last executing test programs: 7m30.967020151s ago: executing program 3 (id=177): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r0, 0x0, 0x29, 0x2000000, @val=@uprobe_multi={0x0, 0x0}}, 0x40) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000005600)='sys_enter\x00', r2, 0x0, 0x2}, 0x18) setresgid(0x0, 0x0, 0xee01) 7m30.966274041s ago: executing program 3 (id=178): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r3}, 0x10) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x10, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffff9}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@call={0x85, 0x0, 0x0, 0x2a}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0xa, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0xffffffffffffff34, &(0x7f0000000080)={0x0, 0xb8}}, 0x0) getsockname$packet(r1, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000000)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="34000000100081eee80000040000000010000000", @ANYRES32=r6, @ANYBLOB="ddfffffdff000000140012000c000100627269646765"], 0x34}}, 0x0) (async) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r1, 0x4018f50b, &(0x7f0000000380)={0x1, 0x8b9, 0x1ff}) (async, rerun: 32) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000400)=@ipv4_newaddr={0x28, 0x14, 0x1, 0x0, 0x0, {0x2, 0x0, 0x42, 0xff, r6}, [@IFA_LOCAL={0x8, 0x2, @local}, @IFA_FLAGS={0x8, 0x8, 0xa}]}, 0x28}}, 0x0) (async, rerun: 32) r7 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r7, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local}, 0xc) r8 = socket(0x10, 0x803, 0x4) sendmsg$nl_route(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1c}, 0x1, 0x0, 0x0, 0x20088814}, 0x0) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r9}, 0x4) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r10}, 0x10) io_uring_setup(0x6c4, 0x0) (async, rerun: 64) ioctl$SG_BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) (async, rerun: 64) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) (async) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) (async) r11 = gettid() tkill(r11, 0x12) unshare(0x8000000) 7m30.908297876s ago: executing program 3 (id=179): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32=0x0, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a0000000000008500000006000000"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x40f00, 0x8}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3e, 0x0, 0x0, 0x0}, 0x94) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000000080)=0xfffffff7, 0x4) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x21, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x200000d1) r1 = getpid() process_vm_readv(r1, 0x0, 0x0, 0x0, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000000e40)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @local, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="24000000000000002900000032000000ff"], 0x28, 0x7ffffff7}}], 0x1, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff0000/0x2000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ff8000/0x3000)=nil, 0x0}, 0x68) prlimit64(0x0, 0xe, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000002c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r3}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) poll(0x0, 0x0, 0x28f) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e00000011008b88040f80ec59acbc0413a1f8480f0000005e2900421803001825000a001400000002800000121f", 0x2e}], 0x1}, 0x0) r4 = io_uring_setup(0x5, &(0x7f0000000040)={0x0, 0x7b19, 0xc000, 0x0, 0x38}) io_uring_enter(r4, 0x0, 0x2980, 0x12, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) mq_timedsend(r5, &(0x7f00000001c0)="df083077b7c652a88e75c8cd15875037088a7f1210f601e2fde130d810befc77c92b57eb331468ac2e6e0678cc6fd898be473f9fc5148adf652e56293a2a7a384e844b92c21dc8ebc37529cda2086a1d44f227b7bd1c6247b37f486e376fc5c47780a42069820bb37b3304e5afd64629e94a5fdda6abba5f34bdc1d00ad3ff21", 0x80, 0x4, &(0x7f0000000280)={r6, r7+10000000}) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r8, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) 7m30.212030532s ago: executing program 3 (id=198): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f0000000200)={[{@noblock_validity}, {}, {@sysvgroups}, {@resuid={'resuid', 0x3d, 0xee01}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@orlov}, {@nogrpid}, {@noauto_da_alloc}, {@nomblk_io_submit}]}, 0x3, 0x56a, &(0x7f00000015c0)="$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") r0 = syz_clone(0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(r0, &(0x7f0000000040)='attr/exec\x00') writev(r1, &(0x7f0000000240)=[{&(0x7f00000004c0)='\n', 0x1}], 0x1) ioctl$USBDEVFS_SETINTERFACE(r1, 0x80085504, &(0x7f0000000000)={0x1, 0x4}) r2 = open(&(0x7f00000001c0)='./file1\x00', 0x14927e, 0x20) fallocate(r2, 0x0, 0x0, 0x1001f0) 7m30.072663243s ago: executing program 3 (id=201): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x8, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x1, &(0x7f0000000040)=0x4) ioprio_get$pid(0x2, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1000001, 0x10012, r1, 0x1000) fsync(r1) ioctl$NS_GET_OWNER_UID(r1, 0xb704, &(0x7f0000000400)) r3 = socket$inet(0x2, 0x4, 0xfffffff1) io_uring_register$IORING_REGISTER_CLONE_BUFFERS(r1, 0x1e, &(0x7f0000000080)={r3}, 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) open(&(0x7f0000000740)='./bus\x00', 0x143c62, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mount(&(0x7f0000000100), &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000300)='trans=rdma,') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) r5 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r5, 0x1, 0x3c, &(0x7f00000002c0)={0x1, 0x2}, 0x8) sendto$inet6(r5, 0x0, 0x5c4, 0x404c844, &(0x7f0000000540)={0x2, 0x4e24, 0x0, @local, 0x4000000}, 0x1c) 7m29.829210163s ago: executing program 3 (id=204): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) r2 = creat(0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) copy_file_range(0xffffffffffffffff, &(0x7f00000008c0)=0xfffffffffffffffc, r2, 0x0, 0x3, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00'}, 0x9) creat(&(0x7f0000000100)='./file0\x00', 0xd931d3864d39dcca) sched_setscheduler(0x0, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2010008, &(0x7f00000001c0), 0xff, 0x53b, &(0x7f0000000b80)="$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") sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="1830000012800000000000000300000095"], &(0x7f00000001c0)='syzkaller\x00', 0x9, 0x99, &(0x7f0000000240)=""/153, 0x0, 0x42}, 0x94) syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000000), 0x20000007d, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x4, @tid=r4}, &(0x7f0000bbdffc)) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000300)={0x1, 0x2, 0x7ff, 0x9, r4}) 7m29.828860533s ago: executing program 32 (id=204): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) socket$nl_route(0x10, 0x3, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) r2 = creat(0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) copy_file_range(0xffffffffffffffff, &(0x7f00000008c0)=0xfffffffffffffffc, r2, 0x0, 0x3, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00'}, 0x9) creat(&(0x7f0000000100)='./file0\x00', 0xd931d3864d39dcca) sched_setscheduler(0x0, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2010008, &(0x7f00000001c0), 0xff, 0x53b, &(0x7f0000000b80)="$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") sendmsg$TIPC_NL_KEY_SET(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="1830000012800000000000000300000095"], &(0x7f00000001c0)='syzkaller\x00', 0x9, 0x99, &(0x7f0000000240)=""/153, 0x0, 0x42}, 0x94) syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000000), 0x20000007d, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x4, @tid=r4}, &(0x7f0000bbdffc)) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000300)={0x1, 0x2, 0x7ff, 0x9, r4}) 7m6.150735261s ago: executing program 0 (id=573): ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) r1 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000300)={0x1f, 0x0, @none}, &(0x7f0000000140)=0xe, 0x80000) accept4$bt_l2cap(r1, &(0x7f0000000240)={0x1f, 0x0, @none}, &(0x7f0000000280)=0xe, 0x800) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f00000001c0)='kfree\x00', r2}, 0x18) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r3}, 0x10) syz_io_uring_setup(0x111, &(0x7f0000000340)={0x0, 0x11, 0x2, 0x4}, 0x0, 0x0) 7m5.241429404s ago: executing program 0 (id=586): r0 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a000020095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000980)='kfree\x00', r1}, 0x18) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42031, 0xffffffffffffffff, 0x0) rt_sigaction(0xd, 0x0, 0xfffffffffffffffd, 0x8, &(0x7f0000000540)) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0) pwritev2(r0, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x76200}], 0x1, 0x7c00, 0x0, 0x3) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x143a82, 0x8) r3 = dup(r2) r4 = open(0x0, 0x40542, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) 7m5.223756246s ago: executing program 0 (id=587): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x4000, &(0x7f00000001c0), 0x1, 0x4bc, &(0x7f0000000a40)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001440)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x182) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x181242, 0x148) pwrite64(r3, &(0x7f0000000140)='2', 0xfdef, 0xfecc) fallocate(r2, 0x0, 0xbf5, 0x2000402) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000040)={0xc, r2, 0x0, 0x0, 0x0, 0xfffffffffdffffff}) 7m5.125497974s ago: executing program 0 (id=589): syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x20c006, &(0x7f0000000480)={[{@nomblk_io_submit}, {@mblk_io_submit}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@lazytime}, {@discard}, {@nojournal_checksum}], [{@seclabel}]}, 0x1, 0x45f, &(0x7f0000000c80)="$eJzs3M9vVFUbAOD33pkC/eCTkSDKD7WKBqKxhYLIwg1GExeamOgCl7UtBBmooTURQhSNwaUhcW9cmvgXuNKNUVcmbnVvSIjpBtTNmNu5t52ZTkunnXZq53mSC+fce6bnvPfeM3PuOZ0G0LeGsn+SiF0R8VtE7K5nmwsM1f+7N3t9/K/Z6+NJ1Gpv/pnMlbs7e328KFq8bmeRKUeknyZxsE2901evXRyrViev5PmRmUvvjUxfvfbchUtj5yfPT14ePX365InjL5wafb4rcWZx3T3w4dSh/a++fev18bO33vnpm6SIvyWOiNjRhSqHljv4dK3WhSo2j/83pJNyDxtCR0r1bhoDc/1/d5Ri4eLtjlc+6WnjgHVVq9Vq+/L+38aNGrCFJdHrFgC9UXzQZ8+/xbaBw4+eu3Om/gCUxX0v3+pHypHmZQZanm+7aSgizt74+8tsi8XzEAAAXffdmYgjh/PxX9PCTxr7GnIP5GsolYh4MCL2RMSpiNgbEQ9FzJV9OCIe6bD+1kWSxeOf9HaHP7Ij2fjvxXxtq3n8V4z+olKK+KcYLldiIDl3oTp5LD8nR2Nge5Zfbnz4/cu/fr7UscbxX7Zl9Rdjwbwdt8vbm18zMTYztpaYG935OOJAuV38yfxKQHZb7I+IA6us48IzXx9a6tj942+2rTHThXWm2lcRR+rX/0a0xF9Ill+fHNkR1cljI8VdsdjPv9x8Y6n6O42/27Lrn7a9/+fjrySN67XTnddx8/fPlnymWe39vy15q2nfB2MzM1eOR2xLXqs3unH/aEu50YXyWfxHD7fv/3ti4UwcjIjsJn40Ih6LiMfztj8REU9GxOFl4v/xpafebd6TdBD/+srin+jo+i8kBvMCbQ41JUoXf/i2qdLKQnJl1//kXOpovmcl73/LNKcpsZZzBwAAAP8VaUTsiiQdnk+n6fBw/Xf498b/0urU9Myz56bevzxR/45AJQbSYqarPh9cnw89nj/WF/nRlvyJfN74i9LgXH54fKo60evgoc/tXKL/Z/4o9bp1wLpbxTqar3jBFqEzQ//S/6F/6f/Qv8qLU4O9aguwsdp9/n/Ug3YAG6+l/1v2gz7i+R/6l/4P/Uv/h740PRj3/5L8Zk3s2BzN2NKJYiFo0aFIe9ewYoZqE5yftSUGV/yHKjY80cM3JQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgC76NwAA//8lJN+h") syz_clone3(&(0x7f0000000780)={0x1c3002480, 0x0, 0x0, 0x0, {0x2b}, 0x0, 0x0, 0x0, 0x0}, 0x58) (async) r0 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) (async) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000180)='sys_enter\x00'}, 0x10) (async) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'veth1_to_batadv\x00', 0x0}) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r0, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0], 0x0, 0x5b, &(0x7f00000002c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0xac, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r4 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r5 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r5, 0x402, 0x8000003d) (async) close_range(r4, r5, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x10, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x80000001}, [@jmp={0x5, 0x0, 0xd, 0xa, 0x8, 0xfffffffffffffffc}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x0, 0x0, 0x41000, 0x7b, '\x00', r2, @sk_msg=0x7, r0, 0x8, &(0x7f0000000100)={0x9, 0x4}, 0x8, 0x10, 0x0, 0x0, r3, r0, 0x0, &(0x7f0000000500)=[r0, r0, r0, r0, r0, r0, r0, r4, r0, r0], 0x0, 0x10, 0x6}, 0x94) (async) utimensat(0xffffffffffffff9c, &(0x7f0000000300)='.\x00', 0x0, 0x0) (async) r6 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r6) (async) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) (async) ptrace(0x10, r6) 7m4.095102006s ago: executing program 0 (id=605): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x20, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x73cea2d47785b264, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r1}, 0x18) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r2}, 0x10) unshare(0x2c060000) unshare(0x2c020400) (fail_nth: 6) 7m2.602973576s ago: executing program 0 (id=620): socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000080)=0x10000, 0x4) (fail_nth: 3) 7m2.602771676s ago: executing program 33 (id=620): socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000080)=0x10000, 0x4) (fail_nth: 3) 4m30.764826612s ago: executing program 1 (id=2161): truncate(0x0, 0x8000c00) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xb, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001140)={&(0x7f0000000080)='sched_switch\x00', r0, 0x0, 0x10001}, 0x14) r1 = syz_open_dev$usbmon(&(0x7f0000000900), 0x7, 0x1a3100) ioctl$MON_IOCX_MFETCH(r1, 0xc0109207, &(0x7f0000000080)={0x0}) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) r2 = gettid() rt_sigaction(0x16, &(0x7f0000000080)={0x0, 0x90000000, 0x0}, 0x0, 0x8, &(0x7f0000000200)) tkill(r2, 0x16) syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r7 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r7, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) r9 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r9, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2c}}, 0x10) sendmmsg$inet(r9, &(0x7f0000003cc0)=[{{&(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="14000000000000000000000007"], 0x18}}], 0x1, 0x44008004) write$binfmt_misc(r9, 0x0, 0x0) readv(r7, 0x0, 0x0) r10 = socket$kcm(0x10, 0x2, 0x4) close(r10) socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r10, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000140)="5c000000130025cc9e3be35c6e17aa31076b876c1d0000007ea60864160af36514000cc00800250007000200060019c00364bc24eab556a705251e618294ff0051f60a84c9f4d4938037e786a6d0001000000e4509c5bbcd72c6c953", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000009c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0xfffffffe, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ip6erspan={{0xe}, {0x8, 0x2, 0x0, 0x1, [@IFLA_GRE_COLLECT_METADATA={0x4}]}}}, @IFLA_MASTER={0x8, 0x3, r5}]}, 0x44}}, 0x40000c0) 4m30.431172448s ago: executing program 1 (id=2165): sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"/686], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3a, 0x10, &(0x7f0000000340), 0xd58495bc, 0x0, 0xffffffffffffffff, 0xffffffffffffff5b}, 0x42) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000c80)={r4, 0x2000000, 0xfe7f, 0x0, &(0x7f0000000c40)="63eced8e46dc3f2ddf33c9e9b986", 0x0, 0x7ffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x14, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x42, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x52, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffea4, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='sys_enter\x00', r7}, 0x10) linkat(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0, 0x400) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = syz_open_procfs(0x0, &(0x7f0000000180)='net/kcm\x00') preadv(r9, &(0x7f0000000140)=[{&(0x7f0000000000)=""/151, 0x97}], 0x1, 0xd, 0x0) unshare(0x64000680) 4m29.541468239s ago: executing program 1 (id=2178): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x6, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000000000000850000001c00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0x53, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x1e) (fail_nth: 7) 4m29.243026273s ago: executing program 1 (id=2179): capset(&(0x7f0000000380)={0x20080522}, &(0x7f0000000040)={0x200000, 0x40200003, 0x0, 0x6, 0x7}) eventfd(0x4) setrlimit(0x40000000000008, &(0x7f0000000080)={0x0, 0x6}) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x8401) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x2) readv(r2, &(0x7f0000000000)=[{&(0x7f0000001300)=""/244, 0x940}], 0x1) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) 4m29.166021309s ago: executing program 1 (id=2181): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104, 0xb008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0xfc, 0x0, 0x7ffc0002}]}) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_setup(0x59e6, &(0x7f0000000240)={0x0, 0x2ed3, 0x2, 0x2, 0x1e5}, &(0x7f0000000080)=0x0, &(0x7f00000001c0)) syz_io_uring_submit(r1, 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x2, &(0x7f0000002400)=0x0) io_submit(r4, 0x1, &(0x7f0000000040)=[&(0x7f00000010c0)={0x0, 0x0, 0x0, 0x5, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x2}]) ptrace$setregs(0xd, r2, 0x0, 0x0) modify_ldt$write(0x1, &(0x7f0000000040)={0x806, 0x100000}, 0x10) syz_clone(0x26801000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x49a, &(0x7f00000000c0)={0x0, 0x3d5b, 0x3180, 0x2, 0x400252}, &(0x7f0000000340), &(0x7f0000000300)) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_netdev_private(r5, 0x8946, &(0x7f0000000a00)="4749c2368bb8dd2c7f17323cf53a") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00'}, 0x10) 4m28.990995414s ago: executing program 1 (id=2182): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x808003, &(0x7f0000000000), 0x3, 0x4fc, &(0x7f0000001500)="$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") openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xa0242, 0x0) r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) fcntl$dupfd(r0, 0x406, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x9, 0x7, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0x10, 0x2, 0x4) syz_emit_ethernet(0x0, 0x0, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) openat$binfmt_register(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f3, &(0x7f0000000180)={'sit0\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x3c, 0x14, 0x0, 0x1000, 0xfd, 0x89, 0x0, @multicast1, @multicast2}}}}) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xc, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={r4, 0xf}, &(0x7f0000000100)=0x8) r5 = syz_open_procfs(0x0, &(0x7f00000003c0)='fd/3\x00') mount$9p_fd(0x0, &(0x7f0000000100)='.\x00', &(0x7f0000000040), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r5}}) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f00000000c0)=@req3={0xffab, 0xa, 0x9, 0x803, 0x4, 0xfffffffd, 0xc9}, 0x1c) socket$inet_icmp(0x2, 0x2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe4, &(0x7f0000000100)=[{}, {}], 0x10, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x55, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) setsockopt$packet_drop_memb(r6, 0x107, 0x2, &(0x7f0000000340)={r7, 0x1, 0x6, @broadcast}, 0x10) 4m14.021256355s ago: executing program 34 (id=2182): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x808003, &(0x7f0000000000), 0x3, 0x4fc, &(0x7f0000001500)="$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") openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xa0242, 0x0) r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) fcntl$dupfd(r0, 0x406, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x9, 0x7, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$kcm(0x10, 0x2, 0x4) syz_emit_ethernet(0x0, 0x0, 0x0) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) openat$binfmt_register(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f3, &(0x7f0000000180)={'sit0\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x3c, 0x14, 0x0, 0x1000, 0xfd, 0x89, 0x0, @multicast1, @multicast2}}}}) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0xc, &(0x7f0000000040)=@assoc_value={0x0}, &(0x7f0000000000)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={r4, 0xf}, &(0x7f0000000100)=0x8) r5 = syz_open_procfs(0x0, &(0x7f00000003c0)='fd/3\x00') mount$9p_fd(0x0, &(0x7f0000000100)='.\x00', &(0x7f0000000040), 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r5}}) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r6, 0x107, 0xd, &(0x7f00000000c0)=@req3={0xffab, 0xa, 0x9, 0x803, 0x4, 0xfffffffd, 0xc9}, 0x1c) socket$inet_icmp(0x2, 0x2, 0x1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0xa, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe4, &(0x7f0000000100)=[{}, {}], 0x10, 0x10, &(0x7f0000000140), &(0x7f0000000180), 0x8, 0x55, 0x8, 0x8, &(0x7f00000001c0)}}, 0x10) setsockopt$packet_drop_memb(r6, 0x107, 0x2, &(0x7f0000000340)={r7, 0x1, 0x6, @broadcast}, 0x10) 3m17.14058448s ago: executing program 6 (id=3421): bpf$MAP_CREATE(0x0, 0x0, 0x48) prctl$PR_SET_NAME(0xf, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)=ANY=[@ANYRESDEC=r0], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000400)={'batadv0\x00', 0x0}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010027bd7000fbdbdf250f00000005002f000100000005002ae800000000050029000100000008000300", @ANYRES32=r3], 0x54}, 0x1, 0x0, 0x0, 0x24004040}, 0x24008824) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6004, 0x1) r5 = creat(&(0x7f0000000300)='./file0\x00', 0x82) r6 = dup2(r5, r5) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb0100d0407c8c000000001800000018000000020000000000000000000003000000000500000002000000360200000000ec260fb70a2397a09b57a36bea2c4873508bb9d7770795ccb336dc9c43c7"], 0x0, 0x32, 0x0, 0x1, 0x7}, 0x28) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) r7 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r7) ptrace$setregset(0x4205, r7, 0x1, &(0x7f0000000100)={&(0x7f0000000040)="dcef58b7f29c1f7c93d183044aedba283413e674c7719c33a4b17f028f68610a6c55bb2bf8282853f3e16f8394a8676ff55a3507e2ad50248c6130863b0f7433c7fbc9b978a39eae88bffd05d139cedbee444f7c98e1f92b0f64462b4b470bedced2125e0b1f38fbaa348c6d75aa1a4011e9cdae15ecb9309b0101edbf6dd6d111d6132f1821a4e4cbec8438c571a70e7ca7b0451a6cc55c", 0x98}) ptrace$getregset(0x4204, r7, 0x200, &(0x7f0000000500)={0x0}) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="640000000001010400000000141a000002000000240001801400018008000100e000000108000200e00000010c00028005"], 0x64}}, 0x8080) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x200000a, 0x1, 0x8}) socket$kcm(0x10, 0x2, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000f20b00000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000007f1600850000008200000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='sys_enter\x00', r9}, 0x10) mremap(&(0x7f0000186000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f00000ad000/0x3000)=nil) syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) 3m16.964614964s ago: executing program 6 (id=3426): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xffd, 0x7}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) readv(r2, &(0x7f0000000000)=[{0x0}], 0x1) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) 3m16.906810028s ago: executing program 6 (id=3430): futex(&(0x7f0000000240)=0x2, 0x5, 0x0, 0x0, 0x0, 0x35000000) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0xff, 0x7ffc1ffd}]}) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000480)='./file0\x00', 0x18000, &(0x7f0000003b40)=ANY=[@ANYRES32=0x0, @ANYRESDEC, @ANYRES16=r0, @ANYBLOB="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", @ANYRES8=r0, @ANYRES64=0x0], 0x8, 0x2eb, &(0x7f00000004c0)="$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") r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000500000000000000c363370001000020000000180100002020702509000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) r2 = socket(0x11, 0x2, 0x0) setsockopt(r2, 0x107, 0x1, &(0x7f0000000080)="010000000000060000071a80000001cc", 0x10) close(r2) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0xa, 0x0, 0x0, 0x40f00, 0x60, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000500)='kmem_cache_free\x00', r3}, 0x18) unlink(&(0x7f0000000180)='./file1\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001280)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00'}, 0x18) munlockall() r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000800)=ANY=[@ANYRES8], &(0x7f0000000400)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000380), &(0x7f00000003c0)=0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r5, &(0x7f0000000140)={0x1f, 0xffff, 0x2}, 0x6) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) finit_module(0xffffffffffffffff, 0x0, 0x3) 3m16.573844965s ago: executing program 6 (id=3436): modify_ldt$read(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x103, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0xb95b5ec032cc8e84}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001040)=ANY=[@ANYBLOB="7e64a9ec5d19dc5d1ac36cdf99565f4e9e3b27f07371417ceec77366c70ce0c43da7a1c0bdf211296ed4225d6d2037080e79cd7705a6893634db61c97c04ba978356f44546a067c6ff2e2f", @ANYRESOCT=r0, @ANYBLOB="cde007bb1917806ed0048c7b59e2f0c6851dec26e044497f79f8c3aea05d8439ae3a8e66cc3f6a668a92722fab2fbf5220ee2911f2ade4166a9b318052b13ca9c5041b8969f2260afd98b693ffc596d83c14dd544e4a3a594eb72a9efd0f2f10d2a433702c1c096c08a78d2eb4a9b463f2e39ae0152b506a1922c4dbd370dcfb169cfe25312085b5dae6c799df1dd901cad53fd0fa53448596244253df106a6f9ab2358a70aea923f51f561677592eb551ba2290aac4888c97536f65b5c2e8ecf4c48aeaac77371244e53015", @ANYRES32=r0, @ANYBLOB="e5169742b6082f9e1fedd64e6fccc3b6086d828fa251c03751432a6a050aa1f8b178e1da350f6c42d8a6d3ad54791529c9aae6c2b238efe5ec8fdd8700063d1fdf1ccaec205ec7aff51e5316d47e7ebc563973570069bccf3f8be9da5a0f859cc3bf81ccaeec4b03de09bedeea016d1448a08251a1978b6c19fb368e468adda23dcc15e4ea587c9750e1a5642aa16c7661458eaf2a4a98ca14cf9474a2e3931a32c6d5450c6cf28ae4881bccd455b54afc3312ce9905c2ede9c57e822c1a66230bd0b5065e7f10784e53b3f5ef22e9762a518762"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8ff20c2c10f0093d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r1}, &(0x7f0000000040), &(0x7f0000000280)='%pS \x00'}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x10000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x12, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r2}, 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x42, 0x0) rename(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='./file2\x00') recvmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@rights={{0x10}}], 0x10}, 0xc0011122) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000014c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r4, 0xfeffff, 0x680, 0x3f000002, &(0x7f0000000700)="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", 0x0, 0xf0, 0x0, 0xf0, 0xffffff0c}, 0x40) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0xffffffffffffffa4, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x4, &(0x7f0000000380)=ANY=[], 0x0, 0x3}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r5, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close(0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r7}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000300)=@generic={&(0x7f00000002c0)='./file0\x00', r6}, 0x18) r8 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x808003, &(0x7f0000000000), 0x3, 0x4fc, &(0x7f0000000a00)="$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") r9 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) openat(r8, 0x0, 0x640, 0x2) r10 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r10, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x2, 0x11, r10, 0x0) r11 = socket$rds(0x15, 0x5, 0x0) bind$rds(r11, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) write$binfmt_register(r9, &(0x7f0000000000)={0x3a, 'syz2', 0x3a, 'E', 0x3a, 0x7, 0x3a, 'M', 0x3a, 'M', 0x3a, './file2', 0x3a, [0x46]}, 0x2a) socket$nl_route(0x10, 0x3, 0x0) 3m16.3947836s ago: executing program 6 (id=3438): r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x1}, 0x8) sendmsg$inet_sctp(r0, &(0x7f0000000700)={&(0x7f0000000340)=@in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000540)='\x00', 0x1}], 0x1, 0x0, 0x0, 0x2804c044}, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000001c0)={0x0, 0x6, 0x9}, 0x8) keyctl$update(0x2, 0x0, 0x0, 0x100000) shutdown(r0, 0x1) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xd4, &(0x7f0000000440)=[{}, {}], 0x10, 0x10, &(0x7f0000000480), &(0x7f00000004c0), 0x8, 0xfb, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000800)={{r4}, &(0x7f0000000780), &(0x7f00000007c0)=r5}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x1b, 0xc, &(0x7f00000000c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x6}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @map_fd={0x18, 0x7, 0x1, 0x0, 0x1}], &(0x7f0000000200)='syzkaller\x00', 0x3, 0x69, &(0x7f0000000240)=""/105, 0x41000, 0x6c, '\x00', 0x0, @fallback=0xc, r2, 0x8, &(0x7f0000000300)={0x8, 0x2}, 0x8, 0x10, 0x0, 0x0, r3, r5, 0x8, &(0x7f00000008c0)=[0xffffffffffffffff, r6, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000900)=[{0x5, 0x1, 0xf, 0xc}, {0x2, 0x5, 0x2, 0x1}, {0x4, 0x5}, {0x0, 0x3, 0x8, 0xc}, {0x3, 0x5, 0x4, 0xb}, {0x1, 0x2, 0x6, 0x7}, {0x5, 0x4, 0x4, 0x4}, {0x0, 0x3, 0x3, 0x3}], 0x10, 0x5}, 0x94) 3m16.01653253s ago: executing program 6 (id=3444): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='scsi_dispatch_cmd_start\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000012c0)='scsi_dispatch_cmd_start\x00', r0}, 0x10) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xb}]}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x95, 0x3}, 0x100002, 0x0, 0xffffffff, 0x3, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) r3 = syz_open_dev$tty1(0xc, 0x4, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x0}, 0x94) ioctl$TIOCL_BLANKSCREEN(r3, 0x4b67, &(0x7f0000000180)) 3m16.016114379s ago: executing program 35 (id=3444): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='scsi_dispatch_cmd_start\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000012c0)='scsi_dispatch_cmd_start\x00', r0}, 0x10) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xb}]}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x95, 0x3}, 0x100002, 0x0, 0xffffffff, 0x3, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) r3 = syz_open_dev$tty1(0xc, 0x4, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x0}, 0x94) ioctl$TIOCL_BLANKSCREEN(r3, 0x4b67, &(0x7f0000000180)) 34.759773311s ago: executing program 4 (id=7131): r0 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a000020095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000980)='kfree\x00', r1}, 0x18) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42031, 0xffffffffffffffff, 0x0) rt_sigaction(0xd, 0x0, 0xfffffffffffffffd, 0x8, &(0x7f0000000540)) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0) pwritev2(r0, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x76200}], 0x1, 0x7c00, 0x0, 0x3) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x143a82, 0x8) r3 = dup(r2) r4 = open(&(0x7f0000000100)='./bus\x00', 0x40542, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r6}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r9}, 0xc) r10 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r10, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x1a8}, 0x1, 0x0, 0x0, 0x40000}, 0x4000050) 33.89582299s ago: executing program 4 (id=7147): r0 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a000020095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000980)='kfree\x00', r1}, 0x18) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42031, 0xffffffffffffffff, 0x0) rt_sigaction(0xd, 0x0, 0xfffffffffffffffd, 0x8, &(0x7f0000000540)) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0) pwritev2(r0, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x76200}], 0x1, 0x7c00, 0x0, 0x3) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x143a82, 0x8) r3 = dup(r2) r4 = open(&(0x7f0000000100)='./bus\x00', 0x40542, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r6}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r9}, 0xc) r10 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r10, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x1a8}, 0x1, 0x0, 0x0, 0x40000}, 0x4000050) 33.039184049s ago: executing program 4 (id=7172): bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0x3}, 0x18) r2 = add_key$fscrypt_v1(&(0x7f0000000440), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "69dcaf20127e9a854529f45826cb35be51682e30944313e2ca73845d177d601880221daeccfda56b75cfe2bad94f000066b2ddab614fec2236da7d88ea07c9ee", 0x1}, 0x48, 0xfffffffffffffffe) keyctl$search(0xa, r2, &(0x7f0000000180)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0) 33.000461332s ago: executing program 4 (id=7176): r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3}, 0x94) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000640)='./file1\x00', 0x3014850, &(0x7f0000000080)={[{@quota}, {@barrier_val={'barrier', 0x3d, 0x1000}}, {@grpjquota}, {@norecovery}, {@dioread_lock}]}, 0x3, 0x4d1, &(0x7f0000000b80)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) quotactl_fd$Q_SETQUOTA(r1, 0xffffffff80000300, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x13) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x4000000}, 0xc) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000003c0)='powernv_throttle\x00', r3, 0x0, 0x200}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, 0x0, 0x48082) socket$isdn(0x22, 0x3, 0x25) r4 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @private=0xa010101}]}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000040)=0x8) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x85, &(0x7f0000000380)={r6, 0x88, "0200000000000000703fcd09bdf0b493d4323725cdcff2eae49f89843a5318d5ba093aa761132b512e8c4eb4eb76aa3f3069d1d5a64a2c75a2d59986feff48dc51b23de50b4c052630642b3348c700b558041310b18d364b87808f6ec3b597fae6ac116b5bc6c564f98676e592103c268225b716a73e48c8c8f8ec21e15e7a5d6743243dfde8a664"}, &(0x7f0000000500)=0x90) pipe2(&(0x7f0000000040), 0x40) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) r7 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r7) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) ptrace$getregset(0x4204, r7, 0x202, &(0x7f0000000140)={0x0}) recvmmsg(r0, &(0x7f00000057c0)=[{{0x0, 0x0, &(0x7f0000002cc0)=[{0x0}, {&(0x7f00000017c0)=""/130, 0x82}], 0x2}, 0xa1}], 0x1, 0x0, 0x0) syz_emit_ethernet(0xbe, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaa230180c20000000800450000b00000000000119078000000000000000000004e20009c907801000000000000007b4b143b7461fd777b1c012bd14efb9f4950db8f080c26a04883ad5c8c82b8af584cbf2649a50f2dbc43efa86944a38d0a881c51852e4451b57d037ad3c045942824251d7d17b519158cbcd4fbe40a23424dbcfd56f1375461caaa2f19935e6996c7096ffeeb03000000000000649a3bfbc1f39cb307b3472eb9cdb042d2643fcbb2c5a57df67d544af6e8da"], 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x7}, 0x94) 32.831376636s ago: executing program 4 (id=7185): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000110000000000"], &(0x7f0000000140)='GPL\x00', 0x7, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x3, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x3, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r1, &(0x7f00000018c0)=[{{0x0, 0x0, &(0x7f00000002c0)}}, {{0x0, 0x0, &(0x7f0000001840)=[{&(0x7f0000000240)=' ', 0x1}, {&(0x7f0000001700)}], 0x2}}], 0x2, 0x4048891) 32.472606884s ago: executing program 4 (id=7195): r0 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a000020095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000980)='kfree\x00', r1}, 0x18) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42031, 0xffffffffffffffff, 0x0) rt_sigaction(0xd, 0x0, 0xfffffffffffffffd, 0x8, &(0x7f0000000540)) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0) pwritev2(r0, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x76200}], 0x1, 0x7c00, 0x0, 0x3) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x143a82, 0x8) r3 = dup(r2) r4 = open(&(0x7f0000000100)='./bus\x00', 0x40542, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$eJzs3c9vFFUcAPDvbH/QUrSFGBUP0sQYSJSWFjDEeICrIQ3+iBcvVloQKdDQGi2aUBK8mBgvxph48iD+F0rkyklPHrx4MiREDUcT18x2pnTb2ZYubacyn0+y9M17O7w33X773r6+NxtAZQ2m/9Qi9kbEdBLRn8wvlnVGVji48Lx7f39yOn0kUa+/8WcSSZaXPz/JvvZlJ/dExM8/JbGnY2W9M3NXzo9PTU1ezo6HZy9MD8/MXTl47sL42cmzkxdHXxo9dvTI0WMjh9q6rqsFeSevv/9h/2djb3/3zT/JyPe/jSVxPF7Nnrj0OjbKYAw2vifJyqK+YxtdWUk6sp+TpS9x0llig1iX/PXrioinoj864v6L1x+fvlZq44BNVU8i6kBFJeIfKiofB+Tv7Ze/D66VMioBtsLdEwsTACvjv3NhbjB6GnMDO+8lsXRaJ4mI9mbmmu2KiNu3xq6fuTV2PTZpHg4oNn8tIp4uiv+kEf8D0RMDjfivNcV/Oi44lX1N819vs/7lU8XiH7bOQvz3rBr/0SL+31kS/++2Wf/g/eR7vU3x39vuJQEAAAAAAEBl3TwRES8W/f2/trj+JwrW//RFxPENqH9w2fHKv//X7mxANUCBuyciXilc/1vLV/8OdGSpxxrrAbqSM+emJg9FxOMRcSC6dqTHI6vUcfDzPV+3KhvM1v/lj7T+29lawKwddzp3NJ8zMT47/rDXDUTcvRbxTOH632Sx/08K+v/098H0A9ax5/kbp1qVrR3/wGapfxuxv7D/v3/XimT1+3MMN8YDw/moYKVnP/7ih1b1txv/bjEBDy/t/3euHv8DydL79cysv47Dc531VmXtjv+7kzcbt5zpzvI+Gp+dvTwS0Z2c7Ehzm/JH199meBTl8ZDHSxr/B55bff6vaPzfGxHzy/7v5K/mPcW5J//t+71Ve4z/oTxp/E+sq/9ff2L0xsCPrep/sP7/SKOvP5DlmP+DBV/lYdrdnF8Qjp1FRVvdXgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4FNQiYlcktaHFdK02NBTRFxFPxM7a1KWZ2RfOXPrg4kRa1vj8/1r+Sb/9C8dJ/vn/A0uOR5cdH46I3RHxZUdv43jo9KWpibIvHgAAAAAAAAAAAAAAAAAAALaJvhb7/1N/dJTdOmDTdZbdAKA0BfH/SxntALae/h+qS/xDdYl/qC7xD9Ul/qG6xD9Ul/iH6hL/AAAAAADwSNm97+avSUTMv9zbeKS6s7KuUlsGbLZa2Q0ASuMWP1Bdlv5AdXmPDyRrlPe0PGmtM1czffohTgYAAAAAAAAAAACAytm/1/5/qCr7/6G67P+H6sr3/+8ruR3A1vMeH4g1dvIX7v9f8ywAAAAAAAAAAAAAYCPNzF05Pz41NXlZ4q3t0YytTNTr9avpT8F2ac//PJEvhd8u7VmWyPf6PdhZ5f1OAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAmv0XAAD//xYSJMU=") r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r6}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r9}, 0xc) r10 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r10, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="a80100002100010027bd7000fedbdf2502"], 0x1a8}, 0x1, 0x0, 0x0, 0x40000}, 0x4000050) 32.472408904s ago: executing program 36 (id=7195): r0 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a000020095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000980)='kfree\x00', r1}, 0x18) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42031, 0xffffffffffffffff, 0x0) rt_sigaction(0xd, 0x0, 0xfffffffffffffffd, 0x8, &(0x7f0000000540)) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0) pwritev2(r0, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x76200}], 0x1, 0x7c00, 0x0, 0x3) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x143a82, 0x8) r3 = dup(r2) r4 = open(&(0x7f0000000100)='./bus\x00', 0x40542, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$eJzs3c9vFFUcAPDvbH/QUrSFGBUP0sQYSJSWFjDEeICrIQ3+iBcvVloQKdDQGi2aUBK8mBgvxph48iD+F0rkyklPHrx4MiREDUcT18x2pnTb2ZYubacyn0+y9M17O7w33X773r6+NxtAZQ2m/9Qi9kbEdBLRn8wvlnVGVji48Lx7f39yOn0kUa+/8WcSSZaXPz/JvvZlJ/dExM8/JbGnY2W9M3NXzo9PTU1ezo6HZy9MD8/MXTl47sL42cmzkxdHXxo9dvTI0WMjh9q6rqsFeSevv/9h/2djb3/3zT/JyPe/jSVxPF7Nnrj0OjbKYAw2vifJyqK+YxtdWUk6sp+TpS9x0llig1iX/PXrioinoj864v6L1x+fvlZq44BNVU8i6kBFJeIfKiofB+Tv7Ze/D66VMioBtsLdEwsTACvjv3NhbjB6GnMDO+8lsXRaJ4mI9mbmmu2KiNu3xq6fuTV2PTZpHg4oNn8tIp4uiv+kEf8D0RMDjfivNcV/Oi44lX1N819vs/7lU8XiH7bOQvz3rBr/0SL+31kS/++2Wf/g/eR7vU3x39vuJQEAAAAAAEBl3TwRES8W/f2/trj+JwrW//RFxPENqH9w2fHKv//X7mxANUCBuyciXilc/1vLV/8OdGSpxxrrAbqSM+emJg9FxOMRcSC6dqTHI6vUcfDzPV+3KhvM1v/lj7T+29lawKwddzp3NJ8zMT47/rDXDUTcvRbxTOH632Sx/08K+v/098H0A9ax5/kbp1qVrR3/wGapfxuxv7D/v3/XimT1+3MMN8YDw/moYKVnP/7ih1b1txv/bjEBDy/t/3euHv8DydL79cysv47Dc531VmXtjv+7kzcbt5zpzvI+Gp+dvTwS0Z2c7Ehzm/JH199meBTl8ZDHSxr/B55bff6vaPzfGxHzy/7v5K/mPcW5J//t+71Ve4z/oTxp/E+sq/9ff2L0xsCPrep/sP7/SKOvP5DlmP+DBV/lYdrdnF8Qjp1FRVvdXgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4FNQiYlcktaHFdK02NBTRFxFPxM7a1KWZ2RfOXPrg4kRa1vj8/1r+Sb/9C8dJ/vn/A0uOR5cdH46I3RHxZUdv43jo9KWpibIvHgAAAAAAAAAAAAAAAAAAALaJvhb7/1N/dJTdOmDTdZbdAKA0BfH/SxntALae/h+qS/xDdYl/qC7xD9Ul/qG6xD9Ul/iH6hL/AAAAAADwSNm97+avSUTMv9zbeKS6s7KuUlsGbLZa2Q0ASuMWP1Bdlv5AdXmPDyRrlPe0PGmtM1czffohTgYAAAAAAAAAAACAytm/1/5/qCr7/6G67P+H6sr3/+8ruR3A1vMeH4g1dvIX7v9f8ywAAAAAAAAAAAAAYCPNzF05Pz41NXlZ4q3t0YytTNTr9avpT8F2ac//PJEvhd8u7VmWyPf6PdhZ5f1OAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAmv0XAAD//xYSJMU=") r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r6}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r9}, 0xc) r10 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r10, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="a80100002100010027bd7000fedbdf2502"], 0x1a8}, 0x1, 0x0, 0x0, 0x40000}, 0x4000050) 2.11801105s ago: executing program 2 (id=8078): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'tunl0\x00', &(0x7f0000000540)={'syztnl1\x00', 0x0, 0xff90, 0x20, 0xb10a, 0x73b77350, {{0x20, 0x4, 0x2, 0x2, 0x80, 0x65, 0x0, 0x14, 0x4, 0x0, @broadcast, @multicast2, {[@cipso={0x86, 0x57, 0x2, [{0x1, 0xf, "f0b20f2aa4f6145f431ddc12f0"}, {0x0, 0xd, "adfcbf098e2198a8b34d60"}, {0x7, 0xf, "ecbfe4ac381b05fb678b94d57b"}, {0x0, 0xc, "f6c5d288b21059323e62"}, {0x5, 0xb, "0a36fedadbeac5127c"}, {0x5, 0x8, "02bedaff4763"}, {0x7, 0x7, "47fc9ccde7"}]}, @timestamp={0x44, 0x10, 0xc, 0x0, 0x6, [0x8, 0x309, 0x7]}, @ra={0x94, 0x4}]}}}}}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000680)={0x0, 0x3ff, 0x18}, 0xc) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000740)={{0x1}, &(0x7f00000006c0), &(0x7f0000000700)='%-5lx \x00'}, 0x20) syz_open_dev$vcsn(&(0x7f0000000780), 0x7, 0x800) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32, @ANYBLOB="0600"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="010020000200000002000000000000000000000000000000ee02a977"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1e00000001000000000100000200000000000000", @ANYRES32, @ANYBLOB="220400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="010000000400000005008000"/28], 0x50) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0x42, 0x0) pwrite64(r1, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) lseek(r1, 0x5, 0x4) sendmsg$NL80211_CMD_ASSOCIATE(r1, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x98}, 0x20000000) bind$bt_hci(r0, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xe, 0x4, 0x8, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3, 0x0, 0x7fff}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{}, &(0x7f0000000200), &(0x7f0000000240)=r2}, 0x20) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) io_submit(0x0, 0x1, &(0x7f0000000340)=[&(0x7f0000000100)={0x2000000000, 0x4, 0x0, 0x1, 0x0, r0, &(0x7f0000000040)="0200ffff0000", 0x6, 0x0, 0x0, 0x2}]) 1.713366263s ago: executing program 9 (id=8086): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0xfe, 0x0, 0x7ffc9ffe}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket(0x10, 0x80002, 0x0) dup(r2) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000006c59850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x18) write$P9_RLERRORu(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="1c00000007ffff"], 0x52) 1.712558303s ago: executing program 2 (id=8087): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000110000000000000000850000007b00000095"], &(0x7f0000000140)='GPL\x00', 0x7, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x3, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x3, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r1, &(0x7f00000018c0)=[{{0x0, 0x0, &(0x7f00000002c0)}}, {{0x0, 0x0, &(0x7f0000001840)=[{0x0}], 0x1}}], 0x2, 0x4048891) 1.440811764s ago: executing program 9 (id=8091): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x3, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x8, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x1f00, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="070002000000fddbdf2505000000180001801400020073797a5f74756e00000000000000007d0800038004000380080005"], 0x3c}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xa, 0x8, &(0x7f0000000740)=ANY=[], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) creat(&(0x7f0000000100)='./file0\x00', 0xd931d3864d39dc4a) pipe2(&(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) splice(r4, 0x0, r3, 0x0, 0x6, 0x0) fcntl$setpipe(r3, 0x407, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) sendmsg$NFNL_MSG_CTHELPER_GET(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x14, 0x1, 0x9, 0x101}, 0x14}}, 0x0) r5 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xa0}}, 0x0) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=ANY=[@ANYBLOB="240000001900010028bd7000fbdbdf251d01020008000900", @ANYRES32, @ANYBLOB="08000a00e1"], 0x24}, 0x1, 0x0, 0x0, 0x4048855}, 0x30004016) sendmmsg(r6, &(0x7f0000000000), 0x400000000000235, 0x0) bind(r0, &(0x7f0000000440)=@ieee802154={0x24, @short={0x2, 0x0, 0xfffe}}, 0x80) bind$llc(r5, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x81, 0x42}, 0x10) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c500000001f0ff"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r7}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008001500b7040000000000008500000058"], 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000780)='sys_enter\x00', r9}, 0x18) ioprio_get$pid(0x1, 0x0) connect$llc(r5, &(0x7f0000000340)={0x1a, 0x322, 0x0, 0x0, 0x4, 0x90, @random="48bd00"}, 0x10) 1.236012441s ago: executing program 9 (id=8104): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x64, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x2}, 0x18) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000200)=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000000)={0x42, 0x1}, 0x10) r3 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000240)={0x42, 0x1}, 0x10) 1.210311283s ago: executing program 9 (id=8107): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x2, 0x10000, 0x8, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$inet6(0xa, 0x2, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000540)=@newlink={0x3c, 0x10, 0x437, 0x70bd2a, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3a23fd174386fe3b, 0xc4a48b7f26bf141b}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_REMOTE={0x8, 0x7, @local}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r2 = socket$xdp(0x2c, 0x3, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b00000007000000080000000800000005", @ANYRESDEC=r1], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095", @ANYRESOCT=r1, @ANYRES64=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r3}, &(0x7f0000000400), &(0x7f0000000440)=r4}, 0x20) r5 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x2000) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x56) ioctl$SG_GET_VERSION_NUM(r5, 0x2284, &(0x7f0000000080)) 1.12511614s ago: executing program 9 (id=8111): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x36}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x6000) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000380), 0x2ce002, 0x0) ioctl$TIOCCONS(r1, 0x541d) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000200)={0x22a8, &(0x7f0000000200)}) readahead(r2, 0x6, 0x3) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x20}, 0x94) recvmmsg(r0, &(0x7f00000057c0)=[{{0x0, 0x0, 0x0}, 0x3}, {{0x0, 0x0, &(0x7f0000002cc0)=[{0x0}, {&(0x7f00000017c0)=""/130, 0x94}], 0x2}, 0xa1}], 0x2, 0x0, 0x0) syz_emit_ethernet(0xbe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], 0x0) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_BLANKSCREEN(r3, 0x560e, 0x0) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x7}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x5, 0x0, 0x0, &(0x7f0000000000), 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x181242, 0x148) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) r5 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount_setattr(r5, &(0x7f0000000180)='.\x00', 0x8000, &(0x7f0000001dc0)={0x8f, 0x0, 0x100000}, 0x20) 810.896075ms ago: executing program 7 (id=8123): timerfd_create(0x9, 0x400) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={{0x14}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x0, 0x8080}, 0x80) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200), 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$random(0xffffff9c, 0x0, 0x80, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00', r2}, 0x9) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000e80)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f00000000c0)={0x13, 0x10, 0x8, {0x0, r3, 0x1}}, 0x18) 669.482976ms ago: executing program 2 (id=8124): r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) shutdown(r2, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x24, &(0x7f0000000100)=0x1, 0x4) recvmmsg(r2, &(0x7f0000002800)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000d80)=""/1, 0x1}, 0x436}], 0x1, 0x0, 0x0) write$sndseq(r1, &(0x7f0000000180)=[{0x0, 0x47, 0x0, 0x0, @tick, {0x40, 0xff}, {0x0, 0x9}, @queue={0xee, {0x7, 0xc9a}}}, {0x0, 0x0, 0x0, 0x0, @time={0x367f, 0xfffffffd}, {}, {0x80}, @connect={{0x40, 0x7}, {0x80, 0xf6}}}], 0x38) prlimit64(0x0, 0xe, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xffd, 0x7}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r3}, &(0x7f0000000040), &(0x7f0000000080)=r4}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r5}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000e, 0x20c44fb6edc09a38, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) rt_sigpending(0x0, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_DELPDP(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfc, {}, [@GTPA_LINK={0x8}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_FAMILY={0x5, 0xd, 0x15}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) r9 = fsopen(&(0x7f0000001340)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r9, 0x6, 0x0, 0x0, 0x0) r10 = fsmount(r9, 0x200000000000000, 0x0) openat$cgroup_procs(r10, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) 669.152247ms ago: executing program 7 (id=8125): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f0000000480)={0x0, 0x60, &(0x7f0000000140)={&(0x7f00000002c0)={0x1c, r1, 0x9c3fa077fa966179, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 590.744533ms ago: executing program 7 (id=8127): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fffd}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) syz_emit_ethernet(0x82, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaaaabbbbbbbbbbbb86dd60ee527e004c3c0000000000000000000000000000000100ff02000000000000000000000000000133"], 0x0) 574.876564ms ago: executing program 7 (id=8129): timer_create(0x2, 0x0, &(0x7f0000000480)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000080000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000100000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000005c0)='sys_enter\x00', r0}, 0x18) timer_delete(0x0) 523.829818ms ago: executing program 7 (id=8130): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000380)='GPL\x00', 0xa, 0x0, 0x0, 0x40f00, 0x60, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000000900010073797a300000000080000000090a010400000000000000000700000008000a40000000000900020073797a30000000000900010073797a3000000000080005400000000d3c0012802c0001800a0001006c696d69740000001c0002800c00024000000000000010000c00014000000000000000010c000180080001006475700008000340000001"], 0xc8}}, 0x20050800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000500)='kmem_cache_free\x00', r0}, 0x18) r2 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$sock_linger(r2, 0x1, 0x3c, &(0x7f0000000180)={0x200000000000001}, 0x8) sendmsg$inet(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10, 0x0}, 0xc082) sendto$inet6(r2, 0x0, 0x5c4, 0x404c844, &(0x7f0000000540)={0x2, 0x4e24, 0x0, @local, 0x4000000}, 0x1c) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) 511.673099ms ago: executing program 7 (id=8132): connect$vsock_stream(0xffffffffffffffff, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000200), 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NET_GET(r1, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[], 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x4040004) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r2, 0x4) r3 = socket$inet_mptcp(0x2, 0x1, 0x106) sendmmsg(r3, &(0x7f0000002840)=[{{0x0, 0x0, 0x0}}], 0x1, 0x20044000) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r4, 0x0, 0x800) 509.007649ms ago: executing program 2 (id=8133): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x8, 0x7fe2, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='9p_protocol_dump\x00', r3}, 0x10) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000a40)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r5}, 0x2c, {[{@version_u}]}}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x208}, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r6, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[], 0x208}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000a40)={0xffffffffffffffff}) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r10, 0x0, 0x2}, 0x18) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$nl80211(&(0x7f00000002c0), r11) sendmsg$NL80211_CMD_GET_WIPHY(r11, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x24, r12, 0x5707b563827c8365, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x74}, @val={0x8, 0x12a}, @void}}}, 0x24}}, 0x0) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r13}, 0x10) acct(0xfffffffffffffffe) close_range(r8, 0xffffffffffffffff, 0x2) recvmmsg(r7, &(0x7f0000001dc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=""/188, 0xbc, 0xdf0e}}], 0x1800, 0x2002, 0x0) 478.992322ms ago: executing program 8 (id=8135): socket$phonet_pipe(0x23, 0x5, 0x2) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r1}, 0x18) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x2, 0x0, 0x0, {0x0, 0x0, 0xffff, 0x0, 0x1c42}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x9}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'xfrm0\x00'}]}, 0x48}}, 0x0) timer_create(0x1, &(0x7f00000000c0)={0x0, 0x21, 0x4, @thr={&(0x7f0000000400)="a99fc0d82989ba4197318e9a4bf7175bfdaf50e3bf70c39a3eb88e07478da27bc56202a6faab9569ac7e1c94d8224e874852ebdb0fd4ff3f54d7b497ae159e88dbe28ff1d2edca5efe3b9ec177bfbf7589bc8ec6207dc10656e38469d1c812d2d145193e89c874d139950395ccba2739db0117c5206f1da950177cf74e2cc44c6787e126ed9369019b55", &(0x7f0000000c40)="5a9a999d4ca9a5965e4cfc696ddc9d5374fbfe1ad980e3a7956974bbeacbd130023aac385ab677c98aab957cb2584439bf7c0990d94d62bdbbba832e3d3652c3938394ad41897c00161ac24e9f5706b3bff03f2c83b68dc69a1fc40ea66365256f37b7124202976d4401b693fb9a51b90e86fbf51d2e6cda683eb3fba0c295b2614377580de4b34023532f4afe42c93c59c7944a3512cd5faab7b612cca354e2fe908975227003481e6d79857aa2f98a89e2eebcf78fd3a132d106d2d1724c27064ebcbe70472c337173e7f165039a000756a99575d96d98ab03ad14b490c2ad45bef740f89764eeeb4d582e1478a719"}}, &(0x7f0000000240)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x8}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r2, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x2000, 0x0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) ioctl$TCXONC(r3, 0x540a, 0x2) ioctl$TIOCSPTLCK(r3, 0x40045431, &(0x7f0000000000)=0x6) r4 = ioctl$TIOCGPTPEER(r3, 0x5441, 0x6) write(r4, &(0x7f0000000080)="d7381c47ad4058b4d19343ef808a0543f6fd8388", 0x14) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f0000000040)={0x2, 0x2, 0xffffff82, 0xe, 0x8, "16cfb69012650eabfd955c6d9954beff89d9ef", 0x4, 0x9}) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800, &(0x7f00000009c0)={[{@errors_remount}, {@debug}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5e}}, {@noauto_da_alloc}, {@bsdgroups}, {@jqfmt_vfsv1}, {@abort}, {@data_err_ignore}]}, 0x2, 0x476, &(0x7f0000000540)="$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") 459.088244ms ago: executing program 5 (id=8136): timerfd_create(0x9, 0x400) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={{0x14}, [], {0x14}}, 0x28}, 0x1, 0x0, 0x0, 0x8080}, 0x80) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200), 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$random(0xffffff9c, 0x0, 0x80, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00', r2}, 0x9) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000e80)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f00000000c0)={0x13, 0x10, 0x8, {0x0, r3, 0x1}}, 0x18) 433.584966ms ago: executing program 5 (id=8137): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000410"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x18) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000340)=0x14) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000280)={@ifindex=r2, 0xa, 0x0, 0xede, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0x0, &(0x7f0000000080)=[0x0], &(0x7f0000000200)=[0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40) syz_emit_ethernet(0x7e, &(0x7f00000014c0)={@local, @empty, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x70, 0x300, 0x0, 0x0, 0x1, 0x0, @rand_addr=0x64010100, @local}, @time_exceeded={0xb, 0x0, 0x0, 0x3, 0x2c, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89, 0x0, @private, @local, {[@lsrr={0x83, 0xb, 0x0, [@dev, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @cipso={0x86, 0x32, 0x2, [{0x0, 0x5, "df6116"}, {0x0, 0x12, "ffd11634eea26b0faffa0dea2e903528"}, {0x0, 0x8, "02a20948fd74"}, {0x7, 0xd, "ccf0294e2a3bdb4aa40b24"}]}]}}}}}}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'veth0\x00', 0x0}) lseek(0xffffffffffffffff, 0xffff, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r4, &(0x7f0000000480)={0x0, 0x60, &(0x7f0000000140)={&(0x7f00000002c0)={0x1c, r5, 0x9c3fa077fa966179, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000540)={&(0x7f0000000a00)={0x1e4, r5, 0x100, 0x70bd29, 0x25dfdbfd, {{}, {@void, @void}}, [@NL80211_ATTR_IE={0xa, 0x2a, [@chsw_timing={0x68, 0x4, {0x40, 0x8000}}]}, @fils_params=[@NL80211_ATTR_FILS_ERP_USERNAME={0x4}], @fils_params=[@NL80211_ATTR_FILS_ERP_REALM={0xad, 0xfa, "a9d1740431b7da9da89379d3bcf2644b6169dbdf10b38084eee5b4b4e140f2332345f5664eaec8c4d95a4fbc17a7e72e72458bfa4aa25e7d6fc363a94680a7db707e180eacfecf91ac63fe113d9560740b6e054eca95deb7497adced4c6804468881df831166245f31e4e710d1f8688efceca6e6ff3346942fb96fcaf0cf5aeb986eabb1d849f01775b01961216bec7898cd27fe6ff3c4178647f027457bcdfffc4982aaa1d5269cfa"}], @fils_params=[@NL80211_ATTR_FILS_ERP_USERNAME={0x8, 0xf9, "2af13827"}, @NL80211_ATTR_FILS_ERP_REALM={0x65, 0xfa, "8a3d04e08389bb72bffa4d0d05dff90c058b4b798db17499409f776ee37ab453c4726f6051a57226b0806d75295ca58f9d92ff9a9c4ab251b3c61ccd03853d4c63827a26ec9a670eb7ae4a760f70e7732d8201b0432512a4963ed61a1cafb40092"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x6}, @NL80211_ATTR_FILS_ERP_RRK={0x52, 0xfc, "f07cade195f567c4968874c73b31199f1619351c8524b94006b9dcab4ed3d0190d4e21608501f94d4bf9146d7492486571a3c6bf297d69a4d056b131b2744908eb7a0eb6c47168210317814ee593"}], @NL80211_ATTR_IE={0x44, 0x2a, [@ht={0x2d, 0x1a, {0xc, 0x1, 0x7, 0x0, {0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x1}, 0x800, 0x8001, 0x3}}, @channel_switch={0x25, 0x3, {0x1, 0xad, 0x9}}, @rann={0x7e, 0x15, {{0x1, 0x1a}, 0x6, 0xda, @device_b, 0xd623, 0xf, 0xe0}}, @peer_mgmt={0x75, 0x6, {0x0, 0x0, @val=0x9, @void, @void}}]}]}, 0x1e4}, 0x1, 0x0, 0x0, 0x4000010}, 0x480a0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000004c0)={r3, 0x3, 0x6}, 0x10) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r6, 0x112, 0xa, &(0x7f0000001d80)=0x2, &(0x7f0000001dc0)=0x4) r7 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f0000000100)={r3, 0x1, 0x6, @remote}, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=@getchain={0x24, 0x11, 0x1, 0xfffffffe, 0x2000001, {0x0, 0x0, 0x0, r3, {0x7, 0xa}, {0xd, 0xc}, {0x8}}}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048054) connect$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0xf8, r3, 0x1, 0xfa, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2c}}, 0x14) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='itimer_state\x00', r9}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x46, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='itimer_state\x00', r10}, 0x10) setitimer(0x0, 0x0, 0x0) sendmsg$nl_netfilter(r8, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB="280000000101010225bd7000fddbdf250100000408004700090000000c0051000b00000000000000"], 0x28}, 0x1, 0x0, 0x0, 0x20008004}, 0x24000040) 403.718338ms ago: executing program 8 (id=8138): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f0000000480)={0x0, 0x60, &(0x7f0000000140)={&(0x7f00000002c0)={0x1c, r1, 0x9c3fa077fa966179, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 289.136597ms ago: executing program 8 (id=8139): r0 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a000020095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000980)='kfree\x00', r1}, 0x18) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42031, 0xffffffffffffffff, 0x0) rt_sigaction(0xd, 0x0, 0xfffffffffffffffd, 0x8, &(0x7f0000000540)) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0) pwritev2(r0, &(0x7f0000000240)=[{0x0}], 0x1, 0x7c00, 0x0, 0x3) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x143a82, 0x8) r3 = dup(r2) r4 = open(&(0x7f0000000100)='./bus\x00', 0x40542, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r5}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r8}, 0xc) r9 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r9, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="a80100002100010027bd7000fedbdf2502"], 0x1a8}, 0x1, 0x0, 0x0, 0x40000}, 0x4000050) 257.88348ms ago: executing program 5 (id=8140): sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x80) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001200), 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) nanosleep(0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00', r2}, 0x9) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000e80)={0xffffffffffffffff}, 0x111, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f00000000c0)={0x13, 0x10, 0x8, {0x0, r3, 0x1}}, 0x18) 255.68313ms ago: executing program 9 (id=8141): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000180)={'tunl0\x00', &(0x7f0000000540)={'syztnl1\x00', 0x0, 0xff90, 0x20, 0xb10a, 0x73b77350, {{0x20, 0x4, 0x2, 0x2, 0x80, 0x65, 0x0, 0x14, 0x4, 0x0, @broadcast, @multicast2, {[@cipso={0x86, 0x57, 0x2, [{0x1, 0xf, "f0b20f2aa4f6145f431ddc12f0"}, {0x0, 0xd, "adfcbf098e2198a8b34d60"}, {0x7, 0xf, "ecbfe4ac381b05fb678b94d57b"}, {0x0, 0xc, "f6c5d288b21059323e62"}, {0x5, 0xb, "0a36fedadbeac5127c"}, {0x5, 0x8, "02bedaff4763"}, {0x7, 0x7, "47fc9ccde7"}]}, @timestamp={0x44, 0x10, 0xc, 0x0, 0x6, [0x8, 0x309, 0x7]}, @ra={0x94, 0x4}]}}}}}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000680)={0x0, 0x3ff, 0x18}, 0xc) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000740)={{0x1}, &(0x7f00000006c0), &(0x7f0000000700)='%-5lx \x00'}, 0x20) syz_open_dev$vcsn(&(0x7f0000000780), 0x7, 0x800) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32, @ANYBLOB="0600"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="010020000200000002000000000000000000000000000000ee02a977"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1e00000001000000000100000200000000000000", @ANYRES32, @ANYBLOB="220400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="010000000400000005008000"/28], 0x50) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0x42, 0x0) pwrite64(r1, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) lseek(r1, 0x5, 0x4) sendmsg$NL80211_CMD_ASSOCIATE(r1, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x98}, 0x20000000) io_setup(0x8f0, &(0x7f0000002400)=0x0) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xe, 0x4, 0x8, 0x1}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4, 0x0, 0x7fff}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{}, &(0x7f0000000200), &(0x7f0000000240)=r3}, 0x20) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) io_submit(r2, 0x1, &(0x7f0000000340)=[&(0x7f0000000100)={0x2000000000, 0x4, 0x0, 0x1, 0x0, r0, &(0x7f0000000040)="0200ffff0000", 0x6, 0x0, 0x0, 0x2}]) 244.128461ms ago: executing program 8 (id=8142): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000ac0), r1) sendmsg$NLBL_CALIPSO_C_ADD(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000440)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01002cbd7000fcdbdf25010000000800010000000000080002"], 0x24}, 0x1, 0x0, 0x0, 0xc840}, 0x24020010) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001c00)=@base={0xb, 0x5, 0x7, 0x9, 0x1}, 0x50) open_by_handle_at(r3, &(0x7f0000000780)=@FILEID_UDF_WITH_PARENT={0x14, 0x52, {{0x3, 0x5, 0xfff7}, 0x2, 0x8}}, 0x8002) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) readv(r4, &(0x7f00000006c0)=[{&(0x7f0000000180)=""/154, 0x9a}, {&(0x7f0000000000)=""/88, 0x58}, {&(0x7f0000000280)=""/207, 0xcf}, {&(0x7f0000000380)=""/44, 0x2c}, {&(0x7f00000003c0)=""/64, 0x40}, {&(0x7f00000004c0)=""/68, 0x44}, {&(0x7f0000000580)=""/201, 0xc9}, {&(0x7f0000000400)=""/10, 0xa}, {&(0x7f0000000680)=""/5, 0x5}], 0x9) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xbb) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0xa, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="6a0ac4ff000000007110a0000000000095"], &(0x7f0000000480)='GPL\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000540)='inet_sock_set_state\x00', r5}, 0x10) listen(r0, 0x3) 241.187661ms ago: executing program 5 (id=8143): r0 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) shutdown(r2, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x24, &(0x7f0000000100)=0x1, 0x4) recvmmsg(r2, &(0x7f0000002800)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000d80)=""/1, 0x1}, 0x436}], 0x1, 0x0, 0x0) write$sndseq(r1, &(0x7f0000000180)=[{0x0, 0x47, 0x0, 0x0, @tick, {0x40, 0xff}, {0x0, 0x9}, @queue={0xee, {0x7, 0xc9a}}}, {0x0, 0x0, 0x0, 0x0, @time={0x367f, 0xfffffffd}, {}, {0x80}, @connect={{0x40, 0x7}, {0x80, 0xf6}}}], 0x38) prlimit64(0x0, 0xe, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xffd, 0x7}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r3}, &(0x7f0000000040), &(0x7f0000000080)=r4}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r5}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000e, 0x20c44fb6edc09a38, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) rt_sigpending(0x0, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_DELPDP(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x2c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfc, {}, [@GTPA_LINK={0x8}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_FAMILY={0x5, 0xd, 0x15}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) r9 = fsopen(&(0x7f0000001340)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r9, 0x6, 0x0, 0x0, 0x0) r10 = fsmount(r9, 0x200000000000000, 0x0) openat$cgroup_procs(r10, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) 211.905413ms ago: executing program 8 (id=8144): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) r1 = socket(0x1e, 0x4, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r2}, 0x18) r3 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x0, 0x1}, 0x10) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r1, &(0x7f00000030c0)=[{{0x0, 0xa9cc7003, &(0x7f0000000400)=[{&(0x7f00000000c0)="ee", 0x3514}], 0x1}}], 0x400000000000181, 0x9200000000000000) close_range(r0, 0xffffffffffffffff, 0x0) 134.95237ms ago: executing program 8 (id=8145): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x3, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x8, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x1f00, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="070002000000fddbdf2505000000180001801400020073797a5f74756e00000000000000007d0800038004000380080005"], 0x3c}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xa, 0x8, &(0x7f0000000740)=ANY=[], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) creat(&(0x7f0000000100)='./file0\x00', 0xd931d3864d39dc4a) pipe2(&(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) splice(r4, 0x0, r3, 0x0, 0x6, 0x0) fcntl$setpipe(r3, 0x407, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) sendmsg$NFNL_MSG_CTHELPER_GET(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x14, 0x1, 0x9, 0x101}, 0x14}}, 0x0) r5 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xa0}}, 0x0) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=ANY=[@ANYBLOB="240000001900010028bd7000fbdbdf251d01020008000900", @ANYRES32, @ANYBLOB="08000a00e1"], 0x24}, 0x1, 0x0, 0x0, 0x4048855}, 0x30004016) sendmmsg(r6, &(0x7f0000000000), 0x400000000000235, 0x0) bind(r0, &(0x7f0000000440)=@ieee802154={0x24, @short={0x2, 0x0, 0xfffe}}, 0x80) bind$llc(r5, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x81, 0x42}, 0x10) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c500000001f0ffff"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r7}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008001500b7040000000000008500000058"], 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000780)='sys_enter\x00', r9}, 0x18) ioprio_get$pid(0x1, 0x0) connect$llc(r5, &(0x7f0000000340)={0x1a, 0x322, 0x0, 0x0, 0x4, 0x90, @random="48bd00"}, 0x10) 87.008873ms ago: executing program 5 (id=8146): r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1fff}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="09000000040000000200000001"], 0x50) syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/3\x00') r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00'}, 0x10) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40010) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x3, 0x4}) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r2}, 0xc) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="4c000000100003052cbd7000fedbdf2500000020", @ANYRES32=0x0, @ANYBLOB="0000007aa7080400240012800b0001040000007365630000140002800500060000000000050007000000000008000500", @ANYRES32], 0x4c}}, 0x80) 50.362516ms ago: executing program 5 (id=8147): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x3, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}]}, &(0x7f00000000c0)='GPL\x00', 0x8, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x1f00, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4000}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="070002000000fddbdf2505000000180001801400020073797a5f74756e00000000000000007d0800038004000380080005"], 0x3c}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xa, 0x8, &(0x7f0000000740)=ANY=[], &(0x7f0000000580)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x18, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) creat(&(0x7f0000000100)='./file0\x00', 0xd931d3864d39dc4a) pipe2(&(0x7f0000001440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) splice(r4, 0x0, r3, 0x0, 0x6, 0x0) fcntl$setpipe(r3, 0x407, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) sendmsg$NFNL_MSG_CTHELPER_GET(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)={0x14, 0x1, 0x9, 0x101}, 0x14}}, 0x0) r5 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xa0}}, 0x0) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000840)=ANY=[@ANYBLOB="240000001900010028bd7000fbdbdf251d01020008000900", @ANYRES32, @ANYBLOB="08000a00e1"], 0x24}, 0x1, 0x0, 0x0, 0x4048855}, 0x30004016) sendmmsg(r6, &(0x7f0000000000), 0x400000000000235, 0x0) bind(r0, &(0x7f0000000440)=@ieee802154={0x24, @short={0x2, 0x0, 0xfffe}}, 0x80) bind$llc(r5, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x81, 0x42}, 0x10) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c500000001f0ff"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r7}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008001500b7040000000000008500000058"], 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000780)='sys_enter\x00', r9}, 0x18) ioprio_get$pid(0x1, 0x0) connect$llc(r5, &(0x7f0000000340)={0x1a, 0x322, 0x0, 0x0, 0x4, 0x90, @random="48bd00"}, 0x10) 22.868789ms ago: executing program 2 (id=8148): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/attr/keycreate\x00', 0x2, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000200)={r0, 0x2, 0x34, 0x4000000000001}) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000000240)=0x9, 0x4) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000380)=0x2, 0x4) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000002900000005"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000001100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) r6 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r6, &(0x7f0000000000)={0xa, 0x4e24, 0x68c, @local, 0x1}, 0x1c) writev(r6, &(0x7f00000000c0)=[{&(0x7f0000000100)=',', 0xffdf}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0, r5, 0x0, 0x4}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000540)={0x1, &(0x7f0000000000)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r7 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) preadv2(r7, 0x0, 0x0, 0x5, 0x8, 0x1e) quotactl_fd$Q_QUOTAOFF(0xffffffffffffffff, 0xffffffff80000302, 0x0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x7fffffffffe, &(0x7f0000006680)) r8 = syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f0000000280)='./file0\x00', 0x14806, &(0x7f0000000080)=ANY=[], 0x0, 0x700, &(0x7f0000000a40)="$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") futimesat(r8, &(0x7f0000000000)='./file1\x00', 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000060060000000000000000000018110000", @ANYRES32=r4, @ANYRESOCT=r6], &(0x7f00000003c0)='syzkaller\x00', 0xc, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000180)='kfree\x00', r9}, 0x18) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480), 0x4) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000002001000001"], 0x50) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x18, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000730000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000340)='kfree\x00', r11, 0x0, 0x200000000}, 0x18) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r10, @ANYBLOB="0000000000000000b70300000000000085000000a2b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x7, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r12}, 0x18) 0s ago: executing program 2 (id=8149): msgget$private(0x0, 0x790) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0, r0}, 0x18) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000000)=0x80, 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000180)=0x800, 0x4) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r3, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000840)={0x58, r4, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [{{0x8, 0x1, r5}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffbfff9}}}]}}]}, 0x58}, 0x1, 0x1000000, 0x0, 0x24004000}, 0x24040840) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, 0x0, &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) prctl$PR_SET_NAME(0xf, 0x0) process_vm_readv(0x0, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) r6 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r7 = fcntl$dupfd(r6, 0x406, r6) ioctl$SG_IO(r7, 0x2285, &(0x7f0000000040)={0x53, 0x0, 0x6, 0x0, @buffer={0x17, 0x38, &(0x7f0000000200)=""/56}, &(0x7f0000000380)="259374c96ee3", 0x0, 0x0, 0x0, 0x0, 0x0}) kernel console output (not intermixed with test programs): _inode+0x7b/0x370 [ 429.009817][T31141] hugetlb_file_setup+0x192/0x3d0 [ 429.009911][T31141] ksys_mmap_pgoff+0x157/0x310 [ 429.009941][T31141] x64_sys_call+0x14a3/0x2ff0 [ 429.010009][T31141] do_syscall_64+0xd2/0x200 [ 429.010030][T31141] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 429.010055][T31141] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 429.010146][T31141] RIP: 0033:0x7f03f522ebe9 [ 429.010162][T31141] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 429.010178][T31141] RSP: 002b:00007f03f3c97038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 429.010198][T31141] RAX: ffffffffffffffda RBX: 00007f03f5455fa0 RCX: 00007f03f522ebe9 [ 429.010212][T31141] RDX: 0000000000000002 RSI: 0000000000ff5000 RDI: 0000200000000000 [ 429.010225][T31141] RBP: 00007f03f3c97090 R08: ffffffffffffffff R09: 0000000000000000 [ 429.010238][T31141] R10: 000000000004c831 R11: 0000000000000246 R12: 0000000000000001 [ 429.010251][T31141] R13: 00007f03f5456038 R14: 00007f03f5455fa0 R15: 00007fffdb47ad08 [ 429.010313][T31141] [ 429.213866][T31155] netlink: 'syz.8.6632': attribute type 12 has an invalid length. [ 429.294893][T31027] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 429.309096][T31027] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 429.324093][T31027] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 429.337278][T31027] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 429.366259][T31174] vlan2: entered allmulticast mode [ 429.420873][T31178] FAULT_INJECTION: forcing a failure. [ 429.420873][T31178] name failslab, interval 1, probability 0, space 0, times 0 [ 429.433531][T31178] CPU: 0 UID: 0 PID: 31178 Comm: syz.2.6639 Not tainted 6.17.0-rc1-syzkaller-00199-gdfd4b508c8c6 #0 PREEMPT(voluntary) [ 429.433577][T31178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 429.433588][T31178] Call Trace: [ 429.433595][T31178] [ 429.433602][T31178] __dump_stack+0x1d/0x30 [ 429.433650][T31178] dump_stack_lvl+0xe8/0x140 [ 429.433717][T31178] dump_stack+0x15/0x1b [ 429.433734][T31178] should_fail_ex+0x265/0x280 [ 429.433753][T31178] should_failslab+0x8c/0xb0 [ 429.433780][T31178] kmem_cache_alloc_node_noprof+0x57/0x320 [ 429.433803][T31178] ? __alloc_skb+0x101/0x320 [ 429.433894][T31178] ? ida_alloc_range+0x68f/0x6c0 [ 429.433921][T31178] __alloc_skb+0x101/0x320 [ 429.433999][T31178] create_monitor_ctrl_open+0x107/0x4a0 [ 429.434031][T31178] hci_sock_bind+0x722/0x990 [ 429.434066][T31178] __sys_bind+0x1d1/0x2a0 [ 429.434099][T31178] __x64_sys_bind+0x3f/0x50 [ 429.434149][T31178] x64_sys_call+0x2b6e/0x2ff0 [ 429.434170][T31178] do_syscall_64+0xd2/0x200 [ 429.434195][T31178] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 429.434219][T31178] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 429.434276][T31178] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 429.434298][T31178] RIP: 0033:0x7f03f522ebe9 [ 429.434313][T31178] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 429.434368][T31178] RSP: 002b:00007f03f3c97038 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 429.434386][T31178] RAX: ffffffffffffffda RBX: 00007f03f5455fa0 RCX: 00007f03f522ebe9 [ 429.434399][T31178] RDX: 0000000000000006 RSI: 0000200000000280 RDI: 0000000000000004 [ 429.434424][T31178] RBP: 00007f03f3c97090 R08: 0000000000000000 R09: 0000000000000000 [ 429.434437][T31178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 429.434451][T31178] R13: 00007f03f5456038 R14: 00007f03f5455fa0 R15: 00007fffdb47ad08 [ 429.434471][T31178] [ 429.457780][T31027] 8021q: adding VLAN 0 to HW filter on device bond0 [ 429.462912][T31027] 8021q: adding VLAN 0 to HW filter on device team0 [ 429.467303][ T3863] bridge0: port 1(bridge_slave_0) entered blocking state [ 429.665078][ T3863] bridge0: port 1(bridge_slave_0) entered forwarding state [ 429.674565][ T3863] bridge0: port 2(bridge_slave_1) entered blocking state [ 429.681712][ T3863] bridge0: port 2(bridge_slave_1) entered forwarding state [ 429.781494][T31195] veth1_macvtap: left promiscuous mode [ 429.827384][T31200] netlink: 'syz.8.6647': attribute type 1 has an invalid length. [ 429.836515][T31027] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 429.996716][T31198] tipc: Started in network mode [ 430.001671][T31198] tipc: Node identity ac1414aa, cluster identity 4711 [ 430.013192][T31198] tipc: Enabled bearer , priority 10 [ 430.048133][T31027] veth0_vlan: entered promiscuous mode [ 430.057660][T31027] veth1_vlan: entered promiscuous mode [ 430.074733][T31027] veth0_macvtap: entered promiscuous mode [ 430.084248][T31027] veth1_macvtap: entered promiscuous mode [ 430.105179][T31027] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 430.130015][T31027] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 430.155348][ T3847] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 430.166219][ T3847] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 430.181614][ T3847] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 430.191110][ T3847] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 430.337488][T31259] __nla_validate_parse: 5 callbacks suppressed [ 430.337500][T31259] netlink: 76 bytes leftover after parsing attributes in process `syz.8.6655'. [ 430.541762][T31288] tipc: Started in network mode [ 430.546689][T31288] tipc: Node identity 0e373e6b04b1, cluster identity 4711 [ 430.553873][T31288] tipc: Enabled bearer , priority 0 [ 430.566138][T31275] tipc: Resetting bearer [ 430.594496][T31275] tipc: Disabling bearer [ 430.740168][T31329] netlink: 32 bytes leftover after parsing attributes in process `syz.5.6673'. [ 430.790669][T31336] vhci_hcd: default hub control req: 0310 v0009 i0003 l0 [ 431.128547][T27866] tipc: Node number set to 2886997162 [ 431.145322][T31341] netlink: 'syz.7.6674': attribute type 1 has an invalid length. [ 431.243802][T20320] hid_parser_main: 33 callbacks suppressed [ 431.243818][T20320] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 431.257083][T20320] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 431.264506][T20320] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 431.272048][T20320] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 431.279461][T20320] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 431.286832][T20320] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 431.294289][T20320] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 431.301693][T20320] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 431.309127][T20320] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 431.316488][T20320] hid-generic 0000:0000:0000.0012: unknown main item tag 0x0 [ 431.338927][T31341] netlink: 4 bytes leftover after parsing attributes in process `syz.7.6674'. [ 431.376867][T20320] hid-generic 0000:0000:0000.0012: hidraw0: HID v8.00 Device [syz1] on syz0 [ 431.558618][ T29] kauditd_printk_skb: 931 callbacks suppressed [ 431.558633][ T29] audit: type=1326 audit(2000000000.210:44185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31345 comm="syz.5.6677" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efe4aafebe9 code=0x7ffc0000 [ 431.588657][ T29] audit: type=1326 audit(2000000000.210:44186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31345 comm="syz.5.6677" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efe4aafebe9 code=0x7ffc0000 [ 431.636486][T31405] netlink: 404 bytes leftover after parsing attributes in process `syz.2.6691'. [ 431.647492][ T29] audit: type=1400 audit(2000000000.300:44187): avc: denied { read } for pid=31410 comm="syz.5.6695" name="rtc0" dev="devtmpfs" ino=244 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 431.670746][ T29] audit: type=1400 audit(2000000000.300:44188): avc: denied { open } for pid=31410 comm="syz.5.6695" path="/dev/rtc0" dev="devtmpfs" ino=244 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 431.696217][T31409] FAULT_INJECTION: forcing a failure. [ 431.696217][T31409] name failslab, interval 1, probability 0, space 0, times 0 [ 431.708950][T31409] CPU: 1 UID: 0 PID: 31409 Comm: syz.4.6694 Not tainted 6.17.0-rc1-syzkaller-00199-gdfd4b508c8c6 #0 PREEMPT(voluntary) [ 431.708983][T31409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 431.708995][T31409] Call Trace: [ 431.709001][T31409] [ 431.709009][T31409] __dump_stack+0x1d/0x30 [ 431.709030][T31409] dump_stack_lvl+0xe8/0x140 [ 431.709140][T31409] dump_stack+0x15/0x1b [ 431.709163][T31409] should_fail_ex+0x265/0x280 [ 431.709184][T31409] should_failslab+0x8c/0xb0 [ 431.709283][T31409] __kmalloc_noprof+0xa5/0x3e0 [ 431.709318][T31409] ? kobject_get_path+0x92/0x1c0 [ 431.709348][T31409] kobject_get_path+0x92/0x1c0 [ 431.709457][T31409] kobject_uevent_env+0x1da/0x570 [ 431.709478][T31409] ? device_pm_check_callbacks+0x683/0x6a0 [ 431.709510][T31409] kobject_uevent+0x1d/0x30 [ 431.709531][T31409] device_del+0x710/0x790 [ 431.709556][T31409] device_unregister+0x15/0x40 [ 431.709637][T31409] bdi_unregister+0x307/0x3a0 [ 431.709665][T31409] __del_gendisk+0x2c3/0x570 [ 431.709691][T31409] del_gendisk+0xac/0xf0 [ 431.709769][T31409] loop_remove+0x26/0x80 [ 431.709827][T31409] loop_control_ioctl+0x3b3/0x3f0 [ 431.709857][T31409] ? __pfx_loop_control_ioctl+0x10/0x10 [ 431.709887][T31409] __se_sys_ioctl+0xcb/0x140 [ 431.709925][T31409] __x64_sys_ioctl+0x43/0x50 [ 431.709955][T31409] x64_sys_call+0x1816/0x2ff0 [ 431.709977][T31409] do_syscall_64+0xd2/0x200 [ 431.710002][T31409] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 431.710111][T31409] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 431.710181][T31409] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 431.710206][T31409] RIP: 0033:0x7f3241bcebe9 [ 431.710222][T31409] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 431.710237][T31409] RSP: 002b:00007f3240637038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 431.710254][T31409] RAX: ffffffffffffffda RBX: 00007f3241df5fa0 RCX: 00007f3241bcebe9 [ 431.710267][T31409] RDX: 000000000000000a RSI: 0000000000004c81 RDI: 0000000000000004 [ 431.710290][T31409] RBP: 00007f3240637090 R08: 0000000000000000 R09: 0000000000000000 [ 431.710303][T31409] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 431.710315][T31409] R13: 00007f3241df6038 R14: 00007f3241df5fa0 R15: 00007fff7c6ef5b8 [ 431.710331][T31409] [ 431.726131][ T29] audit: type=1400 audit(2000000000.310:44189): avc: denied { read } for pid=31408 comm="syz.4.6694" name="loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 431.738693][T31421] tipc: Enabled bearer , priority 0 [ 431.741082][ T29] audit: type=1400 audit(2000000000.310:44190): avc: denied { open } for pid=31408 comm="syz.4.6694" path="/dev/loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 431.786471][T31411] netlink: 'syz.5.6695': attribute type 3 has an invalid length. [ 431.788993][ T29] audit: type=1400 audit(2000000000.310:44191): avc: denied { ioctl } for pid=31408 comm="syz.4.6694" path="/dev/loop-control" dev="devtmpfs" ino=99 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 431.789019][ T29] audit: type=1400 audit(2000000000.340:44192): avc: denied { create } for pid=31410 comm="syz.5.6695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 431.826160][ T29] audit: type=1400 audit(2000000000.440:44193): avc: denied { ioctl } for pid=31410 comm="syz.5.6695" path="/dev/rtc0" dev="devtmpfs" ino=244 ioctlcmd=0x7013 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 432.086546][ T29] audit: type=1400 audit(2000000000.520:44194): avc: denied { setopt } for pid=31426 comm="syz.7.6696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 432.110027][T31407] tipc: Disabling bearer [ 432.313059][T31470] netlink: 8 bytes leftover after parsing attributes in process `syz.8.6705'. [ 432.655585][T31480] FAULT_INJECTION: forcing a failure. [ 432.655585][T31480] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 432.668699][T31480] CPU: 1 UID: 0 PID: 31480 Comm: syz.8.6707 Not tainted 6.17.0-rc1-syzkaller-00199-gdfd4b508c8c6 #0 PREEMPT(voluntary) [ 432.668726][T31480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 432.668793][T31480] Call Trace: [ 432.668798][T31480] [ 432.668804][T31480] __dump_stack+0x1d/0x30 [ 432.668822][T31480] dump_stack_lvl+0xe8/0x140 [ 432.668837][T31480] dump_stack+0x15/0x1b [ 432.668851][T31480] should_fail_ex+0x265/0x280 [ 432.668920][T31480] should_fail+0xb/0x20 [ 432.668934][T31480] should_fail_usercopy+0x1a/0x20 [ 432.668951][T31480] _copy_to_user+0x20/0xa0 [ 432.669023][T31480] simple_read_from_buffer+0xb5/0x130 [ 432.669041][T31480] proc_fail_nth_read+0x10e/0x150 [ 432.669063][T31480] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 432.669147][T31480] vfs_read+0x1a5/0x770 [ 432.669163][T31480] ? __rcu_read_unlock+0x4f/0x70 [ 432.669181][T31480] ? __fget_files+0x184/0x1c0 [ 432.669232][T31480] ksys_read+0xda/0x1a0 [ 432.669250][T31480] __x64_sys_read+0x40/0x50 [ 432.669266][T31480] x64_sys_call+0x27bc/0x2ff0 [ 432.669283][T31480] do_syscall_64+0xd2/0x200 [ 432.669332][T31480] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 432.669350][T31480] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 432.669370][T31480] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 432.669412][T31480] RIP: 0033:0x7f6898aad5fc [ 432.669425][T31480] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 432.669439][T31480] RSP: 002b:00007f6897517030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 432.669479][T31480] RAX: ffffffffffffffda RBX: 00007f6898cd5fa0 RCX: 00007f6898aad5fc [ 432.669489][T31480] RDX: 000000000000000f RSI: 00007f68975170a0 RDI: 0000000000000006 [ 432.669500][T31480] RBP: 00007f6897517090 R08: 0000000000000000 R09: 0000000000000000 [ 432.669511][T31480] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 432.669521][T31480] R13: 00007f6898cd6038 R14: 00007f6898cd5fa0 R15: 00007ffd10126578 [ 432.669537][T31480] [ 432.706256][T31486] veth0: entered promiscuous mode [ 432.888906][T31486] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6709'. [ 433.187825][T31517] netlink: 12 bytes leftover after parsing attributes in process `syz.5.6721'. [ 433.196871][T31517] netlink: 12 bytes leftover after parsing attributes in process `syz.5.6721'. [ 433.217642][T31519] netlink: 404 bytes leftover after parsing attributes in process `syz.8.6718'. [ 433.789162][T31566] netlink: 404 bytes leftover after parsing attributes in process `syz.5.6728'. [ 434.035370][T31589] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 434.063624][T31589] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 434.134508][T31589] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 434.268601][T31589] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 434.376038][ T3847] netdevsim netdevsim8 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 434.406171][ T3857] netdevsim netdevsim8 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 434.423226][ T3857] netdevsim netdevsim8 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 434.450075][ T3857] netdevsim netdevsim8 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 434.762462][T31686] netlink: 'syz.2.6749': attribute type 3 has an invalid length. [ 435.190514][T27866] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=27866 comm=kworker/1:8 [ 435.564467][T31751] __nla_validate_parse: 7 callbacks suppressed [ 435.564542][T31751] netlink: 32 bytes leftover after parsing attributes in process `syz.7.6762'. [ 435.624904][T31758] sd 0:0:1:0: device reset [ 435.690579][T31765] netlink: 'syz.7.6765': attribute type 10 has an invalid length. [ 435.724666][T31765] team0: Port device dummy0 added [ 435.770194][T31780] netlink: 'syz.8.6767': attribute type 21 has an invalid length. [ 435.782692][T31780] netlink: 132 bytes leftover after parsing attributes in process `syz.8.6767'. [ 435.996901][T31805] netlink: 'syz.2.6771': attribute type 10 has an invalid length. [ 436.139289][T31805] bond0: (slave dummy0): Releasing backup interface [ 436.162632][T31805] team0: Port device dummy0 added [ 436.489285][T31824] sd 0:0:1:0: device reset [ 436.590602][T31829] netlink: 200 bytes leftover after parsing attributes in process `syz.5.6777'. [ 436.603314][ T29] kauditd_printk_skb: 497 callbacks suppressed [ 436.603326][ T29] audit: type=1400 audit(2000000005.260:44690): avc: denied { write } for pid=31827 comm="syz.5.6777" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 436.604340][T31828] netlink: 4 bytes leftover after parsing attributes in process `syz.8.6778'. [ 436.712894][ T29] audit: type=1400 audit(2000000005.370:44691): avc: denied { view } for pid=31826 comm="syz.8.6778" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 436.732596][T31830] netlink: 'syz.8.6778': attribute type 21 has an invalid length. [ 436.740505][T31830] netlink: 'syz.8.6778': attribute type 4 has an invalid length. [ 436.794567][ T29] audit: type=1326 audit(2000000005.450:44692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31841 comm="syz.7.6783" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f365b5cebe9 code=0x7ffc0000 [ 436.840787][ T29] audit: type=1326 audit(2000000005.470:44693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31841 comm="syz.7.6783" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f365b5cebe9 code=0x7ffc0000 [ 436.846441][T31846] netlink: 404 bytes leftover after parsing attributes in process `syz.4.6781'. [ 436.864394][ T29] audit: type=1326 audit(2000000005.470:44694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31841 comm="syz.7.6783" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f365b5cebe9 code=0x7ffc0000 [ 436.896918][ T29] audit: type=1326 audit(2000000005.470:44695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31841 comm="syz.7.6783" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f365b5cebe9 code=0x7ffc0000 [ 436.920466][ T29] audit: type=1326 audit(2000000005.470:44696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31841 comm="syz.7.6783" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f365b5cebe9 code=0x7ffc0000 [ 436.944044][ T29] audit: type=1326 audit(2000000005.470:44697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31841 comm="syz.7.6783" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f365b5cebe9 code=0x7ffc0000 [ 436.967655][ T29] audit: type=1326 audit(2000000005.470:44698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31841 comm="syz.7.6783" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f365b5cebe9 code=0x7ffc0000 [ 436.991217][ T29] audit: type=1326 audit(2000000005.470:44699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31841 comm="syz.7.6783" exe="/root/syz-executor" sig=0 arch=c000003e syscall=430 compat=0 ip=0x7f365b5cebe9 code=0x7ffc0000 [ 437.095173][T31877] random: crng reseeded on system resumption [ 437.174467][T31884] netlink: 48 bytes leftover after parsing attributes in process `syz.7.6787'. [ 437.232028][T31891] sd 0:0:1:0: device reset [ 437.496910][T31919] netlink: 120 bytes leftover after parsing attributes in process `syz.5.6794'. [ 437.844188][T31954] veth0: entered allmulticast mode [ 438.040955][T31986] netlink: 404 bytes leftover after parsing attributes in process `syz.5.6809'. [ 439.036584][T32050] FAULT_INJECTION: forcing a failure. [ 439.036584][T32050] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 439.049743][T32050] CPU: 1 UID: 0 PID: 32050 Comm: syz.8.6831 Not tainted 6.17.0-rc1-syzkaller-00199-gdfd4b508c8c6 #0 PREEMPT(voluntary) [ 439.049772][T32050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 439.049852][T32050] Call Trace: [ 439.049858][T32050] [ 439.049866][T32050] __dump_stack+0x1d/0x30 [ 439.049887][T32050] dump_stack_lvl+0xe8/0x140 [ 439.049907][T32050] dump_stack+0x15/0x1b [ 439.049924][T32050] should_fail_ex+0x265/0x280 [ 439.049954][T32050] should_fail+0xb/0x20 [ 439.049972][T32050] should_fail_usercopy+0x1a/0x20 [ 439.049994][T32050] _copy_to_user+0x20/0xa0 [ 439.050037][T32050] simple_read_from_buffer+0xb5/0x130 [ 439.050060][T32050] proc_fail_nth_read+0x10e/0x150 [ 439.050156][T32050] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 439.050182][T32050] vfs_read+0x1a5/0x770 [ 439.050202][T32050] ? __rcu_read_unlock+0x4f/0x70 [ 439.050267][T32050] ? __fget_files+0x184/0x1c0 [ 439.050290][T32050] ? __sys_bind+0x223/0x2a0 [ 439.050354][T32050] ksys_read+0xda/0x1a0 [ 439.050461][T32050] __x64_sys_read+0x40/0x50 [ 439.050482][T32050] x64_sys_call+0x27bc/0x2ff0 [ 439.050504][T32050] do_syscall_64+0xd2/0x200 [ 439.050529][T32050] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 439.050604][T32050] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 439.050670][T32050] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 439.050692][T32050] RIP: 0033:0x7f6898aad5fc [ 439.050707][T32050] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 439.050789][T32050] RSP: 002b:00007f6897517030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 439.050809][T32050] RAX: ffffffffffffffda RBX: 00007f6898cd5fa0 RCX: 00007f6898aad5fc [ 439.050823][T32050] RDX: 000000000000000f RSI: 00007f68975170a0 RDI: 0000000000000003 [ 439.050836][T32050] RBP: 00007f6897517090 R08: 0000000000000000 R09: 0000000000000000 [ 439.050849][T32050] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 439.050862][T32050] R13: 00007f6898cd6038 R14: 00007f6898cd5fa0 R15: 00007ffd10126578 [ 439.050904][T32050] [ 439.418063][T32059] netlink: 48 bytes leftover after parsing attributes in process `syz.8.6835'. [ 439.465986][T32069] netlink: 404 bytes leftover after parsing attributes in process `syz.7.6834'. [ 440.282480][T32160] netdevsim netdevsim2 netdevsim0: entered promiscuous mode [ 440.617713][T32199] __nla_validate_parse: 4 callbacks suppressed [ 440.617727][T32199] netlink: 48 bytes leftover after parsing attributes in process `syz.2.6862'. [ 440.723485][T32216] netlink: 40 bytes leftover after parsing attributes in process `syz.2.6869'. [ 440.760870][T32220] FAULT_INJECTION: forcing a failure. [ 440.760870][T32220] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 440.774070][T32220] CPU: 0 UID: 0 PID: 32220 Comm: syz.4.6871 Not tainted 6.17.0-rc1-syzkaller-00199-gdfd4b508c8c6 #0 PREEMPT(voluntary) [ 440.774097][T32220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 440.774110][T32220] Call Trace: [ 440.774117][T32220] [ 440.774124][T32220] __dump_stack+0x1d/0x30 [ 440.774143][T32220] dump_stack_lvl+0xe8/0x140 [ 440.774170][T32220] dump_stack+0x15/0x1b [ 440.774187][T32220] should_fail_ex+0x265/0x280 [ 440.774208][T32220] should_fail+0xb/0x20 [ 440.774233][T32220] should_fail_usercopy+0x1a/0x20 [ 440.774256][T32220] strncpy_from_user+0x25/0x230 [ 440.774279][T32220] ? kmem_cache_alloc_noprof+0x186/0x310 [ 440.774376][T32220] ? getname_flags+0x80/0x3b0 [ 440.774402][T32220] getname_flags+0xae/0x3b0 [ 440.774429][T32220] path_removexattrat+0xf5/0x570 [ 440.774519][T32220] __x64_sys_lremovexattr+0x3b/0x50 [ 440.774581][T32220] x64_sys_call+0x2e23/0x2ff0 [ 440.774616][T32220] do_syscall_64+0xd2/0x200 [ 440.774780][T32220] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 440.774838][T32220] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 440.774916][T32220] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 440.774936][T32220] RIP: 0033:0x7f3241bcebe9 [ 440.775003][T32220] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 440.775020][T32220] RSP: 002b:00007f3240637038 EFLAGS: 00000246 ORIG_RAX: 00000000000000c6 [ 440.775056][T32220] RAX: ffffffffffffffda RBX: 00007f3241df5fa0 RCX: 00007f3241bcebe9 [ 440.775070][T32220] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000200000000000 [ 440.775081][T32220] RBP: 00007f3240637090 R08: 0000000000000000 R09: 0000000000000000 [ 440.775092][T32220] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 440.775102][T32220] R13: 00007f3241df6038 R14: 00007f3241df5fa0 R15: 00007fff7c6ef5b8 [ 440.775119][T32220] [ 441.497845][T32248] netlink: 48 bytes leftover after parsing attributes in process `syz.7.6879'. [ 441.725447][ T29] kauditd_printk_skb: 825 callbacks suppressed [ 441.725462][ T29] audit: type=1326 audit(2000000010.380:45525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32257 comm="syz.7.6884" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f365b5cebe9 code=0x7ffc0000 [ 441.755325][ T29] audit: type=1326 audit(2000000010.380:45526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32257 comm="syz.7.6884" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f365b5cebe9 code=0x7ffc0000 [ 441.779117][ T29] audit: type=1326 audit(2000000010.380:45527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32257 comm="syz.7.6884" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f365b5cebe9 code=0x7ffc0000 [ 441.802740][ T29] audit: type=1326 audit(2000000010.380:45528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32257 comm="syz.7.6884" exe="/root/syz-executor" sig=0 arch=c000003e syscall=327 compat=0 ip=0x7f365b5cebe9 code=0x7ffc0000 [ 441.826318][ T29] audit: type=1326 audit(2000000010.380:45529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32257 comm="syz.7.6884" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f365b5cebe9 code=0x7ffc0000 [ 441.849978][ T29] audit: type=1326 audit(2000000010.380:45530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32257 comm="syz.7.6884" exe="/root/syz-executor" sig=0 arch=c000003e syscall=443 compat=0 ip=0x7f365b5cebe9 code=0x7ffc0000 [ 441.873616][ T29] audit: type=1326 audit(2000000010.380:45531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32257 comm="syz.7.6884" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f365b5cebe9 code=0x7ffc0000 [ 441.925378][ T29] audit: type=1326 audit(2000000010.380:45532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32257 comm="syz.7.6884" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f365b5cebe9 code=0x7ffc0000 [ 441.949085][ T29] audit: type=1326 audit(2000000010.380:45533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32257 comm="syz.7.6884" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f365b5cebe9 code=0x7ffc0000 [ 441.972897][ T29] audit: type=1326 audit(2000000010.380:45534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32257 comm="syz.7.6884" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f365b5cebe9 code=0x7ffc0000 [ 442.199539][T32275] netlink: 48 bytes leftover after parsing attributes in process `syz.4.6891'. [ 442.299156][T32281] netlink: 404 bytes leftover after parsing attributes in process `syz.4.6893'. [ 442.809456][T32328] netlink: 404 bytes leftover after parsing attributes in process `syz.5.6895'. [ 443.387465][T32414] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 443.446455][T32422] netlink: 'syz.7.6914': attribute type 10 has an invalid length. [ 443.497422][T32422] netlink: 'syz.7.6914': attribute type 10 has an invalid length. [ 443.515418][T32435] netlink: 404 bytes leftover after parsing attributes in process `syz.4.6917'. [ 443.561614][T32422] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 443.570691][T32422] team0: Port device dummy0 removed [ 443.583682][T32422] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 443.754899][T32465] netlink: 404 bytes leftover after parsing attributes in process `syz.4.6929'. [ 443.814410][T32472] FAULT_INJECTION: forcing a failure. [ 443.814410][T32472] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 443.827547][T32472] CPU: 1 UID: 0 PID: 32472 Comm: syz.8.6932 Not tainted 6.17.0-rc1-syzkaller-00199-gdfd4b508c8c6 #0 PREEMPT(voluntary) [ 443.827576][T32472] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 443.827588][T32472] Call Trace: [ 443.827594][T32472] [ 443.827602][T32472] __dump_stack+0x1d/0x30 [ 443.827687][T32472] dump_stack_lvl+0xe8/0x140 [ 443.827762][T32472] dump_stack+0x15/0x1b [ 443.827776][T32472] should_fail_ex+0x265/0x280 [ 443.827797][T32472] should_fail+0xb/0x20 [ 443.827814][T32472] should_fail_usercopy+0x1a/0x20 [ 443.827834][T32472] _copy_from_user+0x1c/0xb0 [ 443.827940][T32472] ___sys_recvmsg+0xaa/0x370 [ 443.827962][T32472] ? 0xffffffff81000000 [ 443.827974][T32472] ? __rcu_read_unlock+0x4f/0x70 [ 443.828000][T32472] __x64_sys_recvmsg+0xd1/0x160 [ 443.828023][T32472] x64_sys_call+0x2b42/0x2ff0 [ 443.828095][T32472] do_syscall_64+0xd2/0x200 [ 443.828116][T32472] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 443.828166][T32472] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 443.828190][T32472] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 443.828259][T32472] RIP: 0033:0x7f6898aaebe9 [ 443.828307][T32472] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 443.828322][T32472] RSP: 002b:00007f6897517038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 443.828338][T32472] RAX: ffffffffffffffda RBX: 00007f6898cd5fa0 RCX: 00007f6898aaebe9 [ 443.828349][T32472] RDX: 0000000000000000 RSI: 0000200000001a80 RDI: 0000000000000006 [ 443.828364][T32472] RBP: 00007f6897517090 R08: 0000000000000000 R09: 0000000000000000 [ 443.828374][T32472] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 443.828384][T32472] R13: 00007f6898cd6038 R14: 00007f6898cd5fa0 R15: 00007ffd10126578 [ 443.828412][T32472] [ 443.842044][T32455] netlink: 16 bytes leftover after parsing attributes in process `syz.5.6925'. [ 444.762005][T32510] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 444.801688][T32510] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 444.825832][T32520] IPv6: Can't replace route, no match found [ 444.860451][T32510] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 444.952869][T32510] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 444.971781][T32527] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 445.014472][ T3830] netdevsim netdevsim7 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 445.030667][T32527] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 445.042314][ T3830] netdevsim netdevsim7 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 445.050744][ T3830] netdevsim netdevsim7 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 445.061471][ T3843] netdevsim netdevsim7 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 445.083111][T32527] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 445.151626][T32527] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 445.202111][T32542] sd 0:0:1:0: device reset [ 445.208033][T32542] usb usb1: check_ctrlrecip: process 32542 (syz.8.6960) requesting ep 01 but needs 81 [ 445.218104][T32542] vhci_hcd: default hub control req: 020f v0004 i0001 l0 [ 445.233285][ T3818] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 445.255621][T32542] usb usb9: usbfs: process 32542 (syz.8.6960) did not claim interface 0 before use [ 445.266536][ T3818] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 445.273521][T32542] vhci_hcd: default hub control req: a100 v0000 i0000 l0 [ 445.276785][ T3818] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 445.292920][ T3818] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 446.022325][T32570] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6965'. [ 446.368630][T32563] veth0: entered promiscuous mode [ 446.377736][T32581] netlink: 404 bytes leftover after parsing attributes in process `syz.4.6970'. [ 446.391937][T32564] bridge0: entered promiscuous mode [ 446.399802][T32564] bridge0: port 3(macsec1) entered blocking state [ 446.406304][T32564] bridge0: port 3(macsec1) entered disabled state [ 446.413077][T32564] macsec1: entered allmulticast mode [ 446.418414][T32564] bridge0: entered allmulticast mode [ 446.426175][T32564] macsec1: left allmulticast mode [ 446.431283][T32564] bridge0: left allmulticast mode [ 446.436934][T32564] bridge0: left promiscuous mode [ 446.496587][T32596] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6971'. [ 446.645220][T32620] netlink: 404 bytes leftover after parsing attributes in process `syz.5.6973'. [ 446.703523][T32636] netlink: 4 bytes leftover after parsing attributes in process `syz.7.6983'. [ 446.750429][ T29] kauditd_printk_skb: 740 callbacks suppressed [ 446.750444][ T29] audit: type=1400 audit(2000000015.410:46275): avc: denied { setopt } for pid=32641 comm="syz.8.6984" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 446.791782][T32650] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 446.913184][T32663] FAULT_INJECTION: forcing a failure. [ 446.913184][T32663] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 446.926317][T32663] CPU: 1 UID: 0 PID: 32663 Comm: syz.7.6988 Not tainted 6.17.0-rc1-syzkaller-00199-gdfd4b508c8c6 #0 PREEMPT(voluntary) [ 446.926403][T32663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 446.926414][T32663] Call Trace: [ 446.926419][T32663] [ 446.926427][T32663] __dump_stack+0x1d/0x30 [ 446.926449][T32663] dump_stack_lvl+0xe8/0x140 [ 446.926465][T32663] dump_stack+0x15/0x1b [ 446.926480][T32663] should_fail_ex+0x265/0x280 [ 446.926532][T32663] should_fail+0xb/0x20 [ 446.926600][T32663] should_fail_usercopy+0x1a/0x20 [ 446.926648][T32663] _copy_from_user+0x1c/0xb0 [ 446.926676][T32663] kstrtouint_from_user+0x69/0xf0 [ 446.926695][T32663] ? 0xffffffff81000000 [ 446.926709][T32663] ? selinux_file_permission+0x1e4/0x320 [ 446.926733][T32663] proc_fail_nth_write+0x50/0x160 [ 446.926787][T32663] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 446.926811][T32663] vfs_write+0x266/0x960 [ 446.926828][T32663] ? vfs_read+0x4e6/0x770 [ 446.926845][T32663] ? __rcu_read_unlock+0x4f/0x70 [ 446.926995][T32663] ? __fget_files+0x184/0x1c0 [ 446.927086][T32663] ksys_write+0xda/0x1a0 [ 446.927110][T32663] __x64_sys_write+0x40/0x50 [ 446.927134][T32663] x64_sys_call+0x27fe/0x2ff0 [ 446.927155][T32663] do_syscall_64+0xd2/0x200 [ 446.927182][T32663] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 446.927214][T32663] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 446.927239][T32663] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 446.927261][T32663] RIP: 0033:0x7f365b5cd69f [ 446.927276][T32663] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 446.927348][T32663] RSP: 002b:00007f365a02f030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 446.927367][T32663] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f365b5cd69f [ 446.927380][T32663] RDX: 0000000000000001 RSI: 00007f365a02f0a0 RDI: 0000000000000003 [ 446.927393][T32663] RBP: 00007f365a02f090 R08: 0000000000000000 R09: 0000000000000000 [ 446.927430][T32663] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 446.927442][T32663] R13: 00007f365b7f6038 R14: 00007f365b7f5fa0 R15: 00007fff66cce2d8 [ 446.927462][T32663] [ 447.205641][ T29] audit: type=1326 audit(2000000015.860:46276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32687 comm="syz.8.6992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 447.229290][ T29] audit: type=1326 audit(2000000015.860:46277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32687 comm="syz.8.6992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 447.252867][ T29] audit: type=1326 audit(2000000015.860:46278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32687 comm="syz.8.6992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 447.276505][ T29] audit: type=1326 audit(2000000015.860:46279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32687 comm="syz.8.6992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 447.300106][ T29] audit: type=1326 audit(2000000015.860:46280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32687 comm="syz.8.6992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 447.324952][ T29] audit: type=1326 audit(2000000015.950:46281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32687 comm="syz.8.6992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=327 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 447.348552][ T29] audit: type=1326 audit(2000000015.950:46282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32687 comm="syz.8.6992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 447.372384][ T29] audit: type=1326 audit(2000000015.950:46283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32687 comm="syz.8.6992" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 447.372711][T32702] FAULT_INJECTION: forcing a failure. [ 447.372711][T32702] name failslab, interval 1, probability 0, space 0, times 0 [ 447.408645][T32702] CPU: 1 UID: 0 PID: 32702 Comm: syz.8.6993 Not tainted 6.17.0-rc1-syzkaller-00199-gdfd4b508c8c6 #0 PREEMPT(voluntary) [ 447.408673][T32702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 447.408686][T32702] Call Trace: [ 447.408691][T32702] [ 447.408697][T32702] __dump_stack+0x1d/0x30 [ 447.408758][T32702] dump_stack_lvl+0xe8/0x140 [ 447.408778][T32702] dump_stack+0x15/0x1b [ 447.408795][T32702] should_fail_ex+0x265/0x280 [ 447.408816][T32702] should_failslab+0x8c/0xb0 [ 447.408836][T32702] kmem_cache_alloc_noprof+0x50/0x310 [ 447.408907][T32702] ? skb_clone+0x151/0x1f0 [ 447.408925][T32702] skb_clone+0x151/0x1f0 [ 447.408941][T32702] __netlink_deliver_tap+0x2c9/0x500 [ 447.408961][T32702] netlink_unicast+0x66b/0x690 [ 447.409050][T32702] netlink_sendmsg+0x58b/0x6b0 [ 447.409069][T32702] ? __pfx_netlink_sendmsg+0x10/0x10 [ 447.409130][T32702] __sock_sendmsg+0x142/0x180 [ 447.409320][T32702] ____sys_sendmsg+0x31e/0x4e0 [ 447.409339][T32702] ___sys_sendmsg+0x17b/0x1d0 [ 447.409371][T32702] __x64_sys_sendmsg+0xd4/0x160 [ 447.409457][T32702] x64_sys_call+0x191e/0x2ff0 [ 447.409474][T32702] do_syscall_64+0xd2/0x200 [ 447.409510][T32702] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 447.409529][T32702] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 447.409579][T32702] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 447.409596][T32702] RIP: 0033:0x7f6898aaebe9 [ 447.409608][T32702] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 447.409623][T32702] RSP: 002b:00007f6897517038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 447.409698][T32702] RAX: ffffffffffffffda RBX: 00007f6898cd5fa0 RCX: 00007f6898aaebe9 [ 447.409709][T32702] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000005 [ 447.409719][T32702] RBP: 00007f6897517090 R08: 0000000000000000 R09: 0000000000000000 [ 447.409730][T32702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 447.409740][T32702] R13: 00007f6898cd6038 R14: 00007f6898cd5fa0 R15: 00007ffd10126578 [ 447.409755][T32702] [ 447.409772][T32702] netlink: 'syz.8.6993': attribute type 21 has an invalid length. [ 447.452321][T32703] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 447.471279][ T29] audit: type=1400 audit(2000000016.100:46284): avc: denied { read } for pid=32699 comm="syz.7.6994" name="ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 447.475006][T32702] netlink: 132 bytes leftover after parsing attributes in process `syz.8.6993'. [ 447.500071][T32705] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6995'. [ 447.504555][T32702] netlink: 'syz.8.6993': attribute type 1 has an invalid length. [ 447.793426][T32721] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5123 sclass=netlink_route_socket pid=32721 comm=syz.7.7002 [ 447.883352][T32730] netlink: 48 bytes leftover after parsing attributes in process `syz.8.7005'. [ 447.896075][T32732] netdevsim netdevsim7 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 447.982966][T32736] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7009'. [ 448.107571][T32732] netdevsim netdevsim7 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 448.168579][T32748] veth0: entered promiscuous mode [ 448.196194][T32732] netdevsim netdevsim7 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 448.326671][T32732] netdevsim netdevsim7 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 448.346606][T32745] netlink: 4 bytes leftover after parsing attributes in process `syz.8.7011'. [ 448.422893][T32758] FAULT_INJECTION: forcing a failure. [ 448.422893][T32758] name failslab, interval 1, probability 0, space 0, times 0 [ 448.435552][T32758] CPU: 0 UID: 0 PID: 32758 Comm: syz.2.7014 Not tainted 6.17.0-rc1-syzkaller-00199-gdfd4b508c8c6 #0 PREEMPT(voluntary) [ 448.435605][T32758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 448.435618][T32758] Call Trace: [ 448.435624][T32758] [ 448.435630][T32758] __dump_stack+0x1d/0x30 [ 448.435687][T32758] dump_stack_lvl+0xe8/0x140 [ 448.435703][T32758] dump_stack+0x15/0x1b [ 448.435786][T32758] should_fail_ex+0x265/0x280 [ 448.435853][T32758] ? audit_log_d_path+0x8d/0x150 [ 448.435959][T32758] should_failslab+0x8c/0xb0 [ 448.435994][T32758] __kmalloc_cache_noprof+0x4c/0x320 [ 448.436063][T32758] audit_log_d_path+0x8d/0x150 [ 448.436090][T32758] audit_log_d_path_exe+0x42/0x70 [ 448.436120][T32758] audit_log_task+0x1e9/0x250 [ 448.436149][T32758] audit_seccomp+0x61/0x100 [ 448.436249][T32758] ? __seccomp_filter+0x68c/0x10d0 [ 448.436268][T32758] __seccomp_filter+0x69d/0x10d0 [ 448.436292][T32758] ? _raw_spin_unlock+0x26/0x50 [ 448.436320][T32758] __secure_computing+0x82/0x150 [ 448.436362][T32758] syscall_trace_enter+0xcf/0x1e0 [ 448.436388][T32758] do_syscall_64+0xac/0x200 [ 448.436415][T32758] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 448.436439][T32758] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 448.436531][T32758] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 448.436549][T32758] RIP: 0033:0x7f03f522ebe9 [ 448.436562][T32758] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 448.436579][T32758] RSP: 002b:00007f03f3c97038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 448.436599][T32758] RAX: ffffffffffffffda RBX: 00007f03f5455fa0 RCX: 00007f03f522ebe9 [ 448.436806][T32758] RDX: 00000000fffffdab RSI: 0000200000000000 RDI: 0000000000000008 [ 448.436820][T32758] RBP: 00007f03f3c97090 R08: 0000000000000000 R09: 0000000000000000 [ 448.436910][T32758] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 448.436921][T32758] R13: 00007f03f5456038 R14: 00007f03f5455fa0 R15: 00007fffdb47ad08 [ 448.436938][T32758] [ 449.573223][ T316] binfmt_misc: register: failed to install interpreter file ./file2 [ 450.119173][ T354] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8192 sclass=netlink_route_socket pid=354 comm=syz.8.7032 [ 450.292876][ T361] bridge: RTM_NEWNEIGH with invalid ether address [ 450.623964][ T424] FAULT_INJECTION: forcing a failure. [ 450.623964][ T424] name failslab, interval 1, probability 0, space 0, times 0 [ 450.636646][ T424] CPU: 1 UID: 0 PID: 424 Comm: syz.5.7044 Not tainted 6.17.0-rc1-syzkaller-00199-gdfd4b508c8c6 #0 PREEMPT(voluntary) [ 450.636739][ T424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 450.636751][ T424] Call Trace: [ 450.636758][ T424] [ 450.636766][ T424] __dump_stack+0x1d/0x30 [ 450.636810][ T424] dump_stack_lvl+0xe8/0x140 [ 450.636832][ T424] dump_stack+0x15/0x1b [ 450.636849][ T424] should_fail_ex+0x265/0x280 [ 450.636883][ T424] should_failslab+0x8c/0xb0 [ 450.636908][ T424] kmem_cache_alloc_noprof+0x50/0x310 [ 450.637001][ T424] ? mm_alloc+0x2b/0xa0 [ 450.637074][ T424] mm_alloc+0x2b/0xa0 [ 450.637096][ T424] alloc_bprm+0x20e/0x350 [ 450.637118][ T424] do_execveat_common+0x12e/0x750 [ 450.637188][ T424] ? getname_flags+0x154/0x3b0 [ 450.637216][ T424] __x64_sys_execveat+0x73/0x90 [ 450.637239][ T424] x64_sys_call+0x1fec/0x2ff0 [ 450.637261][ T424] do_syscall_64+0xd2/0x200 [ 450.637338][ T424] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 450.637363][ T424] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 450.637389][ T424] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 450.637509][ T424] RIP: 0033:0x7efe4aafebe9 [ 450.637524][ T424] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 450.637613][ T424] RSP: 002b:00007efe4955f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 450.637634][ T424] RAX: ffffffffffffffda RBX: 00007efe4ad25fa0 RCX: 00007efe4aafebe9 [ 450.637648][ T424] RDX: 0000000000000000 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 450.637662][ T424] RBP: 00007efe4955f090 R08: 0000000000001000 R09: 0000000000000000 [ 450.637717][ T424] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 450.637729][ T424] R13: 00007efe4ad26038 R14: 00007efe4ad25fa0 R15: 00007ffd1e323978 [ 450.637749][ T424] [ 451.044812][ T466] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5123 sclass=netlink_route_socket pid=466 comm=syz.8.7057 [ 451.171327][ T472] __nla_validate_parse: 7 callbacks suppressed [ 451.171340][ T472] netlink: 40 bytes leftover after parsing attributes in process `syz.8.7058'. [ 451.233900][ T474] netlink: 4 bytes leftover after parsing attributes in process `syz.8.7060'. [ 451.283394][ T479] netlink: 32 bytes leftover after parsing attributes in process `syz.2.7062'. [ 451.333179][ T3830] netdevsim netdevsim7 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 451.342412][ T492] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5123 sclass=netlink_route_socket pid=492 comm=syz.2.7068 [ 451.380321][ T3830] netdevsim netdevsim7 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 451.407303][ T3830] netdevsim netdevsim7 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 451.428529][ T3830] netdevsim netdevsim7 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 451.516707][ T521] netlink: 4 bytes leftover after parsing attributes in process `syz.7.7076'. [ 451.533090][ T523] netlink: 404 bytes leftover after parsing attributes in process `syz.8.7073'. [ 451.611774][ T540] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5123 sclass=netlink_route_socket pid=540 comm=syz.4.7082 [ 451.629296][ T538] syzkaller1: entered promiscuous mode [ 451.634951][ T538] syzkaller1: entered allmulticast mode [ 451.820339][ T29] kauditd_printk_skb: 650 callbacks suppressed [ 451.820350][ T29] audit: type=1400 audit(2000000020.480:46935): avc: denied { mount } for pid=573 comm="syz.5.7085" name="/" dev="9p" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 451.898175][ T29] audit: type=1400 audit(2000000020.550:46936): avc: denied { unmount } for pid=31027 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 451.957702][ T29] audit: type=1326 audit(2000000020.610:46937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=600 comm="syz.4.7092" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3241bcebe9 code=0x7ffc0000 [ 451.997996][ T29] audit: type=1326 audit(2000000020.640:46938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=600 comm="syz.4.7092" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3241bcebe9 code=0x7ffc0000 [ 452.021418][ T29] audit: type=1326 audit(2000000020.640:46939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=600 comm="syz.4.7092" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3241bcebe9 code=0x7ffc0000 [ 452.044852][ T29] audit: type=1326 audit(2000000020.640:46940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=600 comm="syz.4.7092" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f3241bcd550 code=0x7ffc0000 [ 452.068267][ T29] audit: type=1326 audit(2000000020.640:46941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=600 comm="syz.4.7092" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3241bcebe9 code=0x7ffc0000 [ 452.091651][ T29] audit: type=1326 audit(2000000020.640:46942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=600 comm="syz.4.7092" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f3241bcebe9 code=0x7ffc0000 [ 452.114877][ T29] audit: type=1326 audit(2000000020.640:46943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=600 comm="syz.4.7092" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3241bcebe9 code=0x7ffc0000 [ 452.138411][ T29] audit: type=1326 audit(2000000020.640:46944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=600 comm="syz.4.7092" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3241bcebe9 code=0x7ffc0000 [ 452.205093][ T628] sd 0:0:1:0: device reset [ 452.306630][ T642] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5123 sclass=netlink_route_socket pid=642 comm=syz.5.7096 [ 452.534378][ T668] sd 0:0:1:0: device reset [ 453.557402][ T706] sd 0:0:1:0: device reset [ 453.972347][ T744] netlink: 16 bytes leftover after parsing attributes in process `syz.4.7124'. [ 454.198885][ T781] netlink: 404 bytes leftover after parsing attributes in process `syz.5.7128'. [ 454.670098][ T869] block device autoloading is deprecated and will be removed. [ 454.908056][ T913] netlink: 4 bytes leftover after parsing attributes in process `syz.8.7142'. [ 455.099027][ T935] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7143'. [ 455.166937][ T959] loop4: detected capacity change from 0 to 1024 [ 455.173596][ T959] EXT4-fs: Ignoring removed orlov option [ 455.210540][ T959] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 455.234437][ T959] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 455.393902][ T994] netlink: 48 bytes leftover after parsing attributes in process `syz.2.7155'. [ 455.895300][ T1078] netlink: 'syz.8.7169': attribute type 3 has an invalid length. [ 455.993442][ T1096] loop4: detected capacity change from 0 to 512 [ 456.002423][ T1096] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 456.026255][ T1096] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 456.046008][ T1096] ext4 filesystem being mounted at /346/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 456.157246][T27048] EXT4-fs error (device loop4): ext4_mb_generate_buddy:1289: group 0, block bitmap and bg descriptor inconsistent: 41 vs 39667 free clusters [ 456.277457][T27766] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 456.308651][T27766] syz_tun (unregistering): left allmulticast mode [ 456.336919][ T1128] __nla_validate_parse: 7 callbacks suppressed [ 456.336932][ T1128] netlink: 4 bytes leftover after parsing attributes in process `syz.8.7186'. [ 456.420830][ T1150] netlink: 48 bytes leftover after parsing attributes in process `syz.8.7191'. [ 456.521697][ T3830] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 456.580315][ T3830] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 456.630401][ T3830] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 456.641679][ T1180] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7199'. [ 456.682642][ T3830] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 456.692409][ T1200] netlink: 48 bytes leftover after parsing attributes in process `syz.2.7203'. [ 456.894224][ T3830] bond0 (unregistering): Released all slaves [ 456.910539][ T3830] bond1 (unregistering): Released all slaves [ 456.923098][ T29] kauditd_printk_skb: 1232 callbacks suppressed [ 456.923193][ T29] audit: type=1326 audit(2000000025.580:48177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1238 comm="syz.5.7209" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efe4aafebe9 code=0x7ffc0000 [ 456.953433][ T29] audit: type=1326 audit(2000000025.590:48178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1238 comm="syz.5.7209" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7efe4aafebe9 code=0x7ffc0000 [ 456.976867][ T29] audit: type=1326 audit(2000000025.590:48179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1238 comm="syz.5.7209" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efe4aafebe9 code=0x7ffc0000 [ 457.000445][ T29] audit: type=1326 audit(2000000025.590:48180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1238 comm="syz.5.7209" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efe4aafebe9 code=0x7ffc0000 [ 457.023949][ T29] audit: type=1326 audit(2000000025.590:48181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1238 comm="syz.5.7209" exe="/root/syz-executor" sig=0 arch=c000003e syscall=291 compat=0 ip=0x7efe4aafebe9 code=0x7ffc0000 [ 457.047465][ T29] audit: type=1326 audit(2000000025.590:48182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1238 comm="syz.5.7209" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efe4aafebe9 code=0x7ffc0000 [ 457.058708][ T1188] chnl_net:caif_netlink_parms(): no params data found [ 457.070937][ T29] audit: type=1326 audit(2000000025.590:48183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1238 comm="syz.5.7209" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efe4aafebe9 code=0x7ffc0000 [ 457.101135][ T29] audit: type=1326 audit(2000000025.590:48184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1238 comm="syz.5.7209" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7efe4aafebe9 code=0x7ffc0000 [ 457.124583][ T29] audit: type=1326 audit(2000000025.590:48185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1238 comm="syz.5.7209" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efe4aafebe9 code=0x7ffc0000 [ 457.148088][ T29] audit: type=1326 audit(2000000025.590:48186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1238 comm="syz.5.7209" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7efe4aafebe9 code=0x7ffc0000 [ 457.202484][ T1188] bridge0: port 1(bridge_slave_0) entered blocking state [ 457.209655][ T1188] bridge0: port 1(bridge_slave_0) entered disabled state [ 457.218371][ T1188] bridge_slave_0: entered allmulticast mode [ 457.224714][ T1188] bridge_slave_0: entered promiscuous mode [ 457.231990][ T1188] bridge0: port 2(bridge_slave_1) entered blocking state [ 457.239218][ T1188] bridge0: port 2(bridge_slave_1) entered disabled state [ 457.247852][ T1188] bridge_slave_1: entered allmulticast mode [ 457.254350][ T1188] bridge_slave_1: entered promiscuous mode [ 457.260414][ T1259] veth0: entered promiscuous mode [ 457.277777][ T3830] hsr_slave_0: left promiscuous mode [ 457.283405][ T3830] hsr_slave_1: left promiscuous mode [ 457.291205][ T3830] veth1_macvtap: left promiscuous mode [ 457.296667][ T3830] veth0_macvtap: left promiscuous mode [ 457.302248][ T3830] veth1_vlan: left promiscuous mode [ 457.307467][ T3830] veth0_vlan: left promiscuous mode [ 457.317620][ T1262] netlink: 4 bytes leftover after parsing attributes in process `syz.5.7212'. [ 457.402181][ T1188] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 457.412821][ T1188] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 457.431132][ T1188] team0: Port device team_slave_0 added [ 457.437554][ T1188] team0: Port device team_slave_1 added [ 457.464747][ T1188] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 457.471754][ T1188] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 457.497699][ T1188] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 457.509604][ T1188] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 457.516533][ T1188] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 457.542461][ T1188] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 457.575049][ T1188] hsr_slave_0: entered promiscuous mode [ 457.581191][ T1188] hsr_slave_1: entered promiscuous mode [ 457.587093][ T1188] debugfs: 'hsr0' already exists in 'hsr' [ 457.592839][ T1188] Cannot create hsr debugfs directory [ 457.598291][ T1268] netlink: 48 bytes leftover after parsing attributes in process `syz.5.7213'. [ 457.713318][ T1188] netdevsim netdevsim9 netdevsim0: renamed from eth0 [ 457.723349][ T1188] netdevsim netdevsim9 netdevsim1: renamed from eth1 [ 457.733372][ T1188] netdevsim netdevsim9 netdevsim2: renamed from eth2 [ 457.743601][ T1292] netlink: 4 bytes leftover after parsing attributes in process `syz.5.7222'. [ 457.752664][ T1188] netdevsim netdevsim9 netdevsim3: renamed from eth3 [ 457.937141][ T1188] 8021q: adding VLAN 0 to HW filter on device bond0 [ 457.965408][ T1188] 8021q: adding VLAN 0 to HW filter on device team0 [ 457.975728][ T3817] bridge0: port 1(bridge_slave_0) entered blocking state [ 457.982913][ T3817] bridge0: port 1(bridge_slave_0) entered forwarding state [ 457.996307][ T3817] bridge0: port 2(bridge_slave_1) entered blocking state [ 458.003378][ T3817] bridge0: port 2(bridge_slave_1) entered forwarding state [ 458.056472][ T1310] netlink: 4 bytes leftover after parsing attributes in process `syz.7.7225'. [ 458.106773][ T1188] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 458.150884][ T1317] SELinux: security_context_str_to_sid (Eá…) failed with errno=-22 [ 458.162294][ T1317] netlink: 56 bytes leftover after parsing attributes in process `syz.7.7226'. [ 458.213993][ T1322] netlink: 48 bytes leftover after parsing attributes in process `syz.7.7227'. [ 458.317763][ T1188] veth0_vlan: entered promiscuous mode [ 458.335948][ T1188] veth1_vlan: entered promiscuous mode [ 458.353921][ T1188] veth0_macvtap: entered promiscuous mode [ 458.363373][ T1188] veth1_macvtap: entered promiscuous mode [ 458.377032][ T1188] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 458.395114][ T1188] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 458.405489][ T3840] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 458.421087][ T3840] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 458.430517][ T3840] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 458.445005][ T3840] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 458.767137][ T1352] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5123 sclass=netlink_route_socket pid=1352 comm=syz.2.7236 [ 458.788467][ T1348] veth0: entered promiscuous mode [ 459.288081][ T1405] block device autoloading is deprecated and will be removed. [ 459.890547][ T1435] program syz.7.7271 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 459.901523][ T1435] FAULT_INJECTION: forcing a failure. [ 459.901523][ T1435] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 459.914603][ T1435] CPU: 0 UID: 0 PID: 1435 Comm: syz.7.7271 Not tainted 6.17.0-rc1-syzkaller-00199-gdfd4b508c8c6 #0 PREEMPT(voluntary) [ 459.914667][ T1435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 459.914678][ T1435] Call Trace: [ 459.914683][ T1435] [ 459.914689][ T1435] __dump_stack+0x1d/0x30 [ 459.914711][ T1435] dump_stack_lvl+0xe8/0x140 [ 459.914731][ T1435] dump_stack+0x15/0x1b [ 459.914749][ T1435] should_fail_ex+0x265/0x280 [ 459.914770][ T1435] should_fail+0xb/0x20 [ 459.914813][ T1435] should_fail_usercopy+0x1a/0x20 [ 459.914839][ T1435] _copy_to_user+0x20/0xa0 [ 459.914863][ T1435] simple_read_from_buffer+0xb5/0x130 [ 459.914883][ T1435] proc_fail_nth_read+0x10e/0x150 [ 459.914988][ T1435] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 459.915013][ T1435] vfs_read+0x1a5/0x770 [ 459.915102][ T1435] ? __rcu_read_unlock+0x4f/0x70 [ 459.915121][ T1435] ? __fget_files+0x184/0x1c0 [ 459.915142][ T1435] ksys_read+0xda/0x1a0 [ 459.915165][ T1435] __x64_sys_read+0x40/0x50 [ 459.915187][ T1435] x64_sys_call+0x27bc/0x2ff0 [ 459.915219][ T1435] do_syscall_64+0xd2/0x200 [ 459.915309][ T1435] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 459.915330][ T1435] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 459.915355][ T1435] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 459.915373][ T1435] RIP: 0033:0x7f365b5cd5fc [ 459.915394][ T1435] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 459.915408][ T1435] RSP: 002b:00007f365a02f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 459.915424][ T1435] RAX: ffffffffffffffda RBX: 00007f365b7f5fa0 RCX: 00007f365b5cd5fc [ 459.915438][ T1435] RDX: 000000000000000f RSI: 00007f365a02f0a0 RDI: 0000000000000004 [ 459.915452][ T1435] RBP: 00007f365a02f090 R08: 0000000000000000 R09: 0000000000000000 [ 459.915465][ T1435] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 459.915478][ T1435] R13: 00007f365b7f6038 R14: 00007f365b7f5fa0 R15: 00007fff66cce2d8 [ 459.915573][ T1435] [ 460.272331][ T1449] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5123 sclass=netlink_route_socket pid=1449 comm=syz.7.7277 [ 460.818089][ T1485] usb usb1: usbfs: process 1485 (syz.7.7291) did not claim interface 0 before use [ 461.392701][ T1546] __nla_validate_parse: 7 callbacks suppressed [ 461.392715][ T1546] netlink: 48 bytes leftover after parsing attributes in process `syz.9.7311'. [ 461.540476][ T1565] netlink: 404 bytes leftover after parsing attributes in process `syz.9.7317'. [ 461.777125][ T1586] tipc: Started in network mode [ 461.782083][ T1586] tipc: Node identity 7, cluster identity 4711 [ 461.788276][ T1586] tipc: Node number set to 7 [ 461.873613][ T1594] netlink: 404 bytes leftover after parsing attributes in process `syz.5.7328'. [ 461.943477][ T29] kauditd_printk_skb: 1468 callbacks suppressed [ 461.943490][ T29] audit: type=1326 audit(2000000030.600:49655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1599 comm="syz.7.7331" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f365b5cebe9 code=0x7ffc0000 [ 461.974842][ T29] audit: type=1326 audit(2000000030.600:49656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1599 comm="syz.7.7331" exe="/root/syz-executor" sig=0 arch=c000003e syscall=432 compat=0 ip=0x7f365b5cebe9 code=0x7ffc0000 [ 461.998384][ T29] audit: type=1326 audit(2000000030.600:49657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1599 comm="syz.7.7331" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f365b5cebe9 code=0x7ffc0000 [ 461.998411][ T29] audit: type=1326 audit(2000000030.600:49658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1599 comm="syz.7.7331" exe="/root/syz-executor" sig=0 arch=c000003e syscall=266 compat=0 ip=0x7f365b5cebe9 code=0x7ffc0000 [ 462.045306][ T29] audit: type=1326 audit(2000000030.600:49659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1599 comm="syz.7.7331" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f365b5cebe9 code=0x7ffc0000 [ 462.068936][ T29] audit: type=1326 audit(2000000030.600:49660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1599 comm="syz.7.7331" exe="/root/syz-executor" sig=0 arch=c000003e syscall=267 compat=0 ip=0x7f365b5cebe9 code=0x7ffc0000 [ 462.092403][ T29] audit: type=1326 audit(2000000030.600:49661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1599 comm="syz.7.7331" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f365b5cebe9 code=0x7ffc0000 [ 462.116030][ T29] audit: type=1326 audit(2000000030.600:49662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1599 comm="syz.7.7331" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f365b5cebe9 code=0x7ffc0000 [ 462.139571][ T29] audit: type=1326 audit(2000000030.600:49663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1599 comm="syz.7.7331" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f365b5cebe9 code=0x7ffc0000 [ 462.163086][ T29] audit: type=1326 audit(2000000030.600:49664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1599 comm="syz.7.7331" exe="/root/syz-executor" sig=0 arch=c000003e syscall=425 compat=0 ip=0x7f365b5cebe9 code=0x7ffc0000 [ 462.332174][ T1641] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5123 sclass=netlink_route_socket pid=1641 comm=syz.9.7348 [ 462.383020][ T1650] netlink: 72 bytes leftover after parsing attributes in process `syz.9.7350'. [ 462.392984][ T1650] netlink: 16 bytes leftover after parsing attributes in process `syz.9.7350'. [ 462.407268][ T1650] netlink: 4 bytes leftover after parsing attributes in process `syz.9.7350'. [ 462.442063][ T1657] sctp: [Deprecated]: syz.2.7353 (pid 1657) Use of int in max_burst socket option. [ 462.442063][ T1657] Use struct sctp_assoc_value instead [ 462.608580][ T1673] FAULT_INJECTION: forcing a failure. [ 462.608580][ T1673] name failslab, interval 1, probability 0, space 0, times 0 [ 462.621353][ T1673] CPU: 1 UID: 0 PID: 1673 Comm: syz.7.7360 Not tainted 6.17.0-rc1-syzkaller-00199-gdfd4b508c8c6 #0 PREEMPT(voluntary) [ 462.621379][ T1673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 462.621389][ T1673] Call Trace: [ 462.621394][ T1673] [ 462.621400][ T1673] __dump_stack+0x1d/0x30 [ 462.621443][ T1673] dump_stack_lvl+0xe8/0x140 [ 462.621501][ T1673] dump_stack+0x15/0x1b [ 462.621515][ T1673] should_fail_ex+0x265/0x280 [ 462.621534][ T1673] should_failslab+0x8c/0xb0 [ 462.621560][ T1673] kmem_cache_alloc_noprof+0x50/0x310 [ 462.621587][ T1673] ? vm_area_alloc+0x2c/0xb0 [ 462.621615][ T1673] vm_area_alloc+0x2c/0xb0 [ 462.621657][ T1673] create_init_stack_vma+0x28/0x390 [ 462.621685][ T1673] alloc_bprm+0x2b9/0x350 [ 462.621706][ T1673] do_execveat_common+0x12e/0x750 [ 462.621799][ T1673] ? getname_flags+0x154/0x3b0 [ 462.621827][ T1673] __x64_sys_execveat+0x73/0x90 [ 462.621846][ T1673] x64_sys_call+0x1fec/0x2ff0 [ 462.622004][ T1673] do_syscall_64+0xd2/0x200 [ 462.622031][ T1673] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 462.622055][ T1673] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 462.622154][ T1673] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 462.622176][ T1673] RIP: 0033:0x7f365b5cebe9 [ 462.622189][ T1673] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 462.622262][ T1673] RSP: 002b:00007f365a02f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 462.622282][ T1673] RAX: ffffffffffffffda RBX: 00007f365b7f5fa0 RCX: 00007f365b5cebe9 [ 462.622294][ T1673] RDX: 0000000000000000 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 462.622305][ T1673] RBP: 00007f365a02f090 R08: 0000000000000000 R09: 0000000000000000 [ 462.622316][ T1673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 462.622327][ T1673] R13: 00007f365b7f6038 R14: 00007f365b7f5fa0 R15: 00007fff66cce2d8 [ 462.622348][ T1673] [ 462.869958][ T1675] netlink: 404 bytes leftover after parsing attributes in process `syz.5.7362'. [ 462.873011][ T1655] Set syz1 is full, maxelem 65536 reached [ 462.879411][ T1677] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5123 sclass=netlink_route_socket pid=1677 comm=syz.2.7361 [ 462.970660][ T1689] netlink: 8 bytes leftover after parsing attributes in process `syz.2.7367'. [ 463.053913][ T1681] netlink: 24 bytes leftover after parsing attributes in process `syz.9.7364'. [ 463.109904][ T1712] netlink: 96 bytes leftover after parsing attributes in process `syz.8.7374'. [ 463.156565][ T1717] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5123 sclass=netlink_route_socket pid=1717 comm=syz.8.7376 [ 463.898096][ T1750] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5123 sclass=netlink_route_socket pid=1750 comm=syz.2.7388 [ 464.067898][ T1766] netlink: '+}[@': attribute type 12 has an invalid length. [ 464.075268][ T1766] netlink: '+}[@': attribute type 29 has an invalid length. [ 464.082570][ T1766] netlink: '+}[@': attribute type 1 has an invalid length. [ 464.344759][ T1784] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5123 sclass=netlink_route_socket pid=1784 comm=syz.9.7402 [ 464.885452][ T1816] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5123 sclass=netlink_route_socket pid=1816 comm=syz.9.7413 [ 465.321847][ T1873] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5123 sclass=netlink_route_socket pid=1873 comm=syz.7.7425 [ 466.023268][ T1896] bridge_slave_0: left allmulticast mode [ 466.028994][ T1896] bridge_slave_0: left promiscuous mode [ 466.034792][ T1896] bridge0: port 1(bridge_slave_0) entered disabled state [ 466.046611][ T1896] bridge_slave_1: left allmulticast mode [ 466.052375][ T1896] bridge_slave_1: left promiscuous mode [ 466.058054][ T1896] bridge0: port 2(bridge_slave_1) entered disabled state [ 466.076419][ T1896] bond0: (slave bond_slave_0): Releasing backup interface [ 466.095939][ T1896] bond0: (slave bond_slave_1): Releasing backup interface [ 466.120688][ T1896] team0: Port device team_slave_0 removed [ 466.141308][ T1896] team0: Port device team_slave_1 removed [ 466.157271][ T1896] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 466.164681][ T1896] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 466.186199][ T1896] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 466.193615][ T1896] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 466.482344][ T1958] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 466.505003][ T1956] __nla_validate_parse: 9 callbacks suppressed [ 466.505016][ T1956] netlink: 404 bytes leftover after parsing attributes in process `syz.5.7450'. [ 466.829474][ T1984] sd 0:0:1:0: device reset [ 466.902332][ T1986] sd 0:0:1:0: device reset [ 466.953144][ T29] kauditd_printk_skb: 1065 callbacks suppressed [ 466.953158][ T29] audit: type=1326 audit(2000000035.610:50730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1987 comm="syz.8.7465" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f6898aa5ba7 code=0x7ffc0000 [ 467.003854][ T1990] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 467.102884][ T29] audit: type=1326 audit(2000000035.640:50731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1987 comm="syz.8.7465" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f6898a4add9 code=0x7ffc0000 [ 467.126433][ T29] audit: type=1326 audit(2000000035.640:50732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1987 comm="syz.8.7465" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f6898aa5ba7 code=0x7ffc0000 [ 467.149817][ T29] audit: type=1326 audit(2000000035.640:50733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1987 comm="syz.8.7465" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f6898a4add9 code=0x7ffc0000 [ 467.173234][ T29] audit: type=1326 audit(2000000035.640:50734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1987 comm="syz.8.7465" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 467.196695][ T29] audit: type=1326 audit(2000000035.640:50735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1987 comm="syz.8.7465" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 467.220214][ T29] audit: type=1326 audit(2000000035.640:50736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1987 comm="syz.8.7465" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 467.243683][ T29] audit: type=1326 audit(2000000035.640:50737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1987 comm="syz.8.7465" exe="/root/syz-executor" sig=0 arch=c000003e syscall=327 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 467.267212][ T29] audit: type=1326 audit(2000000035.640:50738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1987 comm="syz.8.7465" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 467.290675][ T29] audit: type=1326 audit(2000000035.640:50739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1987 comm="syz.8.7465" exe="/root/syz-executor" sig=0 arch=c000003e syscall=443 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 467.419510][ T2013] netlink: 48 bytes leftover after parsing attributes in process `syz.7.7471'. [ 467.433930][ T2018] sd 0:0:1:0: device reset [ 467.477288][ T2028] FAULT_INJECTION: forcing a failure. [ 467.477288][ T2028] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 467.490519][ T2028] CPU: 0 UID: 0 PID: 2028 Comm: syz.7.7476 Not tainted 6.17.0-rc1-syzkaller-00199-gdfd4b508c8c6 #0 PREEMPT(voluntary) [ 467.490594][ T2028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 467.490636][ T2028] Call Trace: [ 467.490643][ T2028] [ 467.490650][ T2028] __dump_stack+0x1d/0x30 [ 467.490672][ T2028] dump_stack_lvl+0xe8/0x140 [ 467.490715][ T2028] dump_stack+0x15/0x1b [ 467.490733][ T2028] should_fail_ex+0x265/0x280 [ 467.490828][ T2028] should_fail+0xb/0x20 [ 467.490847][ T2028] should_fail_usercopy+0x1a/0x20 [ 467.490869][ T2028] _copy_from_user+0x1c/0xb0 [ 467.490898][ T2028] ___sys_sendmsg+0xc1/0x1d0 [ 467.490972][ T2028] __x64_sys_sendmsg+0xd4/0x160 [ 467.490999][ T2028] x64_sys_call+0x191e/0x2ff0 [ 467.491089][ T2028] do_syscall_64+0xd2/0x200 [ 467.491116][ T2028] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 467.491140][ T2028] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 467.491165][ T2028] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 467.491252][ T2028] RIP: 0033:0x7f365b5cebe9 [ 467.491363][ T2028] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 467.491379][ T2028] RSP: 002b:00007f365a02f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 467.491397][ T2028] RAX: ffffffffffffffda RBX: 00007f365b7f5fa0 RCX: 00007f365b5cebe9 [ 467.491411][ T2028] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 0000000000000003 [ 467.491424][ T2028] RBP: 00007f365a02f090 R08: 0000000000000000 R09: 0000000000000000 [ 467.491466][ T2028] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 467.491480][ T2028] R13: 00007f365b7f6038 R14: 00007f365b7f5fa0 R15: 00007fff66cce2d8 [ 467.491501][ T2028] [ 467.711428][ T2032] netlink: 60 bytes leftover after parsing attributes in process `syz.7.7477'. [ 467.772643][ T2053] FAULT_INJECTION: forcing a failure. [ 467.772643][ T2053] name failslab, interval 1, probability 0, space 0, times 0 [ 467.785293][ T2053] CPU: 0 UID: 0 PID: 2053 Comm: syz.9.7482 Not tainted 6.17.0-rc1-syzkaller-00199-gdfd4b508c8c6 #0 PREEMPT(voluntary) [ 467.785324][ T2053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 467.785416][ T2053] Call Trace: [ 467.785423][ T2053] [ 467.785430][ T2053] __dump_stack+0x1d/0x30 [ 467.785452][ T2053] dump_stack_lvl+0xe8/0x140 [ 467.785474][ T2053] dump_stack+0x15/0x1b [ 467.785492][ T2053] should_fail_ex+0x265/0x280 [ 467.785513][ T2053] ? rtnl_newlink+0x5c/0x12d0 [ 467.785597][ T2053] should_failslab+0x8c/0xb0 [ 467.785622][ T2053] __kmalloc_cache_noprof+0x4c/0x320 [ 467.785653][ T2053] rtnl_newlink+0x5c/0x12d0 [ 467.785701][ T2053] ? __account_obj_stock+0x211/0x350 [ 467.785721][ T2053] ? __account_obj_stock+0x211/0x350 [ 467.785742][ T2053] ? x86_call_depth_emit_accounting+0x128/0x2e0 [ 467.785781][ T2053] ? xas_load+0x413/0x430 [ 467.785806][ T2053] ? __rcu_read_unlock+0x34/0x70 [ 467.785849][ T2053] ? bpf_trace_run3+0x12c/0x1d0 [ 467.785869][ T2053] ? __memcg_slab_free_hook+0x135/0x230 [ 467.785897][ T2053] ? __rcu_read_unlock+0x4f/0x70 [ 467.785969][ T2053] ? avc_has_perm_noaudit+0x1b1/0x200 [ 467.785996][ T2053] ? cred_has_capability+0x210/0x280 [ 467.786022][ T2053] ? selinux_capable+0x31/0x40 [ 467.786085][ T2053] ? security_capable+0x83/0x90 [ 467.786105][ T2053] ? ns_capable+0x7d/0xb0 [ 467.786125][ T2053] ? __pfx_rtnl_newlink+0x10/0x10 [ 467.786151][ T2053] rtnetlink_rcv_msg+0x5fe/0x6d0 [ 467.786194][ T2053] netlink_rcv_skb+0x123/0x220 [ 467.786211][ T2053] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 467.786250][ T2053] rtnetlink_rcv+0x1c/0x30 [ 467.786347][ T2053] netlink_unicast+0x5bd/0x690 [ 467.786374][ T2053] netlink_sendmsg+0x58b/0x6b0 [ 467.786490][ T2053] ? __pfx_netlink_sendmsg+0x10/0x10 [ 467.786512][ T2053] __sock_sendmsg+0x142/0x180 [ 467.786535][ T2053] ____sys_sendmsg+0x31e/0x4e0 [ 467.786560][ T2053] ___sys_sendmsg+0x17b/0x1d0 [ 467.786596][ T2053] __x64_sys_sendmsg+0xd4/0x160 [ 467.786655][ T2053] x64_sys_call+0x191e/0x2ff0 [ 467.786786][ T2053] do_syscall_64+0xd2/0x200 [ 467.786836][ T2053] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 467.786856][ T2053] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 467.786877][ T2053] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 467.786969][ T2053] RIP: 0033:0x7f68151aebe9 [ 467.786982][ T2053] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 467.787000][ T2053] RSP: 002b:00007f6813c0f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 467.787021][ T2053] RAX: ffffffffffffffda RBX: 00007f68153d5fa0 RCX: 00007f68151aebe9 [ 467.787036][ T2053] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000005 [ 467.787056][ T2053] RBP: 00007f6813c0f090 R08: 0000000000000000 R09: 0000000000000000 [ 467.787069][ T2053] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 467.787079][ T2053] R13: 00007f68153d6038 R14: 00007f68153d5fa0 R15: 00007ffce4b11da8 [ 467.787140][ T2053] [ 468.131160][ T2063] netlink: 48 bytes leftover after parsing attributes in process `syz.9.7486'. [ 468.385499][ T2103] netlink: 48 bytes leftover after parsing attributes in process `syz.7.7502'. [ 468.864484][ T2178] FAULT_INJECTION: forcing a failure. [ 468.864484][ T2178] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 468.877617][ T2178] CPU: 0 UID: 0 PID: 2178 Comm: syz.8.7517 Not tainted 6.17.0-rc1-syzkaller-00199-gdfd4b508c8c6 #0 PREEMPT(voluntary) [ 468.877669][ T2178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 468.877681][ T2178] Call Trace: [ 468.877688][ T2178] [ 468.877695][ T2178] __dump_stack+0x1d/0x30 [ 468.877716][ T2178] dump_stack_lvl+0xe8/0x140 [ 468.877736][ T2178] dump_stack+0x15/0x1b [ 468.877800][ T2178] should_fail_ex+0x265/0x280 [ 468.877818][ T2178] should_fail+0xb/0x20 [ 468.877872][ T2178] should_fail_usercopy+0x1a/0x20 [ 468.877891][ T2178] _copy_from_user+0x1c/0xb0 [ 468.877946][ T2178] ___sys_sendmsg+0xc1/0x1d0 [ 468.877980][ T2178] __sys_sendmmsg+0x178/0x300 [ 468.878013][ T2178] __x64_sys_sendmmsg+0x57/0x70 [ 468.878071][ T2178] x64_sys_call+0x1c4a/0x2ff0 [ 468.878089][ T2178] do_syscall_64+0xd2/0x200 [ 468.878120][ T2178] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 468.878143][ T2178] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 468.878212][ T2178] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 468.878233][ T2178] RIP: 0033:0x7f6898aaebe9 [ 468.878301][ T2178] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 468.878345][ T2178] RSP: 002b:00007f6897517038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 468.878382][ T2178] RAX: ffffffffffffffda RBX: 00007f6898cd5fa0 RCX: 00007f6898aaebe9 [ 468.878395][ T2178] RDX: 0000000000000003 RSI: 0000200000004540 RDI: 0000000000000005 [ 468.878408][ T2178] RBP: 00007f6897517090 R08: 0000000000000000 R09: 0000000000000000 [ 468.878420][ T2178] R10: 00000000240080e4 R11: 0000000000000246 R12: 0000000000000001 [ 468.878434][ T2178] R13: 00007f6898cd6038 R14: 00007f6898cd5fa0 R15: 00007ffd10126578 [ 468.878524][ T2178] [ 469.183651][ T2223] netlink: 48 bytes leftover after parsing attributes in process `syz.2.7521'. [ 469.542704][ T2260] sd 0:0:1:0: device reset [ 469.762072][ T2298] sd 0:0:1:0: device reset [ 470.003746][ T2328] netlink: 4 bytes leftover after parsing attributes in process `syz.8.7546'. [ 470.279502][ T2381] netdevsim netdevsim9 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 470.304652][ T2384] sd 0:0:1:0: device reset [ 470.343444][ T2381] netdevsim netdevsim9 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 470.393743][ T2381] netdevsim netdevsim9 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 470.453071][ T2381] netdevsim netdevsim9 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 470.517424][ T5461] netdevsim netdevsim9 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 470.542196][ T5461] netdevsim netdevsim9 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 470.550780][ T5461] netdevsim netdevsim9 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 470.559429][ T5461] netdevsim netdevsim9 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 470.593523][ T2416] netlink: 404 bytes leftover after parsing attributes in process `syz.5.7566'. [ 470.672031][ T2424] FAULT_INJECTION: forcing a failure. [ 470.672031][ T2424] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 470.685307][ T2424] CPU: 0 UID: 0 PID: 2424 Comm: syz.5.7569 Not tainted 6.17.0-rc1-syzkaller-00199-gdfd4b508c8c6 #0 PREEMPT(voluntary) [ 470.685331][ T2424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 470.685343][ T2424] Call Trace: [ 470.685348][ T2424] [ 470.685354][ T2424] __dump_stack+0x1d/0x30 [ 470.685375][ T2424] dump_stack_lvl+0xe8/0x140 [ 470.685391][ T2424] dump_stack+0x15/0x1b [ 470.685446][ T2424] should_fail_ex+0x265/0x280 [ 470.685528][ T2424] should_fail+0xb/0x20 [ 470.685547][ T2424] should_fail_usercopy+0x1a/0x20 [ 470.685569][ T2424] _copy_from_user+0x1c/0xb0 [ 470.685595][ T2424] ___sys_sendmsg+0xc1/0x1d0 [ 470.685698][ T2424] __x64_sys_sendmsg+0xd4/0x160 [ 470.685841][ T2424] x64_sys_call+0x191e/0x2ff0 [ 470.685862][ T2424] do_syscall_64+0xd2/0x200 [ 470.685883][ T2424] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 470.685903][ T2424] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 470.685931][ T2424] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 470.685952][ T2424] RIP: 0033:0x7efe4aafebe9 [ 470.685968][ T2424] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 470.685986][ T2424] RSP: 002b:00007efe4955f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 470.686011][ T2424] RAX: ffffffffffffffda RBX: 00007efe4ad25fa0 RCX: 00007efe4aafebe9 [ 470.686022][ T2424] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: 0000000000000003 [ 470.686108][ T2424] RBP: 00007efe4955f090 R08: 0000000000000000 R09: 0000000000000000 [ 470.686119][ T2424] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 470.686133][ T2424] R13: 00007efe4ad26038 R14: 00007efe4ad25fa0 R15: 00007ffd1e323978 [ 470.686150][ T2424] [ 471.035096][ T2443] 9pnet: p9_errstr2errno: server reported unknown error [ 471.089276][ T2455] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 471.151169][ T2455] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 471.306651][ T2455] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 471.686752][ T2455] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 471.873915][ T3845] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 471.888235][ T3845] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 471.909478][ T3845] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 471.928477][ T3845] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 471.991192][ T29] kauditd_printk_skb: 1282 callbacks suppressed [ 471.991203][ T29] audit: type=1326 audit(2000000040.650:52022): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2498 comm="syz.8.7588" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 472.089684][ T29] audit: type=1326 audit(2000000040.720:52023): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2498 comm="syz.8.7588" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 472.113181][ T29] audit: type=1326 audit(2000000040.720:52024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2498 comm="syz.8.7588" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 472.136733][ T29] audit: type=1326 audit(2000000040.720:52025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2498 comm="syz.8.7588" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 472.160275][ T29] audit: type=1326 audit(2000000040.720:52026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2498 comm="syz.8.7588" exe="/root/syz-executor" sig=0 arch=c000003e syscall=327 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 472.183846][ T29] audit: type=1326 audit(2000000040.720:52027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2498 comm="syz.8.7588" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 472.207301][ T29] audit: type=1326 audit(2000000040.720:52028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2498 comm="syz.8.7588" exe="/root/syz-executor" sig=0 arch=c000003e syscall=443 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 472.230768][ T29] audit: type=1326 audit(2000000040.720:52029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2498 comm="syz.8.7588" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 472.254276][ T29] audit: type=1326 audit(2000000040.720:52030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2498 comm="syz.8.7588" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 472.277830][ T29] audit: type=1326 audit(2000000040.720:52031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2498 comm="syz.8.7588" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 472.389996][ T2517] netlink: 404 bytes leftover after parsing attributes in process `syz.8.7595'. [ 472.437008][ T2530] netdevsim netdevsim8 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 472.562232][ T2530] netdevsim netdevsim8 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 472.929091][ T2530] netdevsim netdevsim8 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 473.100208][ T2530] netdevsim netdevsim8 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 473.126798][ T2559] SELinux: Context system_u:object is not valid (left unmapped). [ 473.200110][ T41] netdevsim netdevsim8 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 473.217899][ T41] netdevsim netdevsim8 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 473.222642][ T2565] netlink: 404 bytes leftover after parsing attributes in process `syz.2.7612'. [ 473.237597][ T41] netdevsim netdevsim8 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 473.256997][ T41] netdevsim netdevsim8 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 473.370679][ T2583] FAULT_INJECTION: forcing a failure. [ 473.370679][ T2583] name failslab, interval 1, probability 0, space 0, times 0 [ 473.383377][ T2583] CPU: 0 UID: 0 PID: 2583 Comm: syz.7.7621 Not tainted 6.17.0-rc1-syzkaller-00199-gdfd4b508c8c6 #0 PREEMPT(voluntary) [ 473.383405][ T2583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 473.383417][ T2583] Call Trace: [ 473.383422][ T2583] [ 473.383428][ T2583] __dump_stack+0x1d/0x30 [ 473.383450][ T2583] dump_stack_lvl+0xe8/0x140 [ 473.383469][ T2583] dump_stack+0x15/0x1b [ 473.383491][ T2583] should_fail_ex+0x265/0x280 [ 473.383521][ T2583] should_failslab+0x8c/0xb0 [ 473.383545][ T2583] kmem_cache_alloc_noprof+0x50/0x310 [ 473.383582][ T2583] ? audit_log_start+0x365/0x6c0 [ 473.383611][ T2583] audit_log_start+0x365/0x6c0 [ 473.383643][ T2583] audit_seccomp+0x48/0x100 [ 473.383722][ T2583] ? __seccomp_filter+0x68c/0x10d0 [ 473.383743][ T2583] __seccomp_filter+0x69d/0x10d0 [ 473.383765][ T2583] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 473.383791][ T2583] ? vfs_write+0x7e8/0x960 [ 473.383895][ T2583] __secure_computing+0x82/0x150 [ 473.383915][ T2583] syscall_trace_enter+0xcf/0x1e0 [ 473.383939][ T2583] do_syscall_64+0xac/0x200 [ 473.383964][ T2583] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 473.384022][ T2583] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 473.384134][ T2583] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 473.384224][ T2583] RIP: 0033:0x7f365b5cebe9 [ 473.384239][ T2583] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 473.384256][ T2583] RSP: 002b:00007f365a02f038 EFLAGS: 00000246 ORIG_RAX: 000000000000011b [ 473.384275][ T2583] RAX: ffffffffffffffda RBX: 00007f365b7f5fa0 RCX: 00007f365b5cebe9 [ 473.384288][ T2583] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 473.384312][ T2583] RBP: 00007f365a02f090 R08: 0000000000000000 R09: 0000000000000000 [ 473.384325][ T2583] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 473.384337][ T2583] R13: 00007f365b7f6038 R14: 00007f365b7f5fa0 R15: 00007fff66cce2d8 [ 473.384356][ T2583] [ 473.696040][ T2598] netlink: 404 bytes leftover after parsing attributes in process `syz.2.7627'. [ 473.727358][ T2603] netdevsim netdevsim7 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 473.838048][ T2603] netdevsim netdevsim7 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 474.327775][ T2621] netlink: 96 bytes leftover after parsing attributes in process `syz.9.7635'. [ 474.540695][ T2631] sd 0:0:1:0: device reset [ 474.549851][ T2603] netdevsim netdevsim7 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 474.609006][ T2603] netdevsim netdevsim7 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 474.640126][ T2644] netlink: 48 bytes leftover after parsing attributes in process `syz.8.7644'. [ 474.701466][ T41] netdevsim netdevsim7 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 474.726681][ T41] netdevsim netdevsim7 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 474.748533][ T3851] netdevsim netdevsim7 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 474.766907][ T3851] netdevsim netdevsim7 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 474.815129][ T2662] sd 0:0:1:0: device reset [ 474.898760][ T2665] tmpfs: Bad value for 'mpol' [ 475.480179][ T2707] sd 0:0:1:0: device reset [ 475.748814][ T2726] netlink: 48 bytes leftover after parsing attributes in process `syz.5.7677'. [ 475.749977][ T2730] netlink: 48 bytes leftover after parsing attributes in process `syz.2.7678'. [ 475.796253][ T2734] sd 0:0:1:0: device reset [ 475.846290][ T2740] netlink: 48 bytes leftover after parsing attributes in process `syz.2.7683'. [ 475.867881][ T2742] FAULT_INJECTION: forcing a failure. [ 475.867881][ T2742] name failslab, interval 1, probability 0, space 0, times 0 [ 475.880641][ T2742] CPU: 1 UID: 0 PID: 2742 Comm: syz.5.7684 Not tainted 6.17.0-rc1-syzkaller-00199-gdfd4b508c8c6 #0 PREEMPT(voluntary) [ 475.880668][ T2742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 475.880680][ T2742] Call Trace: [ 475.880686][ T2742] [ 475.880694][ T2742] __dump_stack+0x1d/0x30 [ 475.880716][ T2742] dump_stack_lvl+0xe8/0x140 [ 475.880745][ T2742] dump_stack+0x15/0x1b [ 475.880842][ T2742] should_fail_ex+0x265/0x280 [ 475.880862][ T2742] ? __se_sys_timerfd_create+0xe2/0x260 [ 475.880883][ T2742] should_failslab+0x8c/0xb0 [ 475.880906][ T2742] __kmalloc_cache_noprof+0x4c/0x320 [ 475.880974][ T2742] __se_sys_timerfd_create+0xe2/0x260 [ 475.880995][ T2742] __x64_sys_timerfd_create+0x31/0x40 [ 475.881015][ T2742] x64_sys_call+0x1039/0x2ff0 [ 475.881078][ T2742] do_syscall_64+0xd2/0x200 [ 475.881101][ T2742] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 475.881125][ T2742] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 475.881196][ T2742] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 475.881214][ T2742] RIP: 0033:0x7efe4aafebe9 [ 475.881227][ T2742] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 475.881242][ T2742] RSP: 002b:00007efe4955f038 EFLAGS: 00000246 ORIG_RAX: 000000000000011b [ 475.881348][ T2742] RAX: ffffffffffffffda RBX: 00007efe4ad25fa0 RCX: 00007efe4aafebe9 [ 475.881359][ T2742] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 475.881370][ T2742] RBP: 00007efe4955f090 R08: 0000000000000000 R09: 0000000000000000 [ 475.881381][ T2742] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 475.881392][ T2742] R13: 00007efe4ad26038 R14: 00007efe4ad25fa0 R15: 00007ffd1e323978 [ 475.881411][ T2742] [ 476.139790][ T2756] can0: slcan on ttyS3. [ 476.199301][ T2757] can0 (unregistered): slcan off ttyS3. [ 476.208210][ T2757] Falling back ldisc for ttyS3. [ 476.218424][ T2765] netlink: 48 bytes leftover after parsing attributes in process `syz.7.7693'. [ 476.307850][ T2777] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 476.431493][ T2777] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 476.471879][ T2777] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 476.550270][ T2777] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 476.570549][ T2795] netlink: 36 bytes leftover after parsing attributes in process `syz.9.7705'. [ 476.605281][ T3845] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 476.615699][ T3845] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 476.627245][ T3845] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 476.670612][ T3845] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 476.920349][ T2818] sd 0:0:1:0: device reset [ 476.938730][ T2820] syzkaller0: entered promiscuous mode [ 476.945605][ T2820] syzkaller0 (unregistering): left promiscuous mode [ 477.015756][ T2827] wireguard0: entered promiscuous mode [ 477.021347][ T2827] wireguard0: entered allmulticast mode [ 477.103326][ T29] kauditd_printk_skb: 1060 callbacks suppressed [ 477.103390][ T29] audit: type=1326 audit(2000000045.760:53090): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2841 comm="syz.8.7725" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 477.148438][ T29] audit: type=1326 audit(2000000045.760:53091): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2841 comm="syz.8.7725" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 477.172058][ T29] audit: type=1326 audit(2000000045.760:53092): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2841 comm="syz.8.7725" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 477.195606][ T29] audit: type=1326 audit(2000000045.760:53093): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2841 comm="syz.8.7725" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 477.219163][ T29] audit: type=1326 audit(2000000045.760:53094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2841 comm="syz.8.7725" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 477.242681][ T29] audit: type=1326 audit(2000000045.760:53095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2841 comm="syz.8.7725" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 477.266152][ T29] audit: type=1326 audit(2000000045.760:53096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2841 comm="syz.8.7725" exe="/root/syz-executor" sig=0 arch=c000003e syscall=430 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 477.289746][ T29] audit: type=1326 audit(2000000045.760:53097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2841 comm="syz.8.7725" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 477.313283][ T29] audit: type=1326 audit(2000000045.760:53098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2841 comm="syz.8.7725" exe="/root/syz-executor" sig=0 arch=c000003e syscall=431 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 477.336883][ T29] audit: type=1326 audit(2000000045.770:53099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2845 comm="syz.9.7726" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68151aebe9 code=0x7ffc0000 [ 477.368119][ T2855] FAULT_INJECTION: forcing a failure. [ 477.368119][ T2855] name failslab, interval 1, probability 0, space 0, times 0 [ 477.380820][ T2855] CPU: 0 UID: 0 PID: 2855 Comm: syz.8.7730 Not tainted 6.17.0-rc1-syzkaller-00199-gdfd4b508c8c6 #0 PREEMPT(voluntary) [ 477.380848][ T2855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 477.380860][ T2855] Call Trace: [ 477.380866][ T2855] [ 477.380872][ T2855] __dump_stack+0x1d/0x30 [ 477.380889][ T2855] dump_stack_lvl+0xe8/0x140 [ 477.380949][ T2855] dump_stack+0x15/0x1b [ 477.380966][ T2855] should_fail_ex+0x265/0x280 [ 477.380985][ T2855] should_failslab+0x8c/0xb0 [ 477.381004][ T2855] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 477.381095][ T2855] ? sidtab_sid2str_get+0xa0/0x130 [ 477.381126][ T2855] kmemdup_noprof+0x2b/0x70 [ 477.381153][ T2855] sidtab_sid2str_get+0xa0/0x130 [ 477.381242][ T2855] security_sid_to_context_core+0x1eb/0x2e0 [ 477.381265][ T2855] security_sid_to_context+0x27/0x40 [ 477.381283][ T2855] selinux_lsmprop_to_secctx+0x67/0xf0 [ 477.381346][ T2855] security_lsmprop_to_secctx+0x43/0x80 [ 477.381434][ T2855] audit_log_task_context+0x77/0x190 [ 477.381462][ T2855] audit_log_task+0xf4/0x250 [ 477.381527][ T2855] audit_seccomp+0x61/0x100 [ 477.381547][ T2855] ? __seccomp_filter+0x68c/0x10d0 [ 477.381640][ T2855] __seccomp_filter+0x69d/0x10d0 [ 477.381661][ T2855] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 477.381687][ T2855] ? vfs_write+0x7e8/0x960 [ 477.381771][ T2855] ? __rcu_read_unlock+0x4f/0x70 [ 477.381793][ T2855] ? __fget_files+0x184/0x1c0 [ 477.381819][ T2855] __secure_computing+0x82/0x150 [ 477.381840][ T2855] syscall_trace_enter+0xcf/0x1e0 [ 477.381865][ T2855] do_syscall_64+0xac/0x200 [ 477.381972][ T2855] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 477.381991][ T2855] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 477.382012][ T2855] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 477.382069][ T2855] RIP: 0033:0x7f6898aaebe9 [ 477.382084][ T2855] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 477.382107][ T2855] RSP: 002b:00007f6897517038 EFLAGS: 00000246 ORIG_RAX: 0000000000000107 [ 477.382197][ T2855] RAX: ffffffffffffffda RBX: 00007f6898cd5fa0 RCX: 00007f6898aaebe9 [ 477.382210][ T2855] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: ffffffffffffff9c [ 477.382223][ T2855] RBP: 00007f6897517090 R08: 0000000000000000 R09: 0000000000000000 [ 477.382236][ T2855] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 477.382250][ T2855] R13: 00007f6898cd6038 R14: 00007f6898cd5fa0 R15: 00007ffd10126578 [ 477.382269][ T2855] [ 477.655393][ T2853] __nla_validate_parse: 2 callbacks suppressed [ 477.655431][ T2853] netlink: 404 bytes leftover after parsing attributes in process `syz.5.7729'. [ 477.713840][ T2857] netlink: 48 bytes leftover after parsing attributes in process `syz.5.7731'. [ 477.838216][ T2874] netlink: 404 bytes leftover after parsing attributes in process `syz.8.7742'. [ 477.872983][ T2880] netlink: 60 bytes leftover after parsing attributes in process `syz.9.7743'. [ 478.025554][ T2901] netlink: 48 bytes leftover after parsing attributes in process `syz.2.7752'. [ 478.279887][ T2908] netlink: 404 bytes leftover after parsing attributes in process `syz.9.7755'. [ 478.351295][ T2920] netlink: 60 bytes leftover after parsing attributes in process `syz.8.7759'. [ 478.416231][ T2931] netlink: 8 bytes leftover after parsing attributes in process `syz.7.7763'. [ 478.863714][ T2986] netlink: 404 bytes leftover after parsing attributes in process `syz.9.7783'. [ 479.107693][ T3016] netlink: 404 bytes leftover after parsing attributes in process `syz.9.7795'. [ 480.409686][ T3142] netlink: 'syz.9.7843': attribute type 298 has an invalid length. [ 480.795189][ T3208] FAULT_INJECTION: forcing a failure. [ 480.795189][ T3208] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 480.808470][ T3208] CPU: 1 UID: 0 PID: 3208 Comm: syz.8.7869 Not tainted 6.17.0-rc1-syzkaller-00199-gdfd4b508c8c6 #0 PREEMPT(voluntary) [ 480.808500][ T3208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 480.808513][ T3208] Call Trace: [ 480.808548][ T3208] [ 480.808555][ T3208] __dump_stack+0x1d/0x30 [ 480.808574][ T3208] dump_stack_lvl+0xe8/0x140 [ 480.808594][ T3208] dump_stack+0x15/0x1b [ 480.808611][ T3208] should_fail_ex+0x265/0x280 [ 480.808632][ T3208] should_fail_alloc_page+0xf2/0x100 [ 480.808724][ T3208] __alloc_frozen_pages_noprof+0xff/0x360 [ 480.808816][ T3208] alloc_pages_mpol+0xb3/0x250 [ 480.808844][ T3208] folio_alloc_mpol_noprof+0x39/0x80 [ 480.808976][ T3208] shmem_get_folio_gfp+0x3cf/0xd60 [ 480.809052][ T3208] ? simple_xattr_get+0xb9/0x120 [ 480.809086][ T3208] shmem_write_begin+0xa8/0x190 [ 480.809169][ T3208] generic_perform_write+0x181/0x490 [ 480.809231][ T3208] shmem_file_write_iter+0xc5/0xf0 [ 480.809255][ T3208] do_iter_readv_writev+0x49c/0x540 [ 480.809284][ T3208] vfs_writev+0x2df/0x8b0 [ 480.809345][ T3208] __se_sys_pwritev2+0xfc/0x1c0 [ 480.809369][ T3208] __x64_sys_pwritev2+0x67/0x80 [ 480.809394][ T3208] x64_sys_call+0x2c55/0x2ff0 [ 480.809411][ T3208] do_syscall_64+0xd2/0x200 [ 480.809453][ T3208] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 480.809565][ T3208] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 480.809590][ T3208] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 480.809609][ T3208] RIP: 0033:0x7f6898aaebe9 [ 480.809622][ T3208] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 480.809637][ T3208] RSP: 002b:00007f6897517038 EFLAGS: 00000246 ORIG_RAX: 0000000000000148 [ 480.809655][ T3208] RAX: ffffffffffffffda RBX: 00007f6898cd5fa0 RCX: 00007f6898aaebe9 [ 480.809764][ T3208] RDX: 0000000000000001 RSI: 0000200000000240 RDI: 0000000000000007 [ 480.809775][ T3208] RBP: 00007f6897517090 R08: 0000000000000000 R09: 0000000000000003 [ 480.809786][ T3208] R10: 0000000000007000 R11: 0000000000000246 R12: 0000000000000001 [ 480.809797][ T3208] R13: 00007f6898cd6038 R14: 00007f6898cd5fa0 R15: 00007ffd10126578 [ 480.809813][ T3208] [ 482.111266][ T29] kauditd_printk_skb: 1509 callbacks suppressed [ 482.111279][ T29] audit: type=1326 audit(2000000050.770:54608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3405 comm="syz.9.7941" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68151aebe9 code=0x7ffc0000 [ 482.143815][ T29] audit: type=1326 audit(2000000050.800:54609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3405 comm="syz.9.7941" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f68151aebe9 code=0x7ffc0000 [ 482.167359][ T29] audit: type=1326 audit(2000000050.800:54610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3405 comm="syz.9.7941" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68151aebe9 code=0x7ffc0000 [ 482.191004][ T29] audit: type=1326 audit(2000000050.800:54611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3405 comm="syz.9.7941" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68151aebe9 code=0x7ffc0000 [ 482.214945][ T29] audit: type=1326 audit(2000000050.800:54612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3405 comm="syz.9.7941" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f68151ad550 code=0x7ffc0000 [ 482.238452][ T29] audit: type=1326 audit(2000000050.800:54613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3405 comm="syz.9.7941" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68151aebe9 code=0x7ffc0000 [ 482.262296][ T29] audit: type=1326 audit(2000000050.800:54614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3405 comm="syz.9.7941" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68151aebe9 code=0x7ffc0000 [ 482.285826][ T29] audit: type=1326 audit(2000000050.800:54615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3405 comm="syz.9.7941" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f68151aebe9 code=0x7ffc0000 [ 482.318826][ T29] audit: type=1326 audit(2000000050.800:54616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3405 comm="syz.9.7941" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68151aebe9 code=0x7ffc0000 [ 482.342403][ T29] audit: type=1326 audit(2000000050.800:54617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3405 comm="syz.9.7941" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68151aebe9 code=0x7ffc0000 [ 482.402795][ T3431] FAULT_INJECTION: forcing a failure. [ 482.402795][ T3431] name failslab, interval 1, probability 0, space 0, times 0 [ 482.415422][ T3431] CPU: 1 UID: 0 PID: 3431 Comm: syz.5.7949 Not tainted 6.17.0-rc1-syzkaller-00199-gdfd4b508c8c6 #0 PREEMPT(voluntary) [ 482.415449][ T3431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 482.415461][ T3431] Call Trace: [ 482.415467][ T3431] [ 482.415474][ T3431] __dump_stack+0x1d/0x30 [ 482.415496][ T3431] dump_stack_lvl+0xe8/0x140 [ 482.415549][ T3431] dump_stack+0x15/0x1b [ 482.415589][ T3431] should_fail_ex+0x265/0x280 [ 482.415611][ T3431] should_failslab+0x8c/0xb0 [ 482.415633][ T3431] kmem_cache_alloc_noprof+0x50/0x310 [ 482.415659][ T3431] ? audit_log_start+0x365/0x6c0 [ 482.415763][ T3431] audit_log_start+0x365/0x6c0 [ 482.415790][ T3431] audit_seccomp+0x48/0x100 [ 482.415814][ T3431] ? __seccomp_filter+0x68c/0x10d0 [ 482.415834][ T3431] __seccomp_filter+0x69d/0x10d0 [ 482.415908][ T3431] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 482.415935][ T3431] ? vfs_write+0x7e8/0x960 [ 482.416004][ T3431] __secure_computing+0x82/0x150 [ 482.416026][ T3431] syscall_trace_enter+0xcf/0x1e0 [ 482.416067][ T3431] do_syscall_64+0xac/0x200 [ 482.416093][ T3431] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 482.416117][ T3431] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 482.416163][ T3431] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 482.416182][ T3431] RIP: 0033:0x7efe4aafebe9 [ 482.416195][ T3431] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 482.416269][ T3431] RSP: 002b:00007efe4955f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000119 [ 482.416453][ T3431] RAX: ffffffffffffffda RBX: 00007efe4ad25fa0 RCX: 00007efe4aafebe9 [ 482.416467][ T3431] RDX: 0000000000000001 RSI: 0000200000000000 RDI: 0000000000000006 [ 482.416480][ T3431] RBP: 00007efe4955f090 R08: 0000000000000000 R09: 0000000000000000 [ 482.416493][ T3431] R10: 00000000000e4fe0 R11: 0000000000000246 R12: 0000000000000001 [ 482.416525][ T3431] R13: 00007efe4ad26038 R14: 00007efe4ad25fa0 R15: 00007ffd1e323978 [ 482.416545][ T3431] [ 482.655269][ T3440] netdevsim netdevsim8 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 482.690444][ T3440] netdevsim netdevsim8 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 482.731187][ T3440] netdevsim netdevsim8 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 482.774381][ T3456] __nla_validate_parse: 13 callbacks suppressed [ 482.774395][ T3456] netlink: 48 bytes leftover after parsing attributes in process `syz.5.7960'. [ 482.791279][ T3440] netdevsim netdevsim8 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 482.845536][ T3845] netdevsim netdevsim8 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 482.865475][ T3845] netdevsim netdevsim8 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 482.896378][ T3845] netdevsim netdevsim8 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 482.914288][ T3845] netdevsim netdevsim8 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 482.969403][ T3466] netlink: 404 bytes leftover after parsing attributes in process `syz.2.7964'. [ 483.123758][ T3485] netlink: 48 bytes leftover after parsing attributes in process `syz.2.7972'. [ 483.124054][ T3486] netdevsim netdevsim8 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 483.204729][ T3486] netdevsim netdevsim8 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 483.271667][ T3486] netdevsim netdevsim8 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 483.320084][ T3486] netdevsim netdevsim8 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 483.396659][ T3519] netlink: 48 bytes leftover after parsing attributes in process `syz.7.7984'. [ 483.478227][ T3534] netdevsim netdevsim9 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 483.530467][ T3534] netdevsim netdevsim9 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 483.581339][ T3534] netdevsim netdevsim9 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 483.649660][ T3534] netdevsim netdevsim9 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 483.724621][ T3817] netdevsim netdevsim9 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 483.735181][ T3817] netdevsim netdevsim9 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 483.748122][ T3817] netdevsim netdevsim9 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 483.760724][ T3845] netdevsim netdevsim9 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 483.836228][ T3560] netlink: 48 bytes leftover after parsing attributes in process `syz.7.7998'. [ 484.294865][ T3597] netlink: 48 bytes leftover after parsing attributes in process `syz.5.8011'. [ 484.622732][ T3612] FAULT_INJECTION: forcing a failure. [ 484.622732][ T3612] name failslab, interval 1, probability 0, space 0, times 0 [ 484.635457][ T3612] CPU: 1 UID: 0 PID: 3612 Comm: syz.5.8017 Not tainted 6.17.0-rc1-syzkaller-00199-gdfd4b508c8c6 #0 PREEMPT(voluntary) [ 484.635485][ T3612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 484.635497][ T3612] Call Trace: [ 484.635503][ T3612] [ 484.635510][ T3612] __dump_stack+0x1d/0x30 [ 484.635588][ T3612] dump_stack_lvl+0xe8/0x140 [ 484.635608][ T3612] dump_stack+0x15/0x1b [ 484.635624][ T3612] should_fail_ex+0x265/0x280 [ 484.635645][ T3612] should_failslab+0x8c/0xb0 [ 484.635669][ T3612] kmem_cache_alloc_node_noprof+0x57/0x320 [ 484.635720][ T3612] ? __alloc_skb+0x101/0x320 [ 484.635752][ T3612] __alloc_skb+0x101/0x320 [ 484.635781][ T3612] ? audit_log_start+0x365/0x6c0 [ 484.635895][ T3612] audit_log_start+0x380/0x6c0 [ 484.635922][ T3612] audit_seccomp+0x48/0x100 [ 484.635944][ T3612] ? __seccomp_filter+0x68c/0x10d0 [ 484.635982][ T3612] __seccomp_filter+0x69d/0x10d0 [ 484.636066][ T3612] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 484.636169][ T3612] ? vfs_write+0x7e8/0x960 [ 484.636190][ T3612] ? __rcu_read_unlock+0x4f/0x70 [ 484.636208][ T3612] ? __fget_files+0x184/0x1c0 [ 484.636257][ T3612] __secure_computing+0x82/0x150 [ 484.636278][ T3612] syscall_trace_enter+0xcf/0x1e0 [ 484.636360][ T3612] do_syscall_64+0xac/0x200 [ 484.636392][ T3612] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 484.636482][ T3612] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 484.636503][ T3612] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 484.636591][ T3612] RIP: 0033:0x7efe4aafebe9 [ 484.636605][ T3612] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 484.636622][ T3612] RSP: 002b:00007efe4955f038 EFLAGS: 00000246 ORIG_RAX: 000000000000000b [ 484.636639][ T3612] RAX: ffffffffffffffda RBX: 00007efe4ad25fa0 RCX: 00007efe4aafebe9 [ 484.636701][ T3612] RDX: 0000000000000000 RSI: 0000000000c00000 RDI: 00002000003fe000 [ 484.636712][ T3612] RBP: 00007efe4955f090 R08: 0000000000000000 R09: 0000000000000000 [ 484.636723][ T3612] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 484.636733][ T3612] R13: 00007efe4ad26038 R14: 00007efe4ad25fa0 R15: 00007ffd1e323978 [ 484.636753][ T3612] [ 484.864076][ T3616] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 484.909982][ T3616] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 484.960830][ T3616] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 485.009784][ T3616] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 485.056280][ T3626] netlink: 48 bytes leftover after parsing attributes in process `syz.7.8023'. [ 485.087052][ T3817] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 485.096635][ T3817] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 485.111702][ T3817] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 485.120405][ T3817] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 485.167891][ T3635] pim6reg1: entered promiscuous mode [ 485.500006][ T3658] netlink: 48 bytes leftover after parsing attributes in process `syz.5.8034'. [ 486.516537][ T3731] netlink: 404 bytes leftover after parsing attributes in process `syz.5.8063'. [ 486.693505][ T3745] sd 0:0:1:0: device reset [ 486.854623][ T3761] netlink: 404 bytes leftover after parsing attributes in process `syz.9.8077'. [ 486.878564][ T3765] FAULT_INJECTION: forcing a failure. [ 486.878564][ T3765] name failslab, interval 1, probability 0, space 0, times 0 [ 486.891294][ T3765] CPU: 1 UID: 0 PID: 3765 Comm: syz.9.8079 Not tainted 6.17.0-rc1-syzkaller-00199-gdfd4b508c8c6 #0 PREEMPT(voluntary) [ 486.891333][ T3765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 486.891345][ T3765] Call Trace: [ 486.891350][ T3765] [ 486.891357][ T3765] __dump_stack+0x1d/0x30 [ 486.891376][ T3765] dump_stack_lvl+0xe8/0x140 [ 486.891392][ T3765] dump_stack+0x15/0x1b [ 486.891406][ T3765] should_fail_ex+0x265/0x280 [ 486.891516][ T3765] ? assoc_array_delete+0x58/0x950 [ 486.891542][ T3765] should_failslab+0x8c/0xb0 [ 486.891633][ T3765] __kmalloc_cache_noprof+0x4c/0x320 [ 486.891702][ T3765] assoc_array_delete+0x58/0x950 [ 486.891730][ T3765] ? __pfx_lookup_user_key_possessed+0x10/0x10 [ 486.891758][ T3765] key_unlink+0x66/0xf0 [ 486.891773][ T3765] keyctl_keyring_unlink+0xe1/0x120 [ 486.891793][ T3765] __se_sys_keyctl+0x5a3/0xb80 [ 486.891863][ T3765] ? __rcu_read_unlock+0x4f/0x70 [ 486.891880][ T3765] ? __fget_files+0x184/0x1c0 [ 486.891905][ T3765] ? fput+0x8f/0xc0 [ 486.891934][ T3765] __x64_sys_keyctl+0x67/0x80 [ 486.892027][ T3765] x64_sys_call+0x2f6d/0x2ff0 [ 486.892048][ T3765] do_syscall_64+0xd2/0x200 [ 486.892074][ T3765] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 486.892142][ T3765] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 486.892164][ T3765] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 486.892246][ T3765] RIP: 0033:0x7f68151aebe9 [ 486.892261][ T3765] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 486.892277][ T3765] RSP: 002b:00007f6813c0f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 486.892294][ T3765] RAX: ffffffffffffffda RBX: 00007f68153d5fa0 RCX: 00007f68151aebe9 [ 486.892306][ T3765] RDX: 000000003294f0ad RSI: 000000002ef68fd8 RDI: 0000000000000009 [ 486.892364][ T3765] RBP: 00007f6813c0f090 R08: 0000000000000000 R09: 0000000000000000 [ 486.892378][ T3765] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 486.892391][ T3765] R13: 00007f68153d6038 R14: 00007f68153d5fa0 R15: 00007ffce4b11da8 [ 486.892411][ T3765] [ 486.945279][ T67] netdevsim netdevsim8 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 486.945315][ T67] netdevsim netdevsim8 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 486.953726][ T67] netdevsim netdevsim8 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 486.956250][ T67] netdevsim netdevsim8 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 487.104709][ T3780] sd 0:0:1:0: device reset [ 487.164653][ T29] kauditd_printk_skb: 1788 callbacks suppressed [ 487.164667][ T29] audit: type=1326 audit(2000000055.820:56402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3781 comm="syz.8.8085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 487.301891][ T29] audit: type=1326 audit(2000000055.820:56403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3781 comm="syz.8.8085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 487.328039][ T29] audit: type=1326 audit(2000000055.940:56404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3781 comm="syz.8.8085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 487.351525][ T29] audit: type=1326 audit(2000000055.940:56405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3781 comm="syz.8.8085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 487.374986][ T29] audit: type=1326 audit(2000000055.940:56406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3781 comm="syz.8.8085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 487.402362][ T29] audit: type=1326 audit(2000000056.030:56407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3786 comm="syz.8.8088" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 487.425837][ T29] audit: type=1326 audit(2000000056.030:56408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3786 comm="syz.8.8088" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 487.449432][ T29] audit: type=1326 audit(2000000056.030:56409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3786 comm="syz.8.8088" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 487.472887][ T29] audit: type=1326 audit(2000000056.030:56410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3786 comm="syz.8.8088" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 487.496378][ T29] audit: type=1326 audit(2000000056.030:56411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3786 comm="syz.8.8088" exe="/root/syz-executor" sig=0 arch=c000003e syscall=327 compat=0 ip=0x7f6898aaebe9 code=0x7ffc0000 [ 487.595913][ T3805] sd 0:0:1:0: device reset [ 487.631243][ T3810] IPVS: sync thread started: state = MASTER, mcast_ifn = veth0_virt_wifi, syncid = 33554432, id = 0 [ 487.631335][ T3808] IPVS: stopping master sync thread 3810 ... [ 487.781770][ T3896] sd 0:0:1:0: device reset [ 487.812698][ T3898] sctp: [Deprecated]: syz.7.8109 (pid 3898) Use of struct sctp_assoc_value in delayed_ack socket option. [ 487.812698][ T3898] Use struct sctp_sack_info instead [ 487.903795][ T3886] netlink: 'syz.5.8103': attribute type 298 has an invalid length. [ 487.979532][ T3910] __nla_validate_parse: 4 callbacks suppressed [ 487.979547][ T3910] netlink: 404 bytes leftover after parsing attributes in process `syz.8.8114'. [ 488.362958][ T3941] netlink: 404 bytes leftover after parsing attributes in process `syz.8.8126'. [ 488.636280][ T3955] netlink: 'syz.2.8133': attribute type 298 has an invalid length. [ 488.715263][ T3975] netlink: 404 bytes leftover after parsing attributes in process `syz.8.8139'. [ 488.987692][ T4001] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 489.015604][T27866] ================================================================== [ 489.023684][T27866] BUG: KCSAN: data-race in pipe_poll / pipe_resize_ring [ 489.030614][T27866] [ 489.032924][T27866] write to 0xffff88811b1c8418 of 4 bytes by task 3994 on cpu 0: [ 489.040537][T27866] pipe_resize_ring+0x2c3/0x350 [ 489.045376][T27866] pipe_fcntl+0x2e3/0x350 [ 489.049690][T27866] do_fcntl+0x667/0xdf0 [ 489.053832][T27866] __se_sys_fcntl+0xb1/0x120 [ 489.058409][T27866] __x64_sys_fcntl+0x43/0x50 [ 489.062987][T27866] x64_sys_call+0x29a0/0x2ff0 [ 489.067646][T27866] do_syscall_64+0xd2/0x200 [ 489.072136][T27866] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 489.078016][T27866] [ 489.080324][T27866] read to 0xffff88811b1c8418 of 4 bytes by task 27866 on cpu 1: [ 489.087933][T27866] pipe_poll+0x1ea/0x250 [ 489.092163][T27866] p9_read_work+0x715/0x8a0 [ 489.096657][T27866] process_scheduled_works+0x4cb/0x9d0 [ 489.102102][T27866] worker_thread+0x582/0x770 [ 489.106681][T27866] kthread+0x489/0x510 [ 489.110733][T27866] ret_from_fork+0xda/0x150 [ 489.115217][T27866] ret_from_fork_asm+0x1a/0x30 [ 489.119966][T27866] [ 489.122269][T27866] value changed: 0x00000010 -> 0x00000001 [ 489.127962][T27866] [ 489.130264][T27866] Reported by Kernel Concurrency Sanitizer on: [ 489.136393][T27866] CPU: 1 UID: 0 PID: 27866 Comm: kworker/1:8 Not tainted 6.17.0-rc1-syzkaller-00199-gdfd4b508c8c6 #0 PREEMPT(voluntary) [ 489.148960][T27866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 489.158997][T27866] Workqueue: events p9_read_work [ 489.163925][T27866] ================================================================== [ 489.200031][ T4001] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 489.240196][ T4001] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 489.279962][ T4001] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 489.335165][ T67] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 489.345961][ T67] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 489.357893][ T3851] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 489.368190][ T3851] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0