 [ 112.424708][ T7531] smc: net device bond0 erased user defined pnetid SYZ0 [ 112.479728][ T7532] rtc_cmos 00:00: Alarms can be up to one day in the future [ 112.509182][ T7527] netlink: 8 bytes leftover after parsing attributes in process `syz.5.1101'. [ 112.567171][ T3377] rtc_cmos 00:00: Alarms can be up to one day in the future [ 112.574859][ T3377] rtc_cmos 00:00: Alarms can be up to one day in the future [ 112.583276][ T3377] rtc_cmos 00:00: Alarms can be up to one day in the future [ 112.590936][ T3377] rtc_cmos 00:00: Alarms can be up to one day in the future [ 112.598235][ T3377] rtc rtc0: __rtc_set_alarm: err=-22 [ 112.605304][ T7539] sd 0:0:1:0: device reset [ 112.734376][ T7545] loop5: detected capacity change from 0 to 512 [ 112.762802][ T7547] netlink: 'syz.6.1107': attribute type 20 has an invalid length. [ 112.792305][ T7545] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 112.831021][ T7545] ext4 filesystem being mounted at /214/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 112.852435][ T7541] loop4: detected capacity change from 0 to 8192 [ 112.909962][ T7541] loop4: p1 p2 p3 p4 [ 112.914682][ T7541] loop4: p1 start 51380223 is beyond EOD, truncated [ 112.922087][ T7541] loop4: p2 size 65535 extends beyond EOD, truncated [ 113.011242][ T7541] loop4: p3 size 100663552 extends beyond EOD, truncated [ 113.074278][ T7541] loop4: p4 size 81920 extends beyond EOD, truncated [ 113.096473][ T3737] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 113.177110][ T7566] loop6: detected capacity change from 0 to 1024 [ 113.273179][ T7566] EXT4-fs (loop6): ext4_check_descriptors: Checksum for group 0 failed (1764!=20869) [ 113.296965][ T7573] loop5: detected capacity change from 0 to 512 [ 113.341065][ T7566] EXT4-fs (loop6): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 113.362788][ T7573] EXT4-fs: Ignoring removed oldalloc option [ 113.410747][ T7573] EXT4-fs error (device loop5): ext4_xattr_inode_iget:436: comm +}[@: Parent and EA inode have the same ino 15 [ 113.424341][ T7566] EXT4-fs (loop6): invalid journal inode [ 113.446239][ T7579] Cannot find add_set index 0 as target [ 113.456050][ T7566] EXT4-fs (loop6): can't get journal size [ 113.470942][ T7573] EXT4-fs (loop5): Remounting filesystem read-only [ 113.477738][ T7573] EXT4-fs warning (device loop5): ext4_evict_inode:259: couldn't mark inode dirty (err -5) [ 113.507585][ T7566] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 113.552825][ T7573] EXT4-fs (loop5): 1 orphan inode deleted [ 113.582815][ T7573] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 113.598881][ T7566] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 113.634476][ T7573] SELinux: (dev loop5, type ext4) getxattr errno 5 [ 113.667271][ T7573] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 113.677666][ T7588] loop4: detected capacity change from 0 to 512 [ 113.704419][ T7588] EXT4-fs: Ignoring removed oldalloc option [ 113.746938][ T7588] EXT4-fs error (device loop4): ext4_xattr_inode_iget:436: comm syz.4.1122: Parent and EA inode have the same ino 15 [ 113.764842][ T7595] loop7: detected capacity change from 0 to 512 [ 113.814625][ T7588] EXT4-fs (loop4): Remounting filesystem read-only [ 113.821243][ T7588] EXT4-fs warning (device loop4): ext4_evict_inode:259: couldn't mark inode dirty (err -5) [ 113.844586][ T7595] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 113.875530][ T4210] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 113.896309][ T7595] ext4 filesystem being mounted at /138/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 113.909452][ T7588] EXT4-fs (loop4): 1 orphan inode deleted [ 113.937690][ T7588] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 114.005437][ T7588] SELinux: (dev loop4, type ext4) getxattr errno 5 [ 114.046705][ T7588] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 114.252702][ T5114] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 114.333474][ T7608] loop5: detected capacity change from 0 to 8192 [ 114.384208][ T7617] Cannot find add_set index 0 as target [ 114.523004][ T7625] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=7625 comm=syz.0.1135 [ 114.535640][ T7625] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=7625 comm=syz.0.1135 [ 114.580876][ T29] kauditd_printk_skb: 61 callbacks suppressed [ 114.580909][ T29] audit: type=1326 audit(1736001942.977:3621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7620 comm="syz.4.1134" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fc778cb5d29 code=0x0 [ 114.683080][ T29] audit: type=1400 audit(1736001943.027:3622): avc: denied { audit_write } for pid=7623 comm="syz.0.1135" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 114.732351][ T7635] __nla_validate_parse: 6 callbacks suppressed [ 114.732387][ T7635] netlink: 8216 bytes leftover after parsing attributes in process `syz.4.1134'. [ 114.837071][ T7640] loop7: detected capacity change from 0 to 512 [ 114.894365][ T7640] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 114.919943][ T29] audit: type=1400 audit(1736001943.317:3623): avc: denied { create } for pid=7643 comm="syz.5.1144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 114.980725][ T7640] ext4 filesystem being mounted at /143/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 115.017564][ T7649] loop5: detected capacity change from 0 to 128 [ 115.058000][ T29] audit: type=1400 audit(1736001943.347:3624): avc: denied { accept } for pid=7643 comm="syz.5.1144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 115.078777][ T29] audit: type=1400 audit(1736001943.347:3625): avc: denied { ioctl } for pid=7643 comm="syz.5.1144" path="socket:[18504]" dev="sockfs" ino=18504 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 115.104102][ T29] audit: type=1400 audit(1736001943.407:3626): avc: denied { bind } for pid=7643 comm="syz.5.1144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 115.123451][ T29] audit: type=1400 audit(1736001943.407:3627): avc: denied { create } for pid=7643 comm="syz.5.1144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 115.144508][ T29] audit: type=1400 audit(1736001943.437:3628): avc: denied { mount } for pid=7643 comm="syz.5.1144" name="/" dev="loop5" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 115.173040][ T7653] syz.5.1144: attempt to access beyond end of device [ 115.173040][ T7653] loop5: rw=2049, sector=145, nr_sectors = 312 limit=128 [ 115.274202][ T29] audit: type=1326 audit(1736001943.607:3629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7650 comm="syz.0.1145" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbec0685d29 code=0x7ffc0000 [ 115.297718][ T29] audit: type=1326 audit(1736001943.607:3630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7650 comm="syz.0.1145" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fbec0685d29 code=0x7ffc0000 [ 115.327630][ T7656] netlink: 92 bytes leftover after parsing attributes in process `syz.7.1142'. [ 115.385538][ T7659] Cannot find del_set index 1 as target [ 115.501076][ T5114] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 115.578251][ T7668] loop6: detected capacity change from 0 to 512 [ 115.645326][ T7673] FAULT_INJECTION: forcing a failure. [ 115.645326][ T7673] name failslab, interval 1, probability 0, space 0, times 0 [ 115.658305][ T7673] CPU: 0 UID: 0 PID: 7673 Comm: syz.5.1153 Not tainted 6.13.0-rc5-syzkaller-00161-g63676eefb7a0 #0 [ 115.669005][ T7673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 115.679125][ T7673] Call Trace: [ 115.682497][ T7673] [ 115.685465][ T7673] dump_stack_lvl+0xf2/0x150 [ 115.690102][ T7673] dump_stack+0x15/0x1a [ 115.694395][ T7673] should_fail_ex+0x223/0x230 [ 115.699104][ T7673] should_failslab+0x8f/0xb0 [ 115.703751][ T7673] kmem_cache_alloc_noprof+0x52/0x320 [ 115.709172][ T7673] ? skb_clone+0x154/0x1f0 [ 115.713702][ T7673] skb_clone+0x154/0x1f0 [ 115.717971][ T7673] ? __pfx_stp_pdu_rcv+0x10/0x10 [ 115.722953][ T7673] ? __pfx_llc_sap_handler+0x10/0x10 [ 115.728380][ T7673] llc_rcv+0x401/0x780 [ 115.732479][ T7673] ? __pfx_llc_rcv+0x10/0x10 [ 115.737105][ T7673] __netif_receive_skb_list_core+0x493/0x520 [ 115.743143][ T7673] netif_receive_skb_list_internal+0x4e4/0x660 [ 115.749335][ T7673] netif_receive_skb_list+0x31/0x230 [ 115.754648][ T7673] bpf_test_run_xdp_live+0xe0d/0x1040 [ 115.760049][ T7673] ? bpf_dispatcher_xdp_func+0x20/0x30 [ 115.765531][ T7673] ? cpus_read_unlock+0x7b/0xc0 [ 115.770465][ T7673] ? __static_call_update+0x362/0x3a0 [ 115.775943][ T7673] ? bpf_dispatcher_change_prog+0x747/0x840 [ 115.781876][ T7673] ? bpf_test_run_xdp_live+0x2b1/0x1040 [ 115.787464][ T7673] bpf_prog_test_run_xdp+0x51d/0x8b0 [ 115.792807][ T7673] ? __rcu_read_unlock+0x4e/0x70 [ 115.797778][ T7673] ? __pfx_bpf_prog_test_run_xdp+0x10/0x10 [ 115.803685][ T7673] bpf_prog_test_run+0x20f/0x3a0 [ 115.808672][ T7673] __sys_bpf+0x400/0x7a0 [ 115.813012][ T7673] __x64_sys_bpf+0x43/0x50 [ 115.817529][ T7673] x64_sys_call+0x2914/0x2dc0 [ 115.822229][ T7673] do_syscall_64+0xc9/0x1c0 [ 115.826786][ T7673] ? clear_bhb_loop+0x55/0xb0 [ 115.831520][ T7673] ? clear_bhb_loop+0x55/0xb0 [ 115.836235][ T7673] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 115.842170][ T7673] RIP: 0033:0x7f815a885d29 [ 115.846597][ T7673] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 115.866267][ T7673] RSP: 002b:00007f8158ef7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 115.874734][ T7673] RAX: ffffffffffffffda RBX: 00007f815aa75fa0 RCX: 00007f815a885d29 [ 115.882745][ T7673] RDX: 0000000000000048 RSI: 0000000020000600 RDI: 000000000000000a [ 115.890803][ T7673] RBP: 00007f8158ef7090 R08: 0000000000000000 R09: 0000000000000000 [ 115.898794][ T7673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 115.906803][ T7673] R13: 0000000000000000 R14: 00007f815aa75fa0 R15: 00007ffd46f2f328 [ 115.914803][ T7673] [ 116.059940][ T7680] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 116.089245][ T3352] usb 9-1: enqueue for inactive port 0 [ 116.101333][ T7680] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 116.113543][ T3352] usb 9-1: enqueue for inactive port 0 [ 116.205506][ T3352] vhci_hcd: vhci_device speed not set [ 116.212462][ T7686] loop7: detected capacity change from 0 to 8192 [ 116.301729][ T7686] 9pnet_fd: Insufficient options for proto=fd [ 116.329787][ T7668] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 116.344395][ T7668] ext4 filesystem being mounted at /154/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 116.886593][ T7697] Cannot find add_set index 0 as target [ 117.979529][ T7715] vhci_hcd: invalid port number 254 [ 126.991163][ T4210] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 127.244875][ T7736] Cannot find add_set index 0 as target [ 127.283017][ T7730] loop5: detected capacity change from 0 to 8192 [ 127.324747][ T7730] 9pnet_fd: Insufficient options for proto=fd [ 127.669410][ T7755] loop4: detected capacity change from 0 to 1024 [ 127.697479][ T7755] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (1764!=20869) [ 127.751054][ T7755] EXT4-fs (loop4): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 127.775350][ T7759] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(7) [ 127.781906][ T7759] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 127.790187][ T7759] vhci_hcd vhci_hcd.0: Device attached [ 127.811865][ T7755] EXT4-fs (loop4): invalid journal inode [ 127.817596][ T7755] EXT4-fs (loop4): can't get journal size [ 127.844225][ T7759] Illegal XDP return value 3272571257 on prog (id 781) dev N/A, expect packet loss! [ 127.855573][ T7755] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 127.891890][ T7761] vhci_hcd: connection closed [ 127.892215][ T58] vhci_hcd: stop threads [ 127.901242][ T58] vhci_hcd: release socket [ 127.905666][ T58] vhci_hcd: disconnect device [ 127.924567][ T7755] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 128.181829][ T3302] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 128.291656][ T7769] netlink: 108 bytes leftover after parsing attributes in process `syz.7.1189'. [ 128.300842][ T7769] netlink: 108 bytes leftover after parsing attributes in process `syz.7.1189'. [ 128.310558][ T7769] netlink: 108 bytes leftover after parsing attributes in process `syz.7.1189'. [ 128.396192][ T29] kauditd_printk_skb: 129 callbacks suppressed [ 128.396209][ T29] audit: type=1400 audit(1736001956.787:3760): avc: denied { write } for pid=7768 comm="syz.7.1189" name="rt_acct" dev="proc" ino=4026532449 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 128.439350][ T7770] netlink: 36 bytes leftover after parsing attributes in process `syz.7.1189'. [ 128.481746][ T29] audit: type=1400 audit(1736001956.827:3761): avc: denied { write } for pid=7768 comm="syz.7.1189" path="socket:[18927]" dev="sockfs" ino=18927 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 128.618397][ T29] audit: type=1400 audit(1736001956.897:3762): avc: denied { setopt } for pid=7768 comm="syz.7.1189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 128.765474][ T7787] loop6: detected capacity change from 0 to 1024 [ 128.839114][ T7787] EXT4-fs (loop6): ext4_check_descriptors: Checksum for group 0 failed (1764!=20869) [ 128.909654][ T7787] EXT4-fs (loop6): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 128.949077][ T7787] EXT4-fs (loop6): invalid journal inode [ 128.969706][ T7787] EXT4-fs (loop6): can't get journal size [ 129.024956][ T7787] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 129.119238][ T7787] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 129.539640][ T4210] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 129.692958][ T29] audit: type=1400 audit(1736001958.077:3763): avc: denied { sqpoll } for pid=7801 comm="syz.6.1196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 129.782888][ T29] audit: type=1400 audit(1736001958.167:3764): avc: denied { create } for pid=7801 comm="syz.6.1196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 129.826277][ T7760] net_ratelimit: 23 callbacks suppressed [ 129.826298][ T7760] Set syz1 is full, maxelem 65536 reached [ 129.987913][ T7808] loop4: detected capacity change from 0 to 1024 [ 130.031149][ T7808] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (1764!=20869) [ 130.076053][ T7808] EXT4-fs (loop4): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 130.171666][ T7808] EXT4-fs (loop4): invalid journal inode [ 130.177358][ T7808] EXT4-fs (loop4): can't get journal size [ 130.250687][ T7808] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 130.264996][ T29] audit: type=1400 audit(1736001958.657:3765): avc: denied { ioctl } for pid=7812 comm="syz.5.1199" path="socket:[19039]" dev="sockfs" ino=19039 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 130.303701][ T7814] syz.5.1199 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 130.380768][ T7808] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 130.586441][ T7817] loop5: detected capacity change from 0 to 8192 [ 130.737625][ T3302] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 130.788165][ T7780] Set syz1 is full, maxelem 65536 reached [ 130.934612][ T7791] Set syz1 is full, maxelem 65536 reached [ 130.959613][ T29] audit: type=1400 audit(1736001959.347:3766): avc: denied { create } for pid=7821 comm="syz.4.1201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 130.992687][ T7822] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 131.016153][ T7827] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1203'. [ 131.033442][ T7822] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 131.044134][ T7829] loop6: detected capacity change from 0 to 164 [ 131.059035][ T29] audit: type=1400 audit(1736001959.377:3767): avc: denied { write } for pid=7823 comm="syz.6.1202" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 131.085210][ T7829] Unable to read rock-ridge attributes [ 131.096119][ T7827] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 131.117857][ T7829] Unable to read rock-ridge attributes [ 131.182589][ T29] audit: type=1400 audit(1736001959.507:3768): avc: denied { mount } for pid=7823 comm="syz.6.1202" name="/" dev="loop6" ino=1792 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:iso9660_t tclass=filesystem permissive=1 [ 131.216098][ T7833] Unable to read rock-ridge attributes [ 131.271881][ T7833] iso9660: Corrupted directory entry in block 4 of inode 1792 [ 131.311923][ T29] audit: type=1326 audit(1736001959.647:3769): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7826 comm="syz.0.1203" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbec0685d29 code=0x7ffc0000 [ 131.440832][ T7837] loop7: detected capacity change from 0 to 8192 [ 131.509957][ T7837] loop7: p1 p2 p3 p4 [ 131.514142][ T7837] loop7: p1 start 51380223 is beyond EOD, truncated [ 131.521529][ T7837] loop7: p2 size 65535 extends beyond EOD, truncated [ 131.546761][ T7837] loop7: p3 size 100663552 extends beyond EOD, truncated [ 131.591690][ T7849] netlink: 76 bytes leftover after parsing attributes in process `syz.7.1204'. [ 131.632510][ T7837] loop7: p4 size 81920 extends beyond EOD, truncated [ 131.858281][ T7857] loop7: detected capacity change from 0 to 164 [ 131.872580][ T7856] loop4: detected capacity change from 0 to 1024 [ 131.902625][ T7857] Unable to read rock-ridge attributes [ 131.918592][ T7856] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (1764!=20869) [ 131.932005][ T7857] Unable to read rock-ridge attributes [ 131.941211][ T7857] Unable to read rock-ridge attributes [ 131.969577][ T7857] iso9660: Corrupted directory entry in block 4 of inode 1792 [ 131.981691][ T7856] EXT4-fs (loop4): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 132.010267][ T7738] udevd[7738]: inotify_add_watch(7, /dev/loop7p2, 10) failed: No such file or directory [ 132.033945][ T7858] Unable to read rock-ridge attributes [ 132.044715][ T7856] EXT4-fs (loop4): invalid journal inode [ 132.073914][ T7856] EXT4-fs (loop4): can't get journal size [ 132.108373][ T7856] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 132.202573][ T7863] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7863 comm=syz.7.1210 [ 132.228262][ T7856] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 132.257505][ T7863] netlink: 'syz.7.1210': attribute type 1 has an invalid length. [ 132.318575][ T7871] 9pnet_fd: Insufficient options for proto=fd [ 132.331728][ T7863] bond1: entered promiscuous mode [ 132.336850][ T7863] bond1: entered allmulticast mode [ 132.388397][ T7869] bond1: (slave ip6gretap2): making interface the new active one [ 132.396963][ T7869] ip6gretap2: entered promiscuous mode [ 132.402578][ T7869] ip6gretap2: entered allmulticast mode [ 132.486803][ T7869] bond1: (slave ip6gretap2): Enslaving as an active interface with an up link [ 132.527380][ T3302] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 132.631917][ T7879] Cannot find del_set index 1 as target [ 132.715561][ T7889] loop4: detected capacity change from 0 to 1024 [ 132.768334][ T7891] netlink: 52 bytes leftover after parsing attributes in process `syz.7.1217'. [ 132.793516][ T7889] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 132.955123][ T7881] xt_CHECKSUM: CHECKSUM should be avoided. If really needed, restrict with "-p udp" and only use in OUTPUT [ 132.983715][ T7896] loop6: detected capacity change from 0 to 8192 [ 133.013658][ T7881] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 133.039975][ T7896] loop6: p1 p2 p3 p4 [ 133.048186][ T7896] loop6: p1 start 51380223 is beyond EOD, truncated [ 133.054854][ T7896] loop6: p2 size 65535 extends beyond EOD, truncated [ 133.125562][ T7904] netlink: 76 bytes leftover after parsing attributes in process `syz.6.1218'. [ 133.172151][ T7896] loop6: p3 size 100663552 extends beyond EOD, truncated [ 133.212760][ T7896] loop6: p4 size 81920 extends beyond EOD, truncated [ 133.312699][ T3302] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 133.335042][ T7908] loop7: detected capacity change from 0 to 1764 [ 133.464281][ T29] kauditd_printk_skb: 24 callbacks suppressed [ 133.464334][ T29] audit: type=1400 audit(1736001961.857:3794): avc: denied { create } for pid=7907 comm="syz.7.1223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 133.617973][ T7917] loop6: detected capacity change from 0 to 512 [ 133.640326][ T29] audit: type=1400 audit(1736001961.907:3795): avc: denied { write } for pid=7907 comm="syz.7.1223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 133.661003][ T29] audit: type=1400 audit(1736001961.907:3796): avc: denied { bind } for pid=7907 comm="syz.7.1223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 133.712902][ T7917] EXT4-fs (loop6): encrypted files will use data=ordered instead of data journaling mode [ 133.742511][ T7919] Cannot find del_set index 1 as target [ 133.784864][ T7917] EXT4-fs (loop6): 1 truncate cleaned up [ 133.805366][ T7917] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 133.837431][ T7922] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1229'. [ 133.896065][ T29] audit: type=1400 audit(1736001962.287:3797): avc: denied { setattr } for pid=7914 comm="syz.6.1227" name="file1" dev="loop6" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 133.993734][ T7917] EXT4-fs error (device loop6): mb_free_blocks:1948: group 0, inode 15: block 33:freeing already freed block (bit 32); block bitmap corrupt. [ 134.037729][ T29] audit: type=1400 audit(1736001962.347:3798): avc: denied { remove_name } for pid=7914 comm="syz.6.1227" name="file1" dev="loop6" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 134.061369][ T29] audit: type=1400 audit(1736001962.347:3799): avc: denied { unlink } for pid=7914 comm="syz.6.1227" name="file1" dev="loop6" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 134.083652][ T29] audit: type=1326 audit(1736001962.357:3800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7923 comm="syz.7.1230" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2646f35d29 code=0x7ffc0000 [ 134.107925][ T29] audit: type=1326 audit(1736001962.357:3801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7923 comm="syz.7.1230" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2646f35d29 code=0x7ffc0000 [ 134.132063][ T29] audit: type=1326 audit(1736001962.357:3802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7923 comm="syz.7.1230" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2646f35d29 code=0x7ffc0000 [ 134.155500][ T29] audit: type=1326 audit(1736001962.357:3803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7923 comm="syz.7.1230" exe="/root/syz-executor" sig=0 arch=c000003e syscall=428 compat=0 ip=0x7f2646f35d29 code=0x7ffc0000 [ 134.330532][ T7917] EXT4-fs (loop6): Remounting filesystem read-only [ 134.337159][ T7917] EXT4-fs warning (device loop6): ext4_evict_inode:276: xattr delete (err -5) [ 134.448518][ T7931] loop7: detected capacity change from 0 to 2048 [ 134.550069][ T7931] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 134.636297][ T4210] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 134.654146][ T5114] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 134.845166][ T7937] loop7: detected capacity change from 0 to 8192 [ 134.900143][ T7937] loop7: p1 p2 p3 p4 [ 134.904319][ T7937] loop7: p1 start 51380223 is beyond EOD, truncated [ 134.910984][ T7937] loop7: p2 size 65535 extends beyond EOD, truncated [ 134.949605][ T7937] loop7: p3 size 100663552 extends beyond EOD, truncated [ 134.979496][ T7937] loop7: p4 size 81920 extends beyond EOD, truncated [ 137.161812][ T7951] rtc_cmos 00:00: Alarms can be up to one day in the future [ 137.372153][ T7958] Cannot find del_set index 1 as target [ 141.581897][ T7922] hsr_slave_1 (unregistering): left promiscuous mode [ 141.598766][ T7937] netlink: 76 bytes leftover after parsing attributes in process `syz.7.1235'. [ 141.818377][ T7970] IPv6: NLM_F_CREATE should be specified when creating new route [ 141.850716][ T29] kauditd_printk_skb: 76 callbacks suppressed [ 141.850733][ T29] audit: type=1400 audit(1736001970.247:3880): avc: denied { connect } for pid=7963 comm="syz.0.1242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 141.894405][ T7970] vcan0: tx drop: invalid sa for name 0x0000000000000040 [ 141.978147][ T7972] loop7: detected capacity change from 0 to 2048 [ 142.007556][ T7974] loop4: detected capacity change from 0 to 164 [ 142.024857][ T29] audit: type=1400 audit(1736001970.287:3881): avc: denied { write } for pid=7963 comm="syz.0.1242" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 142.045028][ T29] audit: type=1400 audit(1736001970.397:3882): avc: denied { mounton } for pid=7973 comm="syz.4.1244" path="/syzcgroup/cpu/syz4/cgroup.procs" dev="cgroup" ino=200 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=file permissive=1 [ 142.100727][ T7974] Unable to read rock-ridge attributes [ 142.127685][ T7974] Unable to read rock-ridge attributes [ 142.150279][ T7972] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 142.177811][ T7974] iso9660: Corrupted directory entry in block 4 of inode 1792 [ 142.206423][ T29] audit: type=1400 audit(1736001970.597:3883): avc: denied { execute } for pid=7971 comm="syz.7.1245" path="/169/file1/bus" dev="loop7" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=file permissive=1 [ 142.315210][ T29] audit: type=1400 audit(1736001970.627:3884): avc: denied { name_connect } for pid=7973 comm="syz.4.1244" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 142.336329][ T29] audit: type=1400 audit(1736001970.637:3885): avc: denied { listen } for pid=7973 comm="syz.4.1244" lport=35546 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 142.360109][ T29] audit: type=1400 audit(1736001970.667:3886): avc: denied { block_suspend } for pid=7985 comm="syz.6.1248" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 142.381586][ T29] audit: type=1400 audit(1736001970.687:3887): avc: denied { accept } for pid=7973 comm="syz.4.1244" lport=35546 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 142.409323][ T7986] loop6: detected capacity change from 0 to 512 [ 142.770932][ T7999] loop4: detected capacity change from 0 to 128 [ 142.874838][ T7999] syz.4.1251: attempt to access beyond end of device [ 142.874838][ T7999] loop4: rw=34817, sector=97, nr_sectors = 32 limit=128 [ 142.972527][ T5114] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 143.095597][ T29] audit: type=1326 audit(1736001971.487:3888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8002 comm="syz.4.1253" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc778cb5d29 code=0x7ffc0000 [ 143.119802][ T29] audit: type=1326 audit(1736001971.487:3889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8002 comm="syz.4.1253" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc778cb5d29 code=0x7ffc0000 [ 143.175567][ T8005] vcan0 speed is unknown, defaulting to 1000 [ 143.207646][ T8005] vcan0 speed is unknown, defaulting to 1000 [ 143.225324][ T8005] vcan0 speed is unknown, defaulting to 1000 [ 143.383398][ T8005] infiniband syz1: set active [ 143.388164][ T8005] infiniband syz1: added vcan0 [ 143.393890][ T3377] vcan0 speed is unknown, defaulting to 1000 [ 143.471476][ T8005] RDS/IB: syz1: added [ 143.498917][ T8005] smc: adding ib device syz1 with port count 1 [ 143.528184][ T8005] smc: ib device syz1 port 1 has pnetid [ 143.534320][ T3377] vcan0 speed is unknown, defaulting to 1000 [ 143.552592][ T8010] loop4: detected capacity change from 0 to 2048 [ 143.563104][ T8005] vcan0 speed is unknown, defaulting to 1000 [ 143.569209][ T8015] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 143.583303][ T8017] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 143.617160][ T8017] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 143.640803][ T8010] loop4: p1 p2 p3 < > p4 < > [ 143.645557][ T8010] loop4: partition table partially beyond EOD, truncated [ 143.671419][ T8010] loop4: p1 size 33024 extends beyond EOD, truncated [ 143.702268][ T8010] loop4: p2 start 16908804 is beyond EOD, truncated [ 143.708956][ T8010] loop4: p3 start 4284289 is beyond EOD, truncated [ 143.716003][ T8017] loop6: detected capacity change from 0 to 1024 [ 143.723367][ T8005] vcan0 speed is unknown, defaulting to 1000 [ 143.749887][ T8017] EXT4-fs (loop6): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 143.761701][ T8017] EXT4-fs (loop6): ext4_check_descriptors: Checksum for group 0 failed (51554!=20869) [ 143.854924][ T8017] JBD2: no valid journal superblock found [ 143.861546][ T8017] EXT4-fs (loop6): Could not load journal inode [ 143.895441][ T8020] kernel profiling enabled (shift: 17) [ 143.902281][ T8005] vcan0 speed is unknown, defaulting to 1000 [ 143.993679][ T8005] vcan0 speed is unknown, defaulting to 1000 [ 144.144034][ T8005] vcan0 speed is unknown, defaulting to 1000 [ 144.195667][ T8023] loop4: detected capacity change from 0 to 512 [ 144.323619][ T8026] loop4: detected capacity change from 0 to 1024 [ 144.352825][ T8026] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (1764!=20869) [ 144.397729][ T8026] EXT4-fs (loop4): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 144.409743][ T8028] sch_tbf: burst 1 is lower than device lo mtu (18) ! [ 144.420079][ T8020] lo speed is unknown, defaulting to 1000 [ 144.426474][ T8020] lo speed is unknown, defaulting to 1000 [ 144.433614][ T8028] netlink: 116 bytes leftover after parsing attributes in process `syz.7.1261'. [ 144.452312][ T8026] EXT4-fs (loop4): invalid journal inode [ 144.458203][ T8026] EXT4-fs (loop4): can't get journal size [ 144.467871][ T8028] netlink: 15 bytes leftover after parsing attributes in process `syz.7.1261'. [ 144.496056][ T8026] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 144.515924][ T8020] lo speed is unknown, defaulting to 1000 [ 144.522707][ T8031] sch_tbf: burst 1 is lower than device lo mtu (65550) ! [ 144.542286][ T8031] netlink: 116 bytes leftover after parsing attributes in process `syz.6.1262'. [ 144.590937][ T8031] netlink: 15 bytes leftover after parsing attributes in process `syz.6.1262'. [ 144.600099][ T8026] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 144.652950][ T8020] infiniband sz1: set down [ 144.657562][ T8020] infiniband sz1: added lo [ 144.662237][ T3352] lo speed is unknown, defaulting to 1000 [ 144.783146][ T8020] RDS/IB: sz1: added [ 144.792955][ T8040] loop6: detected capacity change from 0 to 512 [ 144.829727][ T8020] smc: adding ib device sz1 with port count 1 [ 144.846222][ T8040] EXT4-fs (loop6): encrypted files will use data=ordered instead of data journaling mode [ 144.889534][ T8040] EXT4-fs (loop6): 1 truncate cleaned up [ 144.898827][ T8020] smc: ib device sz1 port 1 has pnetid [ 144.904796][ T3352] lo speed is unknown, defaulting to 1000 [ 144.927475][ T8040] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 144.941784][ T3302] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 144.968940][ T8020] lo speed is unknown, defaulting to 1000 [ 144.975446][ T8043] loop7: detected capacity change from 0 to 764 [ 145.014763][ T8043] Symlink component flag not implemented [ 145.020584][ T8043] Symlink component flag not implemented [ 145.055510][ T8040] EXT4-fs error (device loop6): mb_free_blocks:1948: group 0, inode 15: block 33:freeing already freed block (bit 32); block bitmap corrupt. [ 145.083710][ T8043] Symlink component flag not implemented (129) [ 145.090011][ T8043] Symlink component flag not implemented (6) [ 145.102450][ T8020] lo speed is unknown, defaulting to 1000 [ 145.108525][ T8040] EXT4-fs (loop6): Remounting filesystem read-only [ 145.117368][ T8044] netlink: 4 bytes leftover after parsing attributes in process `syz.7.1266'. [ 145.130917][ T8040] EXT4-fs warning (device loop6): ext4_evict_inode:276: xattr delete (err -5) [ 145.202456][ T8020] lo speed is unknown, defaulting to 1000 [ 145.250105][ T4210] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 145.347694][ T8020] lo speed is unknown, defaulting to 1000 [ 145.380499][ T8049] loop7: detected capacity change from 0 to 512 [ 145.414926][ T8049] EXT4-fs: Mount option(s) incompatible with ext3 [ 145.483325][ T8020] lo speed is unknown, defaulting to 1000 [ 145.645689][ T8060] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 145.656329][ T8050] vcan0 speed is unknown, defaulting to 1000 [ 145.664498][ T8060] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 145.725124][ T8050] lo speed is unknown, defaulting to 1000 [ 145.912020][ T8050] chnl_net:caif_netlink_parms(): no params data found [ 145.965732][ T8050] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.973744][ T8050] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.000698][ T8050] bridge_slave_0: entered allmulticast mode [ 146.017565][ T8050] bridge_slave_0: entered promiscuous mode [ 146.030576][ T8050] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.037869][ T8050] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.048507][ T8050] bridge_slave_1: entered allmulticast mode [ 146.055308][ T8050] bridge_slave_1: entered promiscuous mode [ 146.176597][ T8050] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 146.197594][ T8069] loop6: detected capacity change from 0 to 512 [ 146.215963][ T8069] EXT4-fs (loop6): encrypted files will use data=ordered instead of data journaling mode [ 146.241296][ T8050] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 146.281286][ T8069] EXT4-fs (loop6): 1 truncate cleaned up [ 146.303155][ T8069] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 146.340928][ T8076] syzkaller1: entered promiscuous mode [ 146.346536][ T8076] syzkaller1: entered allmulticast mode [ 146.374755][ T8050] team0: Port device team_slave_0 added [ 146.382725][ T8050] team0: Port device team_slave_1 added [ 146.396892][ T8076] loop4: detected capacity change from 0 to 256 [ 146.443346][ T8076] FAT-fs (loop4): Directory bread(block 64) failed [ 146.460639][ T8069] EXT4-fs error (device loop6): mb_free_blocks:1948: group 0, inode 15: block 33:freeing already freed block (bit 32); block bitmap corrupt. [ 146.486031][ T8076] FAT-fs (loop4): Directory bread(block 65) failed [ 146.498862][ T8076] FAT-fs (loop4): Directory bread(block 66) failed [ 146.507294][ T8050] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 146.515145][ T8050] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 146.541723][ T8050] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 146.563317][ T8076] FAT-fs (loop4): Directory bread(block 67) failed [ 146.579761][ T8076] FAT-fs (loop4): Directory bread(block 68) failed [ 146.586416][ T8069] EXT4-fs (loop6): Remounting filesystem read-only [ 146.598035][ T8076] FAT-fs (loop4): Directory bread(block 69) failed [ 146.607162][ T8069] EXT4-fs warning (device loop6): ext4_evict_inode:276: xattr delete (err -5) [ 146.623585][ T8076] FAT-fs (loop4): Directory bread(block 70) failed [ 146.645329][ T8076] FAT-fs (loop4): Directory bread(block 71) failed [ 146.657831][ T8076] FAT-fs (loop4): Directory bread(block 72) failed [ 146.671735][ T8050] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 146.678748][ T8050] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 146.705537][ T8050] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 146.737029][ T8076] FAT-fs (loop4): Directory bread(block 73) failed [ 146.756896][ T4210] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 146.819468][ T8078] loop6: detected capacity change from 0 to 1024 [ 146.853610][ T8078] EXT4-fs (loop6): ext4_check_descriptors: Checksum for group 0 failed (1764!=20869) [ 146.878042][ T8078] EXT4-fs (loop6): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 146.902196][ T8078] EXT4-fs (loop6): invalid journal inode [ 146.914809][ T8078] EXT4-fs (loop6): can't get journal size [ 146.931721][ T8078] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 146.974008][ T8078] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 147.114359][ T4210] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 147.457393][ T8087] FAULT_INJECTION: forcing a failure. [ 147.457393][ T8087] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 147.471262][ T8087] CPU: 0 UID: 0 PID: 8087 Comm: syz.7.1277 Not tainted 6.13.0-rc5-syzkaller-00161-g63676eefb7a0 #0 [ 147.481988][ T8087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 147.492116][ T8087] Call Trace: [ 147.495444][ T8087] [ 147.498418][ T8087] dump_stack_lvl+0xf2/0x150 [ 147.503132][ T8087] dump_stack+0x15/0x1a [ 147.507428][ T8087] should_fail_ex+0x223/0x230 [ 147.512131][ T8087] should_fail+0xb/0x10 [ 147.516309][ T8087] should_fail_usercopy+0x1a/0x20 [ 147.521550][ T8087] _copy_from_iter+0xd5/0xd00 [ 147.526374][ T8087] ? kmalloc_reserve+0x16e/0x190 [ 147.531478][ T8087] ? __build_skb_around+0x196/0x1f0 [ 147.536723][ T8087] ? __alloc_skb+0x21f/0x310 [ 147.541391][ T8087] ? __virt_addr_valid+0x1ed/0x250 [ 147.546692][ T8087] ? __check_object_size+0x364/0x520 [ 147.552025][ T8087] netlink_sendmsg+0x460/0x6e0 [ 147.556910][ T8087] ? __pfx_netlink_sendmsg+0x10/0x10 [ 147.562251][ T8087] __sock_sendmsg+0x140/0x180 [ 147.566966][ T8087] ____sys_sendmsg+0x312/0x410 [ 147.571763][ T8087] __sys_sendmsg+0x19d/0x230 [ 147.576448][ T8087] __x64_sys_sendmsg+0x46/0x50 [ 147.581245][ T8087] x64_sys_call+0x2734/0x2dc0 [ 147.585975][ T8087] do_syscall_64+0xc9/0x1c0 [ 147.590651][ T8087] ? clear_bhb_loop+0x55/0xb0 [ 147.595425][ T8087] ? clear_bhb_loop+0x55/0xb0 [ 147.600136][ T8087] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 147.606103][ T8087] RIP: 0033:0x7f2646f35d29 [ 147.610646][ T8087] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 147.630356][ T8087] RSP: 002b:00007f26455a7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 147.638833][ T8087] RAX: ffffffffffffffda RBX: 00007f2647125fa0 RCX: 00007f2646f35d29 [ 147.646893][ T8087] RDX: 0000000000000000 RSI: 0000000020000300 RDI: 0000000000000005 [ 147.655001][ T8087] RBP: 00007f26455a7090 R08: 0000000000000000 R09: 0000000000000000 [ 147.662998][ T8087] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 147.671108][ T8087] R13: 0000000000000000 R14: 00007f2647125fa0 R15: 00007fff1b4c23d8 [ 147.679116][ T8087] [ 147.785156][ T8089] loop7: detected capacity change from 0 to 8192 [ 148.036888][ T29] kauditd_printk_skb: 144 callbacks suppressed [ 148.036904][ T29] audit: type=1400 audit(1736001976.427:4034): avc: denied { mount } for pid=8096 comm="syz.6.1281" name="/" dev="devtmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 148.073413][ T8098] Cannot find del_set index 1 as target [ 148.095068][ T8097] loop6: detected capacity change from 0 to 2048 [ 148.106736][ T29] audit: type=1400 audit(1736001976.497:4035): avc: denied { mounton } for pid=8096 comm="syz.6.1281" path="/file0" dev="devtmpfs" ino=854 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 148.140973][ T8097] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 148.155240][ T8097] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 148.238246][ T29] audit: type=1400 audit(1736001976.627:4036): avc: denied { read } for pid=8096 comm="syz.6.1281" name="msr" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 148.277420][ T29] audit: type=1400 audit(1736001976.657:4037): avc: denied { open } for pid=8096 comm="syz.6.1281" path="/dev/cpu/0/msr" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 148.918329][ T8110] Cannot find del_set index 1 as target [ 151.188098][ T8050] hsr_slave_0: entered promiscuous mode [ 151.240786][ T8050] hsr_slave_1: entered promiscuous mode [ 151.283267][ T8050] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 151.313072][ T8050] Cannot create hsr debugfs directory [ 151.468297][ T8127] loop4: detected capacity change from 0 to 512 [ 151.507447][ T8127] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 151.530761][ T6355] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 151.589451][ T8127] EXT4-fs (loop4): 1 truncate cleaned up [ 151.617681][ T8127] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 151.640995][ T8126] loop7: detected capacity change from 0 to 8192 [ 151.662164][ T6355] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 151.700776][ T8126] loop7: p1 p2 p3 p4 [ 151.705471][ T8126] loop7: p1 start 51380223 is beyond EOD, truncated [ 151.712185][ T8126] loop7: p2 size 65535 extends beyond EOD, truncated [ 151.740515][ T6355] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 151.760902][ T8127] EXT4-fs error (device loop4): mb_free_blocks:1948: group 0, inode 15: block 33:freeing already freed block (bit 32); block bitmap corrupt. [ 151.786752][ T8130] netlink: 76 bytes leftover after parsing attributes in process `syz.7.1290'. [ 151.815005][ T6355] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 151.829017][ T8126] loop7: p3 size 100663552 extends beyond EOD, truncated [ 151.850139][ T8127] EXT4-fs (loop4): Remounting filesystem read-only [ 151.856822][ T8127] EXT4-fs warning (device loop4): ext4_evict_inode:276: xattr delete (err -5) [ 151.873414][ C0] ================================================================== [ 151.881556][ C0] BUG: KCSAN: data-race in can_send / can_send [ 151.887765][ C0] [ 151.890099][ C0] read-write to 0xffff888117802470 of 8 bytes by interrupt on cpu 1: [ 151.898171][ C0] can_send+0x5b6/0x6d0 [ 151.902358][ C0] can_can_gw_rcv+0x77d/0x7e0 [ 151.907058][ C0] can_rcv_filter+0xbf/0x4c0 [ 151.911675][ C0] can_receive+0x182/0x1f0 [ 151.916121][ C0] can_rcv+0xe7/0x180 [ 151.920121][ C0] __netif_receive_skb+0x123/0x280 [ 151.925278][ C0] process_backlog+0x22e/0x440 [ 151.930083][ C0] __napi_poll+0x63/0x3c0 [ 151.934449][ C0] net_rx_action+0x3a1/0x7f0 [ 151.939066][ C0] handle_softirqs+0xbf/0x280 [ 151.943778][ C0] run_ksoftirqd+0x1c/0x30 [ 151.948210][ C0] smpboot_thread_fn+0x31c/0x4c0 [ 151.953184][ C0] kthread+0x1d1/0x210 [ 151.957284][ C0] ret_from_fork+0x4b/0x60 [ 151.961723][ C0] ret_from_fork_asm+0x1a/0x30 [ 151.966505][ C0] [ 151.968840][ C0] read-write to 0xffff888117802470 of 8 bytes by interrupt on cpu 0: [ 151.976914][ C0] can_send+0x5b6/0x6d0 [ 151.981123][ C0] can_can_gw_rcv+0x77d/0x7e0 [ 151.985826][ C0] can_rcv_filter+0xbf/0x4c0 [ 151.990448][ C0] can_receive+0x182/0x1f0 [ 151.994896][ C0] can_rcv+0xe7/0x180 [ 151.998927][ C0] __netif_receive_skb+0x123/0x280 [ 152.004065][ C0] process_backlog+0x22e/0x440 [ 152.008854][ C0] __napi_poll+0x63/0x3c0 [ 152.013201][ C0] net_rx_action+0x3a1/0x7f0 [ 152.017816][ C0] handle_softirqs+0xbf/0x280 [ 152.022528][ C0] run_ksoftirqd+0x1c/0x30 [ 152.026968][ C0] smpboot_thread_fn+0x31c/0x4c0 [ 152.031930][ C0] kthread+0x1d1/0x210 [ 152.036013][ C0] ret_from_fork+0x4b/0x60 [ 152.040441][ C0] ret_from_fork_asm+0x1a/0x30 [ 152.045217][ C0] [ 152.047560][ C0] value changed: 0x0000000000005d30 -> 0x0000000000005d31 [ 152.054697][ C0] [ 152.057021][ C0] Reported by Kernel Concurrency Sanitizer on: [ 152.063173][ C0] CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Not tainted 6.13.0-rc5-syzkaller-00161-g63676eefb7a0 #0 [ 152.073818][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 152.083888][ C0] ================================================================== [ 152.095563][ C0] ================================================================== [ 152.103661][ C0] BUG: KCSAN: data-race in can_send / can_send [ 152.109856][ C0] [ 152.112187][ C0] read-write to 0xffff888117802410 of 8 bytes by interrupt on cpu 1: [ 152.120266][ C0] can_send+0x5a2/0x6d0 [ 152.124450][ C0] can_can_gw_rcv+0x77d/0x7e0 [ 152.129154][ C0] can_rcv_filter+0xbf/0x4c0 [ 152.133769][ C0] can_receive+0x182/0x1f0 [ 152.138216][ C0] can_rcv+0xe7/0x180 [ 152.142222][ C0] __netif_receive_skb+0x123/0x280 [ 152.147355][ C0] process_backlog+0x22e/0x440 [ 152.152144][ C0] __napi_poll+0x63/0x3c0 [ 152.156489][ C0] net_rx_action+0x3a1/0x7f0 [ 152.161103][ C0] handle_softirqs+0xbf/0x280 [ 152.165817][ C0] run_ksoftirqd+0x1c/0x30 [ 152.170252][ C0] smpboot_thread_fn+0x31c/0x4c0 [ 152.175264][ C0] kthread+0x1d1/0x210 [ 152.179458][ C0] ret_from_fork+0x4b/0x60 [ 152.183889][ C0] ret_from_fork_asm+0x1a/0x30 [ 152.188666][ C0] [ 152.191005][ C0] read-write to 0xffff888117802410 of 8 bytes by interrupt on cpu 0: [ 152.199074][ C0] can_send+0x5a2/0x6d0 [ 152.203259][ C0] can_can_gw_rcv+0x77d/0x7e0 [ 152.207966][ C0] can_rcv_filter+0xbf/0x4c0 [ 152.212590][ C0] can_receive+0x182/0x1f0 [ 152.217041][ C0] can_rcv+0xe7/0x180 [ 152.221058][ C0] __netif_receive_skb+0x123/0x280 [ 152.226195][ C0] process_backlog+0x22e/0x440 [ 152.230985][ C0] __napi_poll+0x63/0x3c0 [ 152.235337][ C0] net_rx_action+0x3a1/0x7f0 [ 152.239949][ C0] handle_softirqs+0xbf/0x280 [ 152.244663][ C0] do_softirq+0x5e/0x90 [ 152.248853][ C0] __local_bh_enable_ip+0x6e/0x70 [ 152.253910][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 152.258877][ C0] batadv_nc_purge_paths+0x220/0x270 [ 152.264185][ C0] batadv_nc_worker+0x3db/0xad0 [ 152.269073][ C0] process_scheduled_works+0x483/0x9a0 [ 152.274558][ C0] worker_thread+0x51d/0x6f0 [ 152.279168][ C0] kthread+0x1d1/0x210 [ 152.283241][ C0] ret_from_fork+0x4b/0x60 [ 152.287677][ C0] ret_from_fork_asm+0x1a/0x30 [ 152.292461][ C0] [ 152.294792][ C0] value changed: 0x00000000005b29dc -> 0x00000000005b29de [ 152.301908][ C0] [ 152.304235][ C0] Reported by Kernel Concurrency Sanitizer on: [ 152.310386][ C0] CPU: 0 UID: 0 PID: 6307 Comm: kworker/u8:17 Not tainted 6.13.0-rc5-syzkaller-00161-g63676eefb7a0 #0 [ 152.321349][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 152.331418][ C0] Workqueue: bat_events batadv_nc_worker [ 152.337066][ C0] ================================================================== [ 152.358458][ C0] ================================================================== [ 152.366558][ C0] BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv [ 152.373779][ C0] [ 152.376104][ C0] read-write to 0xffff88811cdec020 of 4 bytes by interrupt on cpu 1: [ 152.384186][ C0] can_can_gw_rcv+0x7cb/0x7e0 [ 152.388893][ C0] can_rcv_filter+0xbf/0x4c0 [ 152.393513][ C0] can_receive+0x182/0x1f0 [ 152.397959][ C0] can_rcv+0xe7/0x180 [ 152.401966][ C0] __netif_receive_skb+0x123/0x280 [ 152.407114][ C0] process_backlog+0x22e/0x440 [ 152.411901][ C0] __napi_poll+0x63/0x3c0 [ 152.416251][ C0] net_rx_action+0x3a1/0x7f0 [ 152.420862][ C0] handle_softirqs+0xbf/0x280 [ 152.425569][ C0] run_ksoftirqd+0x1c/0x30 [ 152.430091][ C0] smpboot_thread_fn+0x31c/0x4c0 [ 152.435064][ C0] kthread+0x1d1/0x210 [ 152.439180][ C0] ret_from_fork+0x4b/0x60 [ 152.443629][ C0] ret_from_fork_asm+0x1a/0x30 [ 152.448516][ C0] [ 152.450864][ C0] read-write to 0xffff88811cdec020 of 4 bytes by interrupt on cpu 0: [ 152.459123][ C0] can_can_gw_rcv+0x7cb/0x7e0 [ 152.463829][ C0] can_rcv_filter+0xbf/0x4c0 [ 152.468459][ C0] can_receive+0x182/0x1f0 [ 152.472912][ C0] can_rcv+0xe7/0x180 [ 152.476950][ C0] __netif_receive_skb+0x123/0x280 [ 152.482088][ C0] process_backlog+0x22e/0x440 [ 152.486885][ C0] __napi_poll+0x63/0x3c0 [ 152.491235][ C0] net_rx_action+0x3a1/0x7f0 [ 152.495849][ C0] handle_softirqs+0xbf/0x280 [ 152.500557][ C0] do_softirq+0x5e/0x90 [ 152.504739][ C0] __local_bh_enable_ip+0x6e/0x70 [ 152.509808][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 152.514776][ C0] batadv_nc_purge_paths+0x220/0x270 [ 152.520095][ C0] batadv_nc_worker+0x3db/0xad0 [ 152.524972][ C0] process_scheduled_works+0x483/0x9a0 [ 152.530475][ C0] worker_thread+0x51d/0x6f0 [ 152.535092][ C0] kthread+0x1d1/0x210 [ 152.539198][ C0] ret_from_fork+0x4b/0x60 [ 152.543634][ C0] ret_from_fork_asm+0x1a/0x30 [ 152.548429][ C0] [ 152.550774][ C0] value changed: 0x005b88ba -> 0x005b88bb [ 152.556502][ C0] [ 152.558860][ C0] Reported by Kernel Concurrency Sanitizer on: [ 152.565068][ C0] CPU: 0 UID: 0 PID: 6307 Comm: kworker/u8:17 Not tainted 6.13.0-rc5-syzkaller-00161-g63676eefb7a0 #0 [ 152.576113][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 152.586409][ C0] Workqueue: bat_events batadv_nc_worker [ 152.592083][ C0] ================================================================== [ 152.612329][ C1] ================================================================== [ 152.620453][ C1] BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter [ 152.627703][ C1] [ 152.630031][ C1] read-write to 0xffff888101dc82e8 of 8 bytes by interrupt on cpu 0: [ 152.638125][ C1] can_rcv_filter+0xd1/0x4c0 [ 152.642755][ C1] can_receive+0x182/0x1f0 [ 152.647195][ C1] can_rcv+0xe7/0x180 [ 152.651210][ C1] __netif_receive_skb+0x123/0x280 [ 152.656352][ C1] process_backlog+0x22e/0x440 [ 152.661145][ C1] __napi_poll+0x63/0x3c0 [ 152.665508][ C1] net_rx_action+0x3a1/0x7f0 [ 152.670128][ C1] handle_softirqs+0xbf/0x280 [ 152.674847][ C1] do_softirq+0x5e/0x90 [ 152.679043][ C1] __local_bh_enable_ip+0x6e/0x70 [ 152.684111][ C1] _raw_spin_unlock_bh+0x36/0x40 [ 152.689088][ C1] batadv_nc_purge_paths+0x220/0x270 [ 152.694402][ C1] batadv_nc_worker+0x3db/0xad0 [ 152.699270][ C1] process_scheduled_works+0x483/0x9a0 [ 152.704753][ C1] worker_thread+0x51d/0x6f0 [ 152.709369][ C1] kthread+0x1d1/0x210 [ 152.713451][ C1] ret_from_fork+0x4b/0x60 [ 152.717893][ C1] ret_from_fork_asm+0x1a/0x30 [ 152.722672][ C1] [ 152.724996][ C1] read-write to 0xffff888101dc82e8 of 8 bytes by interrupt on cpu 1: [ 152.733067][ C1] can_rcv_filter+0xd1/0x4c0 [ 152.737695][ C1] can_receive+0x182/0x1f0 [ 152.742133][ C1] can_rcv+0xe7/0x180 [ 152.746144][ C1] __netif_receive_skb+0x123/0x280 [ 152.751272][ C1] process_backlog+0x22e/0x440 [ 152.756048][ C1] __napi_poll+0x63/0x3c0 [ 152.760389][ C1] net_rx_action+0x3a1/0x7f0 [ 152.764991][ C1] handle_softirqs+0xbf/0x280 [ 152.769691][ C1] run_ksoftirqd+0x1c/0x30 [ 152.774117][ C1] smpboot_thread_fn+0x31c/0x4c0 [ 152.779075][ C1] kthread+0x1d1/0x210 [ 152.783150][ C1] ret_from_fork+0x4b/0x60 [ 152.787574][ C1] ret_from_fork_asm+0x1a/0x30 [ 152.792349][ C1] [ 152.794676][ C1] value changed: 0x00000000005be281 -> 0x00000000005be282 [ 152.801794][ C1] [ 152.804125][ C1] Reported by Kernel Concurrency Sanitizer on: [ 152.810279][ C1] CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.13.0-rc5-syzkaller-00161-g63676eefb7a0 #0 [ 152.820908][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 152.830973][ C1] ================================================================== [ 152.857901][ C1] ================================================================== [ 152.866008][ C1] BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter [ 152.873255][ C1] [ 152.875591][ C1] read-write to 0xffff88810121c3d8 of 8 bytes by interrupt on cpu 0: [ 152.883664][ C1] can_rcv_filter+0x3a9/0x4c0 [ 152.888357][ C1] can_receive+0x182/0x1f0 [ 152.892806][ C1] can_rcv+0xe7/0x180 [ 152.896822][ C1] __netif_receive_skb+0x123/0x280 [ 152.901960][ C1] process_backlog+0x22e/0x440 [ 152.906743][ C1] __napi_poll+0x63/0x3c0 [ 152.911091][ C1] net_rx_action+0x3a1/0x7f0 [ 152.915708][ C1] handle_softirqs+0xbf/0x280 [ 152.920444][ C1] do_softirq+0x5e/0x90 [ 152.924644][ C1] __local_bh_enable_ip+0x6e/0x70 [ 152.929717][ C1] _raw_spin_unlock_bh+0x36/0x40 [ 152.934672][ C1] lock_sock_nested+0x10f/0x140 [ 152.939544][ C1] tcp_close+0x1b/0xd0 [ 152.943631][ C1] inet_release+0xce/0xf0 [ 152.947988][ C1] sock_close+0x68/0x150 [ 152.952270][ C1] __fput+0x17a/0x6d0 [ 152.956269][ C1] ____fput+0x1c/0x30 [ 152.960272][ C1] task_work_run+0x13a/0x1a0 [ 152.964887][ C1] do_exit+0x5d8/0x17f0 [ 152.969051][ C1] do_group_exit+0x142/0x150 [ 152.973657][ C1] __x64_sys_exit_group+0x1f/0x20 [ 152.978700][ C1] x64_sys_call+0x2db8/0x2dc0 [ 152.983391][ C1] do_syscall_64+0xc9/0x1c0 [ 152.987907][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 152.993839][ C1] [ 152.996183][ C1] read-write to 0xffff88810121c3d8 of 8 bytes by interrupt on cpu 1: [ 153.004257][ C1] can_rcv_filter+0x3a9/0x4c0 [ 153.008970][ C1] can_receive+0x182/0x1f0 [ 153.013411][ C1] can_rcv+0xe7/0x180 [ 153.017418][ C1] __netif_receive_skb+0x123/0x280 [ 153.022558][ C1] process_backlog+0x22e/0x440 [ 153.027339][ C1] __napi_poll+0x63/0x3c0 [ 153.031677][ C1] net_rx_action+0x3a1/0x7f0 [ 153.036276][ C1] handle_softirqs+0xbf/0x280 [ 153.040978][ C1] run_ksoftirqd+0x1c/0x30 [ 153.045403][ C1] smpboot_thread_fn+0x31c/0x4c0 [ 153.050372][ C1] kthread+0x1d1/0x210 [ 153.054453][ C1] ret_from_fork+0x4b/0x60 [ 153.058878][ C1] ret_from_fork_asm+0x1a/0x30 [ 153.063657][ C1] [ 153.065980][ C1] value changed: 0x0000000000016627 -> 0x0000000000016628 [ 153.072270][ T29] audit: type=1400 audit(1736001981.207:4038): avc: denied { write } for pid=3287 comm="syz-executor" path="pipe:[1852]" dev="pipefs" ino=1852 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 153.073075][ C1] [ 153.073082][ C1] Reported by Kernel Concurrency Sanitizer on: [ 153.073092][ C1] CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.13.0-rc5-syzkaller-00161-g63676eefb7a0 #0 [ 153.073115][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 153.073127][ C1] ================================================================== [ 153.197296][ T8126] loop7: p4 size 81920 extends beyond EOD, truncated SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 154.731721][ T2999] loop7: p1 p2 p3 p4 [ 154.735840][ T2999] loop7: p1 start 51380223 is beyond EOD, truncated [ 154.743440][ T2999] loop7: p2 size 65535 extends beyond EOD, truncated [ 154.900781][ C0] ================================================================== [ 154.909004][ C0] BUG: KCSAN: data-race in can_send / can_send [ 154.915208][ C0] [ 154.917537][ C0] read-write to 0xffff888117802470 of 8 bytes by interrupt on cpu 1: [ 154.925613][ C0] can_send+0x5b6/0x6d0 [ 154.929804][ C0] can_can_gw_rcv+0x77d/0x7e0 [ 154.934507][ C0] can_rcv_filter+0xbf/0x4c0 [ 154.939134][ C0] can_receive+0x182/0x1f0 [ 154.943582][ C0] can_rcv+0xe7/0x180 [ 154.947594][ C0] __netif_receive_skb+0x123/0x280 [ 154.952733][ C0] process_backlog+0x22e/0x440 [ 154.957524][ C0] __napi_poll+0x63/0x3c0 [ 154.961876][ C0] net_rx_action+0x3a1/0x7f0 [ 154.966491][ C0] handle_softirqs+0xbf/0x280 [ 154.971198][ C0] run_ksoftirqd+0x1c/0x30 [ 154.975633][ C0] smpboot_thread_fn+0x31c/0x4c0 [ 154.980610][ C0] kthread+0x1d1/0x210 [ 154.984696][ C0] ret_from_fork+0x4b/0x60 [ 154.989124][ C0] ret_from_fork_asm+0x1a/0x30 [ 154.993906][ C0] [ 154.996237][ C0] read-write to 0xffff888117802470 of 8 bytes by interrupt on cpu 0: [ 155.004310][ C0] can_send+0x5b6/0x6d0 [ 155.008492][ C0] can_can_gw_rcv+0x77d/0x7e0 [ 155.013184][ C0] can_rcv_filter+0xbf/0x4c0 [ 155.017806][ C0] can_receive+0x182/0x1f0 [ 155.022252][ C0] can_rcv+0xe7/0x180 [ 155.026268][ C0] __netif_receive_skb+0x123/0x280 [ 155.031402][ C0] process_backlog+0x22e/0x440 [ 155.036192][ C0] __napi_poll+0x63/0x3c0 [ 155.040539][ C0] net_rx_action+0x3a1/0x7f0 [ 155.045154][ C0] handle_softirqs+0xbf/0x280 [ 155.049858][ C0] do_softirq+0x5e/0x90 [ 155.054061][ C0] __local_bh_enable_ip+0x6e/0x70 [ 155.059241][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 155.064202][ C0] nsim_dev_trap_report_work+0x522/0x620 [ 155.069865][ C0] process_scheduled_works+0x483/0x9a0 [ 155.075361][ C0] worker_thread+0x51d/0x6f0 [ 155.079981][ C0] kthread+0x1d1/0x210 [ 155.084063][ C0] ret_from_fork+0x4b/0x60 [ 155.088488][ C0] ret_from_fork_asm+0x1a/0x30 [ 155.093281][ C0] [ 155.095610][ C0] value changed: 0x000000000000b670 -> 0x000000000000b671 [ 155.102733][ C0] [ 155.105075][ C0] Reported by Kernel Concurrency Sanitizer on: [ 155.111230][ C0] CPU: 0 UID: 0 PID: 6312 Comm: kworker/u8:21 Not tainted 6.13.0-rc5-syzkaller-00161-g63676eefb7a0 #0 [ 155.122173][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 155.132244][ C0] Workqueue: events_unbound nsim_dev_trap_report_work [ 155.139038][ C0] ================================================================== [ 155.173185][ C1] ================================================================== [ 155.181415][ C1] BUG: KCSAN: data-race in can_send / can_send [ 155.187619][ C1] [ 155.189950][ C1] read-write to 0xffff888117802410 of 8 bytes by interrupt on cpu 0: [ 155.198028][ C1] can_send+0x5a2/0x6d0 [ 155.202213][ C1] can_can_gw_rcv+0x77d/0x7e0 [ 155.206910][ C1] can_rcv_filter+0xbf/0x4c0 [ 155.211540][ C1] can_receive+0x182/0x1f0 [ 155.215990][ C1] can_rcv+0xe7/0x180 [ 155.220008][ C1] __netif_receive_skb+0x123/0x280 [ 155.225138][ C1] process_backlog+0x22e/0x440 [ 155.229921][ C1] __napi_poll+0x63/0x3c0 [ 155.234266][ C1] net_rx_action+0x3a1/0x7f0 [ 155.238879][ C1] handle_softirqs+0xbf/0x280 [ 155.243581][ C1] do_softirq+0x5e/0x90 [ 155.247790][ C1] __local_bh_enable_ip+0x6e/0x70 [ 155.252845][ C1] _raw_spin_unlock_bh+0x36/0x40 [ 155.257804][ C1] nsim_dev_trap_report_work+0x522/0x620 [ 155.263471][ C1] process_scheduled_works+0x483/0x9a0 [ 155.268961][ C1] worker_thread+0x51d/0x6f0 [ 155.273582][ C1] kthread+0x1d1/0x210 [ 155.277661][ C1] ret_from_fork+0x4b/0x60 [ 155.282096][ C1] ret_from_fork_asm+0x1a/0x30 [ 155.286876][ C1] [ 155.289207][ C1] read-write to 0xffff888117802410 of 8 bytes by interrupt on cpu 1: [ 155.297284][ C1] can_send+0x5a2/0x6d0 [ 155.301473][ C1] can_can_gw_rcv+0x77d/0x7e0 [ 155.306170][ C1] can_rcv_filter+0xbf/0x4c0 [ 155.310784][ C1] can_receive+0x182/0x1f0 [ 155.315224][ C1] can_rcv+0xe7/0x180 [ 155.319236][ C1] __netif_receive_skb+0x123/0x280 [ 155.324364][ C1] process_backlog+0x22e/0x440 [ 155.329150][ C1] __napi_poll+0x63/0x3c0 [ 155.333492][ C1] net_rx_action+0x3a1/0x7f0 [ 155.338106][ C1] handle_softirqs+0xbf/0x280 [ 155.342803][ C1] run_ksoftirqd+0x1c/0x30 [ 155.347228][ C1] smpboot_thread_fn+0x31c/0x4c0 [ 155.349110][ T2999] loop7: p3 size 100663552 extends beyond EOD, [ 155.352192][ C1] kthread+0x1d1/0x210 [ 155.352207][ T2999] truncated [ 155.352221][ C1] ret_from_fork+0x4b/0x60 [ 155.352239][ C1] ret_from_fork_asm+0x1a/0x30 [ 155.352259][ C1] [ 155.352263][ C1] value changed: 0x0000000000609250 -> 0x0000000000609251 [ 155.384228][ C1] [ 155.386560][ C1] Reported by Kernel Concurrency Sanitizer on: [ 155.392724][ C1] CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.13.0-rc5-syzkaller-00161-g63676eefb7a0 #0 [ 155.403352][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 155.413433][ C1] ================================================================== [ 155.430312][ C0] ================================================================== [ 155.438449][ C0] BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv [ 155.445701][ C0] [ 155.448033][ C0] read-write to 0xffff88811cdec020 of 4 bytes by interrupt on cpu 1: [ 155.456112][ C0] can_can_gw_rcv+0x7cb/0x7e0 [ 155.460816][ C0] can_rcv_filter+0xbf/0x4c0 [ 155.465439][ C0] can_receive+0x182/0x1f0 [ 155.469891][ C0] can_rcv+0xe7/0x180 [ 155.473910][ C0] __netif_receive_skb+0x123/0x280 [ 155.479045][ C0] process_backlog+0x22e/0x440 [ 155.483833][ C0] __napi_poll+0x63/0x3c0 [ 155.488189][ C0] net_rx_action+0x3a1/0x7f0 [ 155.492803][ C0] handle_softirqs+0xbf/0x280 [ 155.497514][ C0] run_ksoftirqd+0x1c/0x30 [ 155.501949][ C0] smpboot_thread_fn+0x31c/0x4c0 [ 155.506918][ C0] kthread+0x1d1/0x210 [ 155.511004][ C0] ret_from_fork+0x4b/0x60 [ 155.515431][ C0] ret_from_fork_asm+0x1a/0x30 [ 155.520218][ C0] [ 155.522556][ C0] read-write to 0xffff88811cdec020 of 4 bytes by interrupt on cpu 0: [ 155.530663][ C0] can_can_gw_rcv+0x7cb/0x7e0 [ 155.535377][ C0] can_rcv_filter+0xbf/0x4c0 [ 155.540006][ C0] can_receive+0x182/0x1f0 [ 155.544466][ C0] can_rcv+0xe7/0x180 [ 155.548495][ C0] __netif_receive_skb+0x123/0x280 [ 155.553735][ C0] process_backlog+0x22e/0x440 [ 155.558528][ C0] __napi_poll+0x63/0x3c0 [ 155.562877][ C0] net_rx_action+0x3a1/0x7f0 [ 155.567495][ C0] handle_softirqs+0xbf/0x280 [ 155.572206][ C0] do_softirq+0x5e/0x90 [ 155.576410][ C0] __local_bh_enable_ip+0x6e/0x70 [ 155.581475][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 155.586442][ C0] nsim_dev_trap_report_work+0x522/0x620 [ 155.592100][ C0] process_scheduled_works+0x483/0x9a0 [ 155.597596][ C0] worker_thread+0x51d/0x6f0 [ 155.602227][ C0] kthread+0x1d1/0x210 [ 155.606325][ C0] ret_from_fork+0x4b/0x60 [ 155.610764][ C0] ret_from_fork_asm+0x1a/0x30 [ 155.615596][ C0] [ 155.617920][ C0] value changed: 0x0060e821 -> 0x0060e822 [ 155.623641][ C0] [ 155.625967][ C0] Reported by Kernel Concurrency Sanitizer on: [ 155.632116][ C0] CPU: 0 UID: 0 PID: 6357 Comm: kworker/u8:66 Not tainted 6.13.0-rc5-syzkaller-00161-g63676eefb7a0 #0 [ 155.643090][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 155.653156][ C0] Workqueue: events_unbound nsim_dev_trap_report_work [ 155.659950][ C0] ================================================================== [ 155.673564][ C0] ================================================================== [ 155.681677][ C0] BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter [ 155.688920][ C0] [ 155.691264][ C0] read-write to 0xffff888101dc82e8 of 8 bytes by interrupt on cpu 1: [ 155.699338][ C0] can_rcv_filter+0xd1/0x4c0 [ 155.703962][ C0] can_receive+0x182/0x1f0 [ 155.708408][ C0] can_rcv+0xe7/0x180 [ 155.712419][ C0] __netif_receive_skb+0x123/0x280 [ 155.717550][ C0] process_backlog+0x22e/0x440 [ 155.722335][ C0] __napi_poll+0x63/0x3c0 [ 155.726684][ C0] net_rx_action+0x3a1/0x7f0 [ 155.731288][ C0] handle_softirqs+0xbf/0x280 [ 155.736002][ C0] run_ksoftirqd+0x1c/0x30 [ 155.740447][ C0] smpboot_thread_fn+0x31c/0x4c0 [ 155.745414][ C0] kthread+0x1d1/0x210 [ 155.749505][ C0] ret_from_fork+0x4b/0x60 [ 155.753928][ C0] ret_from_fork_asm+0x1a/0x30 [ 155.758704][ C0] [ 155.761036][ C0] read-write to 0xffff888101dc82e8 of 8 bytes by interrupt on cpu 0: [ 155.769121][ C0] can_rcv_filter+0xd1/0x4c0 [ 155.773741][ C0] can_receive+0x182/0x1f0 [ 155.778183][ C0] can_rcv+0xe7/0x180 [ 155.782188][ C0] __netif_receive_skb+0x123/0x280 [ 155.787319][ C0] process_backlog+0x22e/0x440 [ 155.792110][ C0] __napi_poll+0x63/0x3c0 [ 155.796461][ C0] net_rx_action+0x3a1/0x7f0 [ 155.801075][ C0] handle_softirqs+0xbf/0x280 [ 155.805779][ C0] run_ksoftirqd+0x1c/0x30 [ 155.810258][ C0] smpboot_thread_fn+0x31c/0x4c0 [ 155.815222][ C0] kthread+0x1d1/0x210 [ 155.819303][ C0] ret_from_fork+0x4b/0x60 [ 155.823740][ C0] ret_from_fork_asm+0x1a/0x30 [ 155.828518][ C0] [ 155.830844][ C0] value changed: 0x0000000000614555 -> 0x0000000000614556 [ 155.837960][ C0] [ 155.840290][ C0] Reported by Kernel Concurrency Sanitizer on: [ 155.846442][ C0] CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Not tainted 6.13.0-rc5-syzkaller-00161-g63676eefb7a0 #0 [ 155.857043][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 155.867114][ C0] ================================================================== [ 155.880997][ C1] ================================================================== [ 155.889113][ C1] BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter [ 155.896366][ C1] [ 155.898701][ C1] read-write to 0xffff88810121c3d8 of 8 bytes by interrupt on cpu 0: [ 155.906779][ C1] can_rcv_filter+0x3a9/0x4c0 [ 155.911485][ C1] can_receive+0x182/0x1f0 [ 155.915949][ C1] can_rcv+0xe7/0x180 [ 155.919961][ C1] __netif_receive_skb+0x123/0x280 [ 155.925093][ C1] process_backlog+0x22e/0x440 [ 155.929878][ C1] __napi_poll+0x63/0x3c0 [ 155.934224][ C1] net_rx_action+0x3a1/0x7f0 [ 155.938838][ C1] handle_softirqs+0xbf/0x280 [ 155.943543][ C1] do_softirq+0x5e/0x90 [ 155.947740][ C1] __local_bh_enable_ip+0x6e/0x70 [ 155.952813][ C1] _raw_spin_unlock_bh+0x36/0x40 [ 155.957770][ C1] nsim_dev_trap_report_work+0x522/0x620 [ 155.963430][ C1] process_scheduled_works+0x483/0x9a0 [ 155.968919][ C1] worker_thread+0x51d/0x6f0 [ 155.973536][ C1] kthread+0x1d1/0x210 [ 155.977619][ C1] ret_from_fork+0x4b/0x60 [ 155.982051][ C1] ret_from_fork_asm+0x1a/0x30 [ 155.986830][ C1] [ 155.989159][ C1] read-write to 0xffff88810121c3d8 of 8 bytes by interrupt on cpu 1: [ 155.997237][ C1] can_rcv_filter+0x3a9/0x4c0 [ 156.001949][ C1] can_receive+0x182/0x1f0 [ 156.006410][ C1] can_rcv+0xe7/0x180 [ 156.010421][ C1] __netif_receive_skb+0x123/0x280 [ 156.015550][ C1] process_backlog+0x22e/0x440 [ 156.020339][ C1] __napi_poll+0x63/0x3c0 [ 156.024686][ C1] net_rx_action+0x3a1/0x7f0 [ 156.029298][ C1] handle_softirqs+0xbf/0x280 [ 156.034006][ C1] run_ksoftirqd+0x1c/0x30 [ 156.038447][ C1] smpboot_thread_fn+0x31c/0x4c0 [ 156.043417][ C1] kthread+0x1d1/0x210 [ 156.047497][ C1] ret_from_fork+0x4b/0x60 [ 156.051931][ C1] ret_from_fork_asm+0x1a/0x30 [ 156.056707][ C1] [ 156.059039][ C1] value changed: 0x000000000006d061 -> 0x000000000006d062 [ 156.060926][ T2999] loop7: p4 size 81920 extends beyond EOD, [ 156.066139][ C1] [ 156.066147][ C1] Reported by Kernel Concurrency Sanitizer on: [ 156.066159][ C1] CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.13.0-rc5-syzkaller-00161-g63676eefb7a0 #0 [ 156.072849][ T2999] truncated [ 156.074347][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 156.104237][ C1] ================================================================== [ 156.500906][ T8125] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 157.930766][ C1] ================================================================== [ 157.938902][ C1] BUG: KCSAN: data-race in can_send / can_send [ 157.945094][ C1] [ 157.947426][ C1] read-write to 0xffff888117802470 of 8 bytes by interrupt on cpu 0: [ 157.955501][ C1] can_send+0x5b6/0x6d0 [ 157.959685][ C1] can_can_gw_rcv+0x77d/0x7e0 [ 157.964372][ C1] can_rcv_filter+0xbf/0x4c0 [ 157.969000][ C1] can_receive+0x182/0x1f0 [ 157.973447][ C1] can_rcv+0xe7/0x180 [ 157.977457][ C1] __netif_receive_skb+0x123/0x280 [ 157.982593][ C1] process_backlog+0x22e/0x440 [ 157.987383][ C1] __napi_poll+0x63/0x3c0 [ 157.991735][ C1] net_rx_action+0x3a1/0x7f0 [ 157.996367][ C1] handle_softirqs+0xbf/0x280 [ 158.001074][ C1] run_ksoftirqd+0x1c/0x30 [ 158.005510][ C1] smpboot_thread_fn+0x31c/0x4c0 [ 158.010476][ C1] kthread+0x1d1/0x210 [ 158.014556][ C1] ret_from_fork+0x4b/0x60 [ 158.018986][ C1] ret_from_fork_asm+0x1a/0x30 [ 158.023763][ C1] [ 158.026089][ C1] read-write to 0xffff888117802470 of 8 bytes by interrupt on cpu 1: [ 158.034171][ C1] can_send+0x5b6/0x6d0 [ 158.038365][ C1] can_can_gw_rcv+0x77d/0x7e0 [ 158.043064][ C1] can_rcv_filter+0xbf/0x4c0 [ 158.047680][ C1] can_receive+0x182/0x1f0 [ 158.052136][ C1] can_rcv+0xe7/0x180 [ 158.056152][ C1] __netif_receive_skb+0x123/0x280 [ 158.061284][ C1] process_backlog+0x22e/0x440 [ 158.066069][ C1] __napi_poll+0x63/0x3c0 [ 158.070414][ C1] net_rx_action+0x3a1/0x7f0 [ 158.075018][ C1] handle_softirqs+0xbf/0x280 [ 158.079721][ C1] run_ksoftirqd+0x1c/0x30 [ 158.084155][ C1] smpboot_thread_fn+0x31c/0x4c0 [ 158.089117][ C1] kthread+0x1d1/0x210 [ 158.093195][ C1] ret_from_fork+0x4b/0x60 [ 158.097614][ C1] ret_from_fork_asm+0x1a/0x30 [ 158.102389][ C1] [ 158.104736][ C1] value changed: 0x000000000000bcec -> 0x000000000000bced [ 158.111855][ C1] [ 158.114179][ C1] Reported by Kernel Concurrency Sanitizer on: [ 158.120329][ C1] CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.13.0-rc5-syzkaller-00161-g63676eefb7a0 #0 [ 158.130931][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 158.141001][ C1] ================================================================== [ 158.215634][ C0] ================================================================== [ 158.223762][ C0] BUG: KCSAN: data-race in can_send / can_send [ 158.229951][ C0] [ 158.232281][ C0] read-write to 0xffff888117802410 of 8 bytes by interrupt on cpu 1: [ 158.240351][ C0] can_send+0x5a2/0x6d0 [ 158.244532][ C0] can_can_gw_rcv+0x77d/0x7e0 [ 158.249234][ C0] can_rcv_filter+0xbf/0x4c0 [ 158.253868][ C0] can_receive+0x182/0x1f0 [ 158.258306][ C0] can_rcv+0xe7/0x180 [ 158.262420][ C0] __netif_receive_skb+0x123/0x280 [ 158.267547][ C0] process_backlog+0x22e/0x440 [ 158.272329][ C0] __napi_poll+0x63/0x3c0 [ 158.276677][ C0] net_rx_action+0x3a1/0x7f0 [ 158.281287][ C0] handle_softirqs+0xbf/0x280 [ 158.285990][ C0] run_ksoftirqd+0x1c/0x30 [ 158.290420][ C0] smpboot_thread_fn+0x31c/0x4c0 [ 158.295390][ C0] kthread+0x1d1/0x210 [ 158.299470][ C0] ret_from_fork+0x4b/0x60 [ 158.303900][ C0] ret_from_fork_asm+0x1a/0x30 [ 158.308688][ C0] [ 158.311012][ C0] read-write to 0xffff888117802410 of 8 bytes by interrupt on cpu 0: [ 158.319080][ C0] can_send+0x5a2/0x6d0 [ 158.323261][ C0] can_can_gw_rcv+0x77d/0x7e0 [ 158.327964][ C0] can_rcv_filter+0xbf/0x4c0 [ 158.332580][ C0] can_receive+0x182/0x1f0 [ 158.337035][ C0] can_rcv+0xe7/0x180 [ 158.341038][ C0] __netif_receive_skb+0x123/0x280 [ 158.346165][ C0] process_backlog+0x22e/0x440 [ 158.350949][ C0] __napi_poll+0x63/0x3c0 [ 158.355304][ C0] net_rx_action+0x3a1/0x7f0 [ 158.359916][ C0] handle_softirqs+0xbf/0x280 [ 158.364614][ C0] run_ksoftirqd+0x1c/0x30 [ 158.369135][ C0] smpboot_thread_fn+0x31c/0x4c0 [ 158.374099][ C0] kthread+0x1d1/0x210 [ 158.378179][ C0] ret_from_fork+0x4b/0x60 [ 158.382601][ C0] ret_from_fork_asm+0x1a/0x30 [ 158.387384][ C0] [ 158.389710][ C0] value changed: 0x0000000000662d77 -> 0x0000000000662d78 [ 158.396826][ C0] [ 158.399163][ C0] Reported by Kernel Concurrency Sanitizer on: [ 158.405334][ C0] CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Not tainted 6.13.0-rc5-syzkaller-00161-g63676eefb7a0 #0 [ 158.415955][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 158.426022][ C0] ================================================================== [ 158.483289][ C0] ================================================================== [ 158.491409][ C0] BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv [ 158.498630][ C0] [ 158.500950][ C0] read-write to 0xffff88811cdec020 of 4 bytes by interrupt on cpu 1: [ 158.509017][ C0] can_can_gw_rcv+0x7cb/0x7e0 [ 158.513714][ C0] can_rcv_filter+0xbf/0x4c0 [ 158.518330][ C0] can_receive+0x182/0x1f0 [ 158.522771][ C0] can_rcv+0xe7/0x180 [ 158.526780][ C0] __netif_receive_skb+0x123/0x280 [ 158.531921][ C0] process_backlog+0x22e/0x440 [ 158.536710][ C0] __napi_poll+0x63/0x3c0 [ 158.541056][ C0] net_rx_action+0x3a1/0x7f0 [ 158.545679][ C0] handle_softirqs+0xbf/0x280 [ 158.550377][ C0] run_ksoftirqd+0x1c/0x30 [ 158.554806][ C0] smpboot_thread_fn+0x31c/0x4c0 [ 158.559764][ C0] kthread+0x1d1/0x210 [ 158.563846][ C0] ret_from_fork+0x4b/0x60 [ 158.568270][ C0] ret_from_fork_asm+0x1a/0x30 [ 158.573054][ C0] [ 158.575382][ C0] read-write to 0xffff88811cdec020 of 4 bytes by interrupt on cpu 0: [ 158.583463][ C0] can_can_gw_rcv+0x7cb/0x7e0 [ 158.588160][ C0] can_rcv_filter+0xbf/0x4c0 [ 158.592779][ C0] can_receive+0x182/0x1f0 [ 158.597226][ C0] can_rcv+0xe7/0x180 [ 158.601249][ C0] __netif_receive_skb+0x123/0x280 [ 158.606380][ C0] process_backlog+0x22e/0x440 [ 158.611168][ C0] __napi_poll+0x63/0x3c0 [ 158.615520][ C0] net_rx_action+0x3a1/0x7f0 [ 158.620136][ C0] handle_softirqs+0xbf/0x280 [ 158.624841][ C0] do_softirq+0x5e/0x90 [ 158.629021][ C0] __local_bh_enable_ip+0x6e/0x70 [ 158.634067][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 158.639020][ C0] wg_packet_encrypt_worker+0x188/0xbb0 [ 158.644581][ C0] process_scheduled_works+0x483/0x9a0 [ 158.650076][ C0] worker_thread+0x51d/0x6f0 [ 158.654691][ C0] kthread+0x1d1/0x210 [ 158.658762][ C0] ret_from_fork+0x4b/0x60 [ 158.663203][ C0] ret_from_fork_asm+0x1a/0x30 [ 158.668007][ C0] [ 158.670330][ C0] value changed: 0x00669757 -> 0x00669759 [ 158.676056][ C0] [ 158.678376][ C0] Reported by Kernel Concurrency Sanitizer on: [ 158.684536][ C0] CPU: 0 UID: 0 PID: 9 Comm: kworker/0:1 Not tainted 6.13.0-rc5-syzkaller-00161-g63676eefb7a0 #0 [ 158.695048][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 158.705112][ C0] Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker [ 158.711627][ C0] ================================================================== [ 158.721318][ C0] ================================================================== [ 158.729421][ C0] BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter [ 158.736656][ C0] [ 158.738987][ C0] read-write to 0xffff888101dc82e8 of 8 bytes by interrupt on cpu 1: [ 158.747075][ C0] can_rcv_filter+0xd1/0x4c0 [ 158.751694][ C0] can_receive+0x182/0x1f0 [ 158.756132][ C0] can_rcv+0xe7/0x180 [ 158.760160][ C0] __netif_receive_skb+0x123/0x280 [ 158.765300][ C0] process_backlog+0x22e/0x440 [ 158.770072][ C0] __napi_poll+0x63/0x3c0 [ 158.774412][ C0] net_rx_action+0x3a1/0x7f0 [ 158.779018][ C0] handle_softirqs+0xbf/0x280 [ 158.783823][ C0] run_ksoftirqd+0x1c/0x30 [ 158.788248][ C0] smpboot_thread_fn+0x31c/0x4c0 [ 158.793209][ C0] kthread+0x1d1/0x210 [ 158.797289][ C0] ret_from_fork+0x4b/0x60 [ 158.801712][ C0] ret_from_fork_asm+0x1a/0x30 [ 158.806515][ C0] [ 158.808841][ C0] read-write to 0xffff888101dc82e8 of 8 bytes by interrupt on cpu 0: [ 158.816921][ C0] can_rcv_filter+0xd1/0x4c0 [ 158.821540][ C0] can_receive+0x182/0x1f0 [ 158.825981][ C0] can_rcv+0xe7/0x180 [ 158.830012][ C0] __netif_receive_skb+0x123/0x280 [ 158.835141][ C0] process_backlog+0x22e/0x440 [ 158.839936][ C0] __napi_poll+0x63/0x3c0 [ 158.844277][ C0] net_rx_action+0x3a1/0x7f0 [ 158.848880][ C0] handle_softirqs+0xbf/0x280 [ 158.853574][ C0] do_softirq+0x5e/0x90 [ 158.857753][ C0] __local_bh_enable_ip+0x6e/0x70 [ 158.862808][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 158.867761][ C0] batadv_nc_purge_paths+0x220/0x270 [ 158.873066][ C0] batadv_nc_worker+0x3db/0xad0 [ 158.877935][ C0] process_scheduled_works+0x483/0x9a0 [ 158.883415][ C0] worker_thread+0x51d/0x6f0 [ 158.888032][ C0] kthread+0x1d1/0x210 [ 158.892106][ C0] ret_from_fork+0x4b/0x60 [ 158.896528][ C0] ret_from_fork_asm+0x1a/0x30 [ 158.901301][ C0] [ 158.903627][ C0] value changed: 0x000000000066fd37 -> 0x000000000066fd38 [ 158.910821][ C0] [ 158.913148][ C0] Reported by Kernel Concurrency Sanitizer on: [ 158.919307][ C0] CPU: 0 UID: 0 PID: 58 Comm: kworker/u8:4 Not tainted 6.13.0-rc5-syzkaller-00161-g63676eefb7a0 #0 [ 158.930001][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 158.940069][ C0] Workqueue: bat_events batadv_nc_worker [ 158.945722][ C0] ================================================================== [ 158.956119][ C0] ================================================================== [ 158.964223][ C0] BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter [ 158.971463][ C0] [ 158.973797][ C0] read-write to 0xffff88810121c3d8 of 8 bytes by interrupt on cpu 1: [ 158.981873][ C0] can_rcv_filter+0x3a9/0x4c0 [ 158.986583][ C0] can_receive+0x182/0x1f0 [ 158.991036][ C0] can_rcv+0xe7/0x180 [ 158.995043][ C0] __netif_receive_skb+0x123/0x280 [ 159.000177][ C0] process_backlog+0x22e/0x440 [ 159.004964][ C0] __napi_poll+0x63/0x3c0 [ 159.009313][ C0] net_rx_action+0x3a1/0x7f0 [ 159.013927][ C0] handle_softirqs+0xbf/0x280 [ 159.018632][ C0] do_softirq+0x5e/0x90 [ 159.022817][ C0] __local_bh_enable_ip+0x6e/0x70 [ 159.027873][ C0] update_defense_level+0x575/0x5b0 [ 159.033093][ C0] defense_work_handler+0x1f/0x80 [ 159.038142][ C0] process_scheduled_works+0x483/0x9a0 [ 159.043624][ C0] worker_thread+0x51d/0x6f0 [ 159.048240][ C0] kthread+0x1d1/0x210 [ 159.052325][ C0] ret_from_fork+0x4b/0x60 [ 159.056764][ C0] ret_from_fork_asm+0x1a/0x30 [ 159.061539][ C0] [ 159.063865][ C0] read-write to 0xffff88810121c3d8 of 8 bytes by interrupt on cpu 0: [ 159.071964][ C0] can_rcv_filter+0x3a9/0x4c0 [ 159.076666][ C0] can_receive+0x182/0x1f0 [ 159.081112][ C0] can_rcv+0xe7/0x180 [ 159.085122][ C0] __netif_receive_skb+0x123/0x280 [ 159.090248][ C0] process_backlog+0x22e/0x440 [ 159.095028][ C0] __napi_poll+0x63/0x3c0 [ 159.099378][ C0] net_rx_action+0x3a1/0x7f0 [ 159.103985][ C0] handle_softirqs+0xbf/0x280 [ 159.108697][ C0] do_softirq+0x5e/0x90 [ 159.112880][ C0] __local_bh_enable_ip+0x6e/0x70 [ 159.117928][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 159.122888][ C0] batadv_nc_purge_paths+0x220/0x270 [ 159.128186][ C0] batadv_nc_worker+0x3db/0xad0 [ 159.133052][ C0] process_scheduled_works+0x483/0x9a0 [ 159.138535][ C0] worker_thread+0x51d/0x6f0 [ 159.143150][ C0] kthread+0x1d1/0x210 [ 159.147228][ C0] ret_from_fork+0x4b/0x60 [ 159.151656][ C0] ret_from_fork_asm+0x1a/0x30 [ 159.156434][ C0] [ 159.158763][ C0] value changed: 0x00000000000c922c -> 0x00000000000c922e [ 159.165873][ C0] [ 159.168204][ C0] Reported by Kernel Concurrency Sanitizer on: [ 159.174374][ C0] CPU: 0 UID: 0 PID: 58 Comm: kworker/u8:4 Not tainted 6.13.0-rc5-syzkaller-00161-g63676eefb7a0 #0 [ 159.185060][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 159.195126][ C0] Workqueue: bat_events batadv_nc_worker [ 159.200779][ C0] ================================================================== [ 160.980493][ C1] ================================================================== [ 160.988713][ C1] BUG: KCSAN: data-race in can_send / can_send [ 160.994912][ C1] [ 160.997244][ C1] read-write to 0xffff888117802470 of 8 bytes by interrupt on cpu 0: [ 161.005321][ C1] can_send+0x5b6/0x6d0 [ 161.009499][ C1] can_can_gw_rcv+0x77d/0x7e0 [ 161.014185][ C1] can_rcv_filter+0xbf/0x4c0 [ 161.018803][ C1] can_receive+0x182/0x1f0 [ 161.023241][ C1] can_rcv+0xe7/0x180 [ 161.027243][ C1] __netif_receive_skb+0x123/0x280 [ 161.032393][ C1] process_backlog+0x22e/0x440 [ 161.037178][ C1] __napi_poll+0x63/0x3c0 [ 161.041527][ C1] net_rx_action+0x3a1/0x7f0 [ 161.046138][ C1] handle_softirqs+0xbf/0x280 [ 161.050871][ C1] run_ksoftirqd+0x1c/0x30 [ 161.055299][ C1] smpboot_thread_fn+0x31c/0x4c0 [ 161.060254][ C1] kthread+0x1d1/0x210 [ 161.064323][ C1] ret_from_fork+0x4b/0x60 [ 161.068747][ C1] ret_from_fork_asm+0x1a/0x30 [ 161.073523][ C1] [ 161.075847][ C1] read-write to 0xffff888117802470 of 8 bytes by interrupt on cpu 1: [ 161.083920][ C1] can_send+0x5b6/0x6d0 [ 161.088098][ C1] can_can_gw_rcv+0x77d/0x7e0 [ 161.092804][ C1] can_rcv_filter+0xbf/0x4c0 [ 161.097436][ C1] can_receive+0x182/0x1f0 [ 161.101901][ C1] can_rcv+0xe7/0x180 [ 161.105930][ C1] __netif_receive_skb+0x123/0x280 [ 161.111067][ C1] process_backlog+0x22e/0x440 [ 161.115855][ C1] __napi_poll+0x63/0x3c0 [ 161.120210][ C1] net_rx_action+0x3a1/0x7f0 [ 161.124839][ C1] handle_softirqs+0xbf/0x280 [ 161.129542][ C1] run_ksoftirqd+0x1c/0x30 [ 161.133987][ C1] smpboot_thread_fn+0x31c/0x4c0 [ 161.138956][ C1] kthread+0x1d1/0x210 [ 161.143040][ C1] ret_from_fork+0x4b/0x60 [ 161.147465][ C1] ret_from_fork_asm+0x1a/0x30 [ 161.152257][ C1] [ 161.154587][ C1] value changed: 0x000000000000f442 -> 0x000000000000f444 [ 161.161708][ C1] [ 161.164043][ C1] Reported by Kernel Concurrency Sanitizer on: [ 161.170204][ C1] CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.13.0-rc5-syzkaller-00161-g63676eefb7a0 #0 [ 161.180810][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 161.190874][ C1] ================================================================== [ 161.221900][ C1] ================================================================== [ 161.230046][ C1] BUG: KCSAN: data-race in can_send / can_send [ 161.236238][ C1] [ 161.238565][ C1] read-write to 0xffff888117802410 of 8 bytes by interrupt on cpu 0: [ 161.246638][ C1] can_send+0x5a2/0x6d0 [ 161.250823][ C1] can_can_gw_rcv+0x77d/0x7e0 [ 161.255521][ C1] can_rcv_filter+0xbf/0x4c0 [ 161.260147][ C1] can_receive+0x182/0x1f0 [ 161.264592][ C1] can_rcv+0xe7/0x180 [ 161.268598][ C1] __netif_receive_skb+0x123/0x280 [ 161.273731][ C1] process_backlog+0x22e/0x440 [ 161.278542][ C1] __napi_poll+0x63/0x3c0 [ 161.282888][ C1] net_rx_action+0x3a1/0x7f0 [ 161.287503][ C1] handle_softirqs+0xbf/0x280 [ 161.292213][ C1] do_softirq+0x5e/0x90 [ 161.296400][ C1] __local_bh_enable_ip+0x6e/0x70 [ 161.301453][ C1] _raw_read_unlock_bh+0x1b/0x20 [ 161.306414][ C1] ipv6_get_lladdr+0x116/0x150 [ 161.311191][ C1] mld_newpack+0x1ea/0x4f0 [ 161.315628][ C1] add_grec+0xa07/0xbd0 [ 161.319802][ C1] mld_ifc_work+0x16d/0x7e0 [ 161.324318][ C1] process_scheduled_works+0x483/0x9a0 [ 161.329809][ C1] worker_thread+0x51d/0x6f0 [ 161.334423][ C1] kthread+0x1d1/0x210 [ 161.338494][ C1] ret_from_fork+0x4b/0x60 [ 161.342917][ C1] ret_from_fork_asm+0x1a/0x30 [ 161.347706][ C1] [ 161.350034][ C1] read-write to 0xffff888117802410 of 8 bytes by interrupt on cpu 1: [ 161.358109][ C1] can_send+0x5a2/0x6d0 [ 161.362294][ C1] can_can_gw_rcv+0x77d/0x7e0 [ 161.366989][ C1] can_rcv_filter+0xbf/0x4c0 [ 161.371607][ C1] can_receive+0x182/0x1f0 [ 161.376062][ C1] can_rcv+0xe7/0x180 [ 161.380069][ C1] __netif_receive_skb+0x123/0x280 [ 161.385196][ C1] process_backlog+0x22e/0x440 [ 161.389981][ C1] __napi_poll+0x63/0x3c0 [ 161.394325][ C1] net_rx_action+0x3a1/0x7f0 [ 161.398932][ C1] handle_softirqs+0xbf/0x280 [ 161.403626][ C1] run_ksoftirqd+0x1c/0x30 [ 161.408050][ C1] smpboot_thread_fn+0x31c/0x4c0 [ 161.413010][ C1] kthread+0x1d1/0x210 [ 161.417085][ C1] ret_from_fork+0x4b/0x60 [ 161.421525][ C1] ret_from_fork_asm+0x1a/0x30 [ 161.426313][ C1] [ 161.428634][ C1] value changed: 0x00000000006bcbd8 -> 0x00000000006bcbd9 [ 161.435755][ C1] [ 161.438085][ C1] Reported by Kernel Concurrency Sanitizer on: [ 161.444235][ C1] CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.13.0-rc5-syzkaller-00161-g63676eefb7a0 #0 [ 161.454830][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 161.464893][ C1] ================================================================== [ 161.506771][ C0] ================================================================== [ 161.514886][ C0] BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv [ 161.522121][ C0] [ 161.524447][ C0] read-write to 0xffff88811cdec020 of 4 bytes by interrupt on cpu 1: [ 161.532513][ C0] can_can_gw_rcv+0x7cb/0x7e0 [ 161.537220][ C0] can_rcv_filter+0xbf/0x4c0 [ 161.541838][ C0] can_receive+0x182/0x1f0 [ 161.546285][ C0] can_rcv+0xe7/0x180 [ 161.550296][ C0] __netif_receive_skb+0x123/0x280 [ 161.555429][ C0] process_backlog+0x22e/0x440 [ 161.560209][ C0] __napi_poll+0x63/0x3c0 [ 161.564550][ C0] net_rx_action+0x3a1/0x7f0 [ 161.569166][ C0] handle_softirqs+0xbf/0x280 [ 161.573965][ C0] do_softirq+0x5e/0x90 [ 161.578152][ C0] __local_bh_enable_ip+0x6e/0x70 [ 161.583200][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 161.588177][ C0] wg_packet_encrypt_worker+0x188/0xbb0 [ 161.593760][ C0] process_scheduled_works+0x483/0x9a0 [ 161.599233][ C0] worker_thread+0x51d/0x6f0 [ 161.603851][ C0] kthread+0x1d1/0x210 [ 161.607931][ C0] ret_from_fork+0x4b/0x60 [ 161.612361][ C0] ret_from_fork_asm+0x1a/0x30 [ 161.617142][ C0] [ 161.619475][ C0] read-write to 0xffff88811cdec020 of 4 bytes by interrupt on cpu 0: [ 161.627545][ C0] can_can_gw_rcv+0x7cb/0x7e0 [ 161.632238][ C0] can_rcv_filter+0xbf/0x4c0 [ 161.636859][ C0] can_receive+0x182/0x1f0 [ 161.641304][ C0] can_rcv+0xe7/0x180 [ 161.645309][ C0] __netif_receive_skb+0x123/0x280 [ 161.650435][ C0] process_backlog+0x22e/0x440 [ 161.655220][ C0] __napi_poll+0x63/0x3c0 [ 161.659572][ C0] net_rx_action+0x3a1/0x7f0 [ 161.664185][ C0] handle_softirqs+0xbf/0x280 [ 161.668884][ C0] do_softirq+0x5e/0x90 [ 161.673069][ C0] __local_bh_enable_ip+0x6e/0x70 [ 161.678117][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 161.683080][ C0] nsim_dev_trap_report_work+0x522/0x620 [ 161.688760][ C0] process_scheduled_works+0x483/0x9a0 [ 161.694247][ C0] worker_thread+0x51d/0x6f0 [ 161.698860][ C0] kthread+0x1d1/0x210 [ 161.702941][ C0] ret_from_fork+0x4b/0x60 [ 161.707358][ C0] ret_from_fork_asm+0x1a/0x30 [ 161.712138][ C0] [ 161.714464][ C0] value changed: 0x006c28de -> 0x006c28df [ 161.720177][ C0] [ 161.722499][ C0] Reported by Kernel Concurrency Sanitizer on: [ 161.728668][ C0] CPU: 0 UID: 0 PID: 6310 Comm: kworker/u8:20 Not tainted 6.13.0-rc5-syzkaller-00161-g63676eefb7a0 #0 [ 161.739620][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 161.749683][ C0] Workqueue: events_unbound nsim_dev_trap_report_work [ 161.756478][ C0] ================================================================== [ 161.777864][ C1] ================================================================== [ 161.785983][ C1] BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter [ 161.793231][ C1] [ 161.795558][ C1] read-write to 0xffff888101dc82e8 of 8 bytes by interrupt on cpu 0: [ 161.803634][ C1] can_rcv_filter+0xd1/0x4c0 [ 161.808252][ C1] can_receive+0x182/0x1f0 [ 161.812689][ C1] can_rcv+0xe7/0x180 [ 161.816705][ C1] __netif_receive_skb+0x123/0x280 [ 161.821839][ C1] process_backlog+0x22e/0x440 [ 161.826634][ C1] __napi_poll+0x63/0x3c0 [ 161.830994][ C1] net_rx_action+0x3a1/0x7f0 [ 161.835600][ C1] handle_softirqs+0xbf/0x280 [ 161.840314][ C1] do_softirq+0x5e/0x90 [ 161.844496][ C1] __local_bh_enable_ip+0x6e/0x70 [ 161.849551][ C1] update_defense_level+0x575/0x5b0 [ 161.854773][ C1] defense_work_handler+0x1f/0x80 [ 161.859818][ C1] process_scheduled_works+0x483/0x9a0 [ 161.865305][ C1] worker_thread+0x51d/0x6f0 [ 161.869917][ C1] kthread+0x1d1/0x210 [ 161.873999][ C1] ret_from_fork+0x4b/0x60 [ 161.878429][ C1] ret_from_fork_asm+0x1a/0x30 [ 161.883203][ C1] [ 161.885531][ C1] read-write to 0xffff888101dc82e8 of 8 bytes by interrupt on cpu 1: [ 161.893616][ C1] can_rcv_filter+0xd1/0x4c0 [ 161.898224][ C1] can_receive+0x182/0x1f0 [ 161.902664][ C1] can_rcv+0xe7/0x180