last executing test programs: 2m56.728085133s ago: executing program 32 (id=3772): bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = syz_open_dev$usbfs(&(0x7f0000000340), 0x800000001fe, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000240000"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = dup(r0) ioctl$USBDEVFS_FREE_STREAMS(r2, 0x8008551d, &(0x7f0000000300)=ANY=[]) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@remote, @in=@multicast2, 0x2, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x6}, {0x0, 0x5, 0x0, 0x0, 0x0, 0x2000000000000f42}, {0x9, 0x0, 0x0, 0xfffefffffffffffe}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0x0, 0x0, 0x2, 0x48, 0x0, 0x0, 0x1}}, 0xe8) 2m47.475122345s ago: executing program 33 (id=3889): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000e4ffff000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000740)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a110100000100000000000200fffc09d6835dc93dc981983c20687e9d097407b866a47330806af9f5f8b5e0dfbbe4e5ac703f98cb2d9e8f4837ff807e4f65a8fcd2c57db420ad25501bfc630e95279fea65fc579331af8e5c499e91e8b42d09877549fd8463725a68782e323d18283a0c1927fda11e5c61bd26e30f588cc8f8b7f899ea4cc837e3789731d6a0b818b60fe3a96a37b541a9c0cc5dfc98f8ad8bb2fef3ee"], 0x1e4}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63"], 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00100}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000340)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000002780)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000080)={r3, 0x3, r2}) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6e, @void, @value}, 0x94) r6 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r6, &(0x7f0000001fc0)=""/184, 0xb8) r7 = syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000040), 0x20000007d, 0x0) ioctl$MON_IOCX_GET(r7, 0x40189206, &(0x7f0000000100)={&(0x7f0000000300), 0x0}) ioctl$MON_IOCX_GETX(0xffffffffffffffff, 0x4018920a, &(0x7f00000001c0)={&(0x7f0000000000), &(0x7f0000002e40)=""/4086, 0xff6}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r5}, 0x10) unlink(&(0x7f0000000340)='./cgroup.cpu/cpuset.cpus\x00') r8 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xbe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="3c0000001000050400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000008110bc490b00010065727370616e00000c0002800500160000000000"], 0x3c}}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000340)='cpu\t&0&&\t') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 2m44.469860712s ago: executing program 34 (id=3921): splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x8ec3, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, 0x0, 0x38}, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r0}, 0x10) creat(&(0x7f0000000080)='./bus\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='page_pool_state_release\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x6, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000002c0)={r4}, 0x69) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r5, 0x6, &(0x7f0000002000)={0x1}) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004}, &(0x7f0000bbdffc)) 2m43.416893198s ago: executing program 35 (id=3932): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x7a, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(r0, &(0x7f0000000e00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000180)="ae1d4b178f10911a2dab191193b809cf9294262aa07902937575ee00b79dde347c0e6b2970ac6c8aa4d76a09fbd96643ee0877b3d0badfdcef5d45ff3c02cbf632464c24039086f74548ccae132a1bafbfef8cc1860c4aad820da4977e44f7b489cfccac766c51391bfcdb9f5510c7770582516cb7d41772001624e5905bba54f08547a4485b5a2a98b5f5c690d0a825161e3d7e4b39365b43b2701c68b167bbdce33c013a9b89c9a7b823ec5ecd432f12dc063ddaa7431a3385e29d0c7ac17389308b450e1d06ab9388183e9828783f6a23183986257098262af4ba197ca5e4499ec85fd8c1f1c7a122", 0xea}, {&(0x7f00000002c0)="7f2f58967d9a6924bf6fed7467470b436ce6b9060056d5096e3c4efeec82e9e3e6446a274bca12243a4965600d3e1843baccebbad5e427aeaff4e1431a4569bfdc0a70ca0e6c7bbd4d", 0x49}, {0x0}], 0x3}}, {{0x0, 0x0, &(0x7f0000000c80)=[{&(0x7f00000007c0)="9b76f00d7896f57313214b00958aef52901a18ff216310ac27dfc6ab72d9613160c3fe223de4ef6e9dcd5966d72ac2fc4a746fc1e58398e50f7b08bba2b56220a751e01156a10aa2d92861404dfce53be69bfbf0faf3f853d5564407f0eff9eac60e1876ff775bdd17d67ca7", 0x6c}], 0x1}}], 0x2, 0x10) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65a", 0x14, 0x11, 0x0, 0x0) 2m37.464592963s ago: executing program 36 (id=3943): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000340)={'netdevsim0\x00', &(0x7f0000000400)=@ethtool_flash={0x33, 0xea5, '.\x00'}}) 2m28.203425205s ago: executing program 37 (id=3953): mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x200000b, 0x8c4b815a5465c2b2, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x6905, &(0x7f0000000240)={0x0, 0x0, 0x40}, &(0x7f0000000140)=0x0, &(0x7f0000000180)=0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) write$tcp_congestion(r4, 0x0, 0xffffff93) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) getsockopt$PNPIPE_ENCAP(0xffffffffffffffff, 0x113, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r5 = openat$binfmt_register(0xffffff9c, &(0x7f0000000000), 0x1, 0x0) write$binfmt_register(r5, &(0x7f0000000200)={0x3a, 'syz3', 0x3a, 'M', 0x3a, 0x8, 0x3a, '/proc/sys/fs/binfmt_misc/register\x00', 0x3a, '/proc/sys/fs/binfmt_misc/register\x00', 0x3a, './file0/../file0', 0x3a, [0x46]}, 0x75) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_TIMEOUT={0xb, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}}) r6 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r6}, &(0x7f0000bbdffc)) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0xb, 0x6, 0xf, 0x0, 0xb8, 0x104, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000340), 0xc}, 0x0, 0x7, 0x6, 0x3, 0xffff, 0x9, 0xffff, 0x0, 0x25, 0x0, 0x2}, r6, 0xf, 0xffffffffffffffff, 0x8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'macvlan0\x00'}) io_uring_enter(r0, 0x184c, 0x0, 0x0, 0x0, 0x0) io_uring_setup(0x7058, &(0x7f0000000040)={0x0, 0x3ffffffd}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000200000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_int(r7, 0x6, 0x4, &(0x7f0000000180)=0x1, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xfffffffd, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7020000ffff0c63b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) fchdir(0xffffffffffffffff) socket$inet6(0xa, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x6) socket$nl_route(0x10, 0x3, 0x0) 2m9.621717938s ago: executing program 38 (id=4077): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x20001400) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=0xffffffffffffffff, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x8001, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x20200, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='softirq_noise\x00', r1}, 0x18) setxattr$security_selinux(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400), &(0x7f0000000580)='system_u:object_r:useradd_exec_t:s0\x00', 0x24, 0x2) r3 = socket$key(0xf, 0x3, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) sendmsg$key(r3, &(0x7f0000000040)={0xa, 0x0, &(0x7f0000000340)={&(0x7f0000000b00)=ANY=[@ANYBLOB="020300000b0000000000000000000000030006000000000002000000e000000100000000000000000200010000001c000000fb18000000000300050000000000020000007f0000010000000000000000010018"], 0x58}, 0x1, 0x7}, 0x0) 2m9.514731037s ago: executing program 39 (id=4089): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000580)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000540)={&(0x7f00000008c0)={0x110, r1, 0x20, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfa0b}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x68}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2c}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vlan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xa}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'gre0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x0, 0x8, 0x5}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x0, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1c6}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x11}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3e}, @IPVS_SVC_ATTR_AF={0x6}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0xfffffffffffffec8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x9}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x4000}, 0x480d0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) setfsuid(0xee00) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r2, &(0x7f0000009b40)=[{{0x0, 0x0, 0x0}, 0x10}], 0x1, 0x2b, 0x0) setsockopt$inet6_int(r2, 0x29, 0x5, &(0x7f0000000040)=0x7, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) open(&(0x7f0000000140)='./file0\x00', 0x2acc0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f00000003c0)='kfree\x00', r4}, 0x10) ioctl$PAGEMAP_SCAN(r0, 0xc0606610, &(0x7f0000000700)={0x60, 0x0, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1, &(0x7f0000000680)=[{0x8, 0xb430, 0x4}, {0x9, 0x357e8374, 0x3}, {0x6, 0xffff, 0x3}, {0x7, 0x5, 0x7fff}, {0x5, 0x89b, 0x7}], 0x5, 0x2, 0x40, 0x0, 0x10, 0x8}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000400)=ANY=[]) socket$nl_route(0x10, 0x3, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) add_key$keyring(&(0x7f0000000080), &(0x7f0000001100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r6 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e02003c000b05d25a806f8c6394f90124fc600c05000f90c60100053582c137153e370a48018004f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x5}, 0x0) 2m7.84182209s ago: executing program 40 (id=4099): r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x401, 0x70bd29, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2093}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_ADDRESS={0xa, 0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x20}}]}, 0x48}}, 0x20000000) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000009f, 0x0) 2m5.448173161s ago: executing program 41 (id=4112): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000580)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000540)={&(0x7f00000008c0)={0x110, r1, 0x20, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfa0b}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x68}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}, @IPVS_SVC_ATTR_PE_NAME={0x8}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x2c}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vlan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0xa}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'gre0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x0, 0x8, 0x5}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x0, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1c6}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e24}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x11}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3e}, @IPVS_SVC_ATTR_AF={0x6}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0xfffffffffffffec8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x9}]}]}, 0x110}, 0x1, 0x0, 0x0, 0x4000}, 0x480d0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) setfsuid(0xee00) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmmsg(r2, &(0x7f0000009b40)=[{{0x0, 0x0, 0x0}, 0x10}], 0x1, 0x2b, 0x0) setsockopt$inet6_int(r2, 0x29, 0x5, &(0x7f0000000040)=0x7, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) open(&(0x7f0000000140)='./file0\x00', 0x2acc0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f00000003c0)='kfree\x00', r4}, 0x10) ioctl$PAGEMAP_SCAN(r0, 0xc0606610, &(0x7f0000000700)={0x60, 0x0, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1, &(0x7f0000000680)=[{0x8, 0xb430, 0x4}, {0x9, 0x357e8374, 0x3}, {0x6, 0xffff, 0x3}, {0x7, 0x5, 0x7fff}, {0x5, 0x89b, 0x7}], 0x5, 0x2, 0x40, 0x0, 0x10, 0x8}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000400)=ANY=[]) socket$nl_route(0x10, 0x3, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) add_key$keyring(&(0x7f0000000080), &(0x7f0000001100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000003"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000ed7f0000000000000000000018010000", @ANYBLOB="4217aa6b1b347a5810c0a3183ae61d721c7669a9001c71d34eed005621ec41e7aa1788c7c77a5990dc7d900aec220482f194459dee979ac7fb7f876fb9856631594ec516a1daae0d37698270c829150ad4dd56024ed8e12026fec066e21ad5fd13fc3465a9aa5c8e39c6cb90921e76cb123e84971ae3c371bdad47fb8f7904174e3204608f22a3700484197499213f2212c6370ed12f68df23af796378ec7df1cb6c306cdd69f51efe7bbda74ff21b9ce36291ec84911f83bc278667a6dd14382af16d9fbaaf9472f910384ad60ea0b93cdb0d131a247ad211958b2a1716b33d4c47", @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) setsockopt$MRT_INIT(0xffffffffffffffff, 0x0, 0xc8, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x4b0}, 0x1, 0x0, 0x0, 0x44}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e02003c000b05d25a806f8c6394f90124fc600c05000f90c60100053582c137153e370a48018004f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x5}, 0x0) 1m44.396572433s ago: executing program 42 (id=4270): r0 = socket$kcm(0x2, 0x922000000001, 0x106) setsockopt$sock_attach_bpf(r0, 0x1, 0x45, &(0x7f00000003c0), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="2c00ec0ef1254500000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, 0x0, 0x38}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000c80)='./bus\x00', 0x100c000, &(0x7f00000026c0)={[{@jqfmt_vfsv1}, {}, {@barrier_val}, {@norecovery}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@resuid}, {@nodelalloc}, {@stripe={'stripe', 0x3d, 0x2}}, {@abort}]}, 0xfc, 0x572, &(0x7f0000003780)="$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") r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x141042, 0x0) pwritev2(r3, &(0x7f00000001c0)=[{&(0x7f0000000080)="ff", 0xfdef}], 0x1, 0xe7b, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd1a, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x2}}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = socket$kcm(0x2b, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) sigaltstack(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) setsockopt$sock_attach_bpf(r5, 0x6, 0x9, &(0x7f0000000200), 0x4) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x1fe) fallocate(r6, 0x10, 0x2, 0x7fff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='mem_disconnect\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) 1m39.878539485s ago: executing program 43 (id=4288): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TCFLSH(r1, 0x40045436, 0x14) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x8042, 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setlease(r2, 0x8, 0x0) fcntl$getflags(r2, 0x401) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000001680)={0x9, 0xfffffffb, 0x1, 'queue1\x00', 0xae8}) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x8dd2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kfree\x00', r3}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYRESOCT=r4, @ANYRESDEC=r3, @ANYBLOB='\x00\x00\x00\x00 \x00'/20, @ANYRES32=0x0, @ANYRES16=r1, @ANYRES64=r0], 0x48) write$selinux_create(r2, &(0x7f0000000580)=@access={'system_u:object_r:dbusd_etc_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0xa}, 0x54) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x0, 0x17, 0x0, 0x42, 0x0, 0x0, 0xa8820, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2}, 0x10082a, 0x3, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xc, r4, 0x0) r6 = memfd_secret(0x0) r7 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$SCSI_IOCTL_GET_PCI(r8, 0x2284, &(0x7f0000000000)) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r5, 0x0, 0x0, 0x2}, 0x20) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001f40)={0x0, ""/256, 0x0, 0x0}) mount_setattr(0xffffffffffffff9c, 0x0, 0x0, &(0x7f0000001500)={0x98, 0x70}, 0x20) r11 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000300)='./bus\x00', 0x1008002, &(0x7f00000006c0)={[{@grpquota}, {@delalloc}, {@noblock_validity}, {@usrquota}, {@dioread_nolock}, {@nobh}, {@nomblk_io_submit}, {@grpjquota}, {@grpid}]}, 0x1, 0x5eb, &(0x7f0000001740)="$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") openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f0000000400)='./file1\x00', 0x126a4b5, &(0x7f0000000600)=ANY=[@ANYRES16, @ANYRES64, @ANYRESHEX, @ANYRES16=r11, @ANYRESOCT=r10, @ANYRES16, @ANYRES16, @ANYRESDEC, @ANYRESHEX=0x0, @ANYRESOCT=0x0], 0x0, 0x0, &(0x7f0000000000)) r12 = geteuid() r13 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r14, r14, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file1\x00', &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="02000000010007000000000002000500", @ANYRES32=r12, @ANYBLOB="02000100", @ANYRES32=r14, @ANYRES32=r9], 0x34, 0x0) r15 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r15, &(0x7f00000000c0), 0x6db6e559) 1m39.634338534s ago: executing program 44 (id=4323): socket$packet(0x11, 0x3, 0x300) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x3d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000340)={0xf97cff8c, 0x8}, 0x2000) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000380)='kmem_cache_free\x00', r4, 0x0, 0x5}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000002c0)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 1m36.058401688s ago: executing program 45 (id=4345): splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x8ec3, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, 0x0, 0x38}, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r0}, 0x10) creat(&(0x7f0000000080)='./bus\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='page_pool_state_release\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x6, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f00000002c0)={r4}, 0x69) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r5, 0x6, &(0x7f0000002000)={0x1}) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004}, &(0x7f0000bbdffc)) 1m27.804246584s ago: executing program 0 (id=4373): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3b, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000000000002, 0x800000000003}, 0x100000, 0x5dd7, 0x3, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket$netlink(0x10, 0x3, 0x0) r0 = gettid() r1 = epoll_create1(0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x0, 0x0) r3 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f0000000000)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='bridge_slave_1\x00', 0x10) bind$inet(r3, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000200)={0xa000000a}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r5 = socket$inet(0x2, 0x2, 0x0) shutdown(r5, 0x0) recvmmsg(r5, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r6, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x37, &(0x7f0000000340)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x2e, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='attr/fscreate\x00') finit_module(r2, 0x0, 0x0) tkill(r0, 0x7) 1m24.528471151s ago: executing program 46 (id=4356): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000000000000015e53151de295b1e", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400001cb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) r2 = accept$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000580)=0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000008c0)={{{@in=@local, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@broadcast}}, &(0x7f00000004c0)=0xe8) mount$9p_rdma(&(0x7f0000000000), &(0x7f0000000180)='.\x00', &(0x7f0000000780), 0x800, &(0x7f00000006c0)=ANY=[@ANYBLOB='trans=rdma,port=0x0000000000004e22,access=', @ANYRESDEC=r3, @ANYBLOB="2c61630300000000000000722c00"]) bpf$TOKEN_CREATE(0x24, &(0x7f0000000180), 0x8) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYRES8], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r4}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0500000004000000e27f000001"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = dup2(r8, r7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000003c0)='sys_enter\x00', r9}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000001d80)={0x11, 0xc, &(0x7f0000001cc0)=ANY=[@ANYRES64=r7, @ANYRESHEX=r5, @ANYBLOB="95119ea0d31ad4fe9447bb2e543f8ac4a344f8f942e5009c028d9e47fcde8a9f40f4579af0075e58ad7a652083d7afb93b08c661a5e9bdb4a86218b1fff99e3b0e7b03181a05522c41cd22", @ANYRES64=r2, @ANYRESDEC=r4], &(0x7f00000005c0)='syzkaller\x00', 0xfffffffd, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r10}, 0x10) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r11}, 0x10) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x0) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000003c0)='mm_page_free\x00', r12, 0x0, 0xfffffffff7fffffe}, 0x18) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r12, 0x2004}, {r4}], 0x2, &(0x7f00000003c0)={r13, r14+60000000}, &(0x7f0000000400)={[0x3b]}, 0x8) 1m15.852256844s ago: executing program 47 (id=4364): bpf$TOKEN_CREATE(0x24, &(0x7f0000000040), 0x8) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x6) symlinkat(&(0x7f0000000400)='./file0/../file0\x00', r2, &(0x7f00000003c0)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[], 0xa0}}, 0x0) r3 = socket(0x200000100000011, 0x3, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000007c0)=ANY=[@ANYBLOB="540000001400b59500000000000000000a000000", @ANYRES32=r3, @ANYBLOB="140001"], 0x54}}, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmmsg(r4, &(0x7f0000000000), 0x400000000000235, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) syz_mount_image$ext4(&(0x7f0000001140)='ext4\x00', &(0x7f00000007c0)='./file1\x00', 0x410c84, &(0x7f0000000340), 0x1, 0x775, &(0x7f0000001180)="$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") r6 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) fallocate(r6, 0x1, 0x0, 0x1001f0) r7 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) pwritev2(r7, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x1}], 0x1, 0x33000, 0x0, 0x3) readlinkat(r2, &(0x7f00000001c0)='./file0/../file0\x00', &(0x7f00000002c0)=""/198, 0xc6) 1m15.372943693s ago: executing program 48 (id=4366): perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000, 0x0, 0x0, 0x6, 0x3, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'veth1_macvtap\x00'}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'veth0_virt_wifi\x00', 0x0}) r6 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/key-users\x00', 0x0, 0x0) preadv(r7, &(0x7f0000000040)=[{&(0x7f0000000180)=""/128, 0x80}], 0x1, 0x0, 0x0) write$selinux_load(r6, &(0x7f0000000180)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e7578"], 0x2000) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES8=r0, @ANYBLOB="00000000000000002000128008000100687372001400028008000200", @ANYRES32=r1, @ANYBLOB="a86282b2df7e44997cbb3c75b26fdfc25dd456ca7e8df71ad95d441d51c82aee5b06b4e2c6896026257fa3203299475658c3b91f432969e77106b68a5edc4b94043bb03119cdb358c4e99d71612d87ee965a1f8799daf04662124b312cd993e61c71207123f2ffeddf67814c3524069b106bd6d9e7d94e71cc97d1eab3dbb4719e6549ff9a9ed1b57414064e9c6e17751e14b1441682955ae6f5269656323e3dee5721dd28870f56eaf7f3867e377eeec5ee29645e6f8ddb72109c283f741416673339f23b40f4ce5bf6327a7b9a72e743cb", @ANYRES32=r5, @ANYRESHEX=r0], 0x40}}, 0xc815) r8 = syz_open_dev$usbfs(&(0x7f0000000040), 0x4df6, 0x280000) ioctl$USBDEVFS_IOCTL(r8, 0xc0105512, &(0x7f0000000080)=@usbdevfs_connect={0x8000}) 1m13.371808834s ago: executing program 49 (id=4373): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3b, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000000000002, 0x800000000003}, 0x100000, 0x5dd7, 0x3, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socket$netlink(0x10, 0x3, 0x0) r0 = gettid() r1 = epoll_create1(0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x0, 0x0) r3 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f0000000000)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000000c0)='bridge_slave_1\x00', 0x10) bind$inet(r3, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000080)={0x2, 0x0, @broadcast}, 0x10) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000200)={0xa000000a}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r5 = socket$inet(0x2, 0x2, 0x0) shutdown(r5, 0x0) recvmmsg(r5, &(0x7f00000066c0), 0xa0d, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r6, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000280)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f00000002c0)=[0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x37, &(0x7f0000000340)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x2e, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='attr/fscreate\x00') finit_module(r2, 0x0, 0x0) tkill(r0, 0x7) 1m9.373747048s ago: executing program 50 (id=4377): r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'netdevsim0\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1, 0x7, 0x2261, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r2, &(0x7f0000000000), &(0x7f0000000080)=@udp}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000d80)={{r2, 0xffffffffffffffff}, &(0x7f0000000d00), &(0x7f0000000d40)='%+9llu \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000009c0)={{r3}, &(0x7f00000008c0), &(0x7f0000000980)='%pB \x00'}, 0x20) 1m3.358290483s ago: executing program 4 (id=4436): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f00850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x11, 0x4, &(0x7f0000000080)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xad}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x83, &(0x7f0000000480)=""/131, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x20, 0x3, &(0x7f0000001200)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @netfilter=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800000000003}, 0x1100, 0x1, 0x3, 0x5, 0x0, 0x8, 0x5d, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r2, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) utimes(0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000005000000010001000f00000001"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b708000000f1ff007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) rename(&(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000001600), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_PORTS(r6, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001680)={&(0x7f0000001640)={0x1c, r7, 0x1, 0xfffffffe}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r5, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c40)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="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"], 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000008c0)={r1, 0x0, 0x14, 0x0, &(0x7f00000006c0)="f6f4e9a1d78ad62ceef1884366a578bb3fb7dbfc", 0x0, 0x0, 0x0, 0x31, 0x0, &(0x7f0000000700)="49723b3ab53a13274c56e00d5be19f87e669877bbc7b7c0cb48fd1bbea1e688e7c84ccfb034a845b4493c90e1785234592", 0x0}, 0x50) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa08, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, 0x0, 0x48) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000680)=0xe8) mount$tmpfs(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x1000, &(0x7f0000000ac0)=ANY=[@ANYBLOB="6e725f626c6f636b733d017834307665722c679fe7988d6f74612c6769643d00"/42, @ANYRESHEX=r8, @ANYBLOB=',grpquota,grpquota,fsmagic=0x0000000000000005,uid>', @ANYRESDEC=r9, @ANYBLOB=',\x00']) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xb, 0xf, 0x200cc, 0x6, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200)='T', &(0x7f0000000240), 0x4af, r10}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000700)={0x0, &(0x7f0000000540)=""/245, &(0x7f00000000c0), &(0x7f0000000680), 0x2, r10}, 0x38) 1m3.203742392s ago: executing program 4 (id=4439): socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000080)={0x0, 'batadv0\x00', {0x8}, 0x1}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1700000000000000040000000300000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x24, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_emit_ethernet(0xffffffffffffff91, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000001c0)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="fc0000001900674c0000000000000000e0000001000000000000000000000000e000000200000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000400000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000044000500000000000000000000000000000000000000000033"], 0xfc}}, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000080)={0x10, 0x0, 0x0, 0xfffffffffffffffd}, 0xc) sendto$inet6(r4, &(0x7f0000000240)="c4", 0x1, 0x20000841, &(0x7f0000000280)={0xa, 0x2, 0x4, @empty}, 0x1c) 1m3.119173452s ago: executing program 4 (id=4442): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x18, 0x0, 0x1, 0x401, 0x0, 0x0, {0xa}, [@CTA_TUPLE_REPLY={0x4}]}, 0x18}}, 0x0) (fail_nth: 1) 1m2.829871191s ago: executing program 4 (id=4443): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="180000000001010800000000000000409acdda4df11e73624a8496307a7a848b4c967468c74bf0011eebbdeb114c4f29462fd51ca53e3839945f7c7a35657b50c6c0d621ac84bd2cc2fb30bf5b02c26eae614744a174aa46a8b4e2b95d2d001de2b30fdc9da242c12113e8c897c5ce518f2de94670c9a423168ded5b44bf3eaad8f8d83c09220500905a6a575f4b94c61e7af32db7bca6c59e1a7978295b525fa28546505a37a5c569d92905e32d7fd20ccee94a1c3cff65131c9d13a3b7c51263cc26f2d9b959dc841240845c3f489d7bdee21661741b55e055b79832"], 0x18}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r1, &(0x7f000000cf80)=""/102400, 0xfffffda3, 0xe0ffff000000) r2 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x1, 0x0, @remote}, 0x1c) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0900000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000efff000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r4, 0x0, 0xfffffffffffffffc}, 0x18) mmap(&(0x7f0000000000/0x400000)=nil, 0x1400000, 0x0, 0xc3072, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(r2, 0x29, 0x4e, &(0x7f00000000c0), 0x4) socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000000000", @ANYRES32, @ANYBLOB="0200"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0xefb, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r8}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'gre0\x00'}) r10 = io_uring_setup(0x7834, &(0x7f00000000c0)={0x0, 0xd4b4, 0x0, 0x3, 0x2a}) io_uring_register$IORING_REGISTER_PERSONALITY(r10, 0x9, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) 1m2.72321657s ago: executing program 4 (id=4446): r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendmmsg$inet(r1, &(0x7f0000008c80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002540)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x14}, @multicast2}}}], 0x20}}, {{0x0, 0x0, 0x0}}], 0x2, 0x840) 1m2.65967157s ago: executing program 1 (id=4448): r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup2(r0, r0) connect$pppl2tp(r1, &(0x7f00000000c0)=@pppol2tp={0xa, 0x1, {0xffff0000, 0xffffffffffffffff, {0x2, 0x0, @remote}, 0x0, 0x0, 0x2}}, 0x26) sendmsg$netlink(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000009940)=ANY=[], 0x290}, {&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x8bc}, {0x0, 0x184}], 0x3}, 0x0) 1m2.65288275s ago: executing program 4 (id=4449): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f00850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x11, 0x4, &(0x7f0000000080)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xad}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x83, &(0x7f0000000480)=""/131, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x20, 0x3, &(0x7f0000001200)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @netfilter=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800000000003}, 0x1100, 0x1, 0x3, 0x5, 0x0, 0x8, 0x5d, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r2, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) utimes(0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000005000000010001000f00000001"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b708000000f1ff007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) rename(&(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000001600), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_PORTS(r6, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001680)={&(0x7f0000001640)={0x1c, r7, 0x1, 0xfffffffe}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r5, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c40)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="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"], 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000008c0)={r1, 0x0, 0x14, 0x0, &(0x7f00000006c0)="f6f4e9a1d78ad62ceef1884366a578bb3fb7dbfc", 0x0, 0x0, 0x0, 0x31, 0x0, &(0x7f0000000700)="49723b3ab53a13274c56e00d5be19f87e669877bbc7b7c0cb48fd1bbea1e688e7c84ccfb034a845b4493c90e1785234592", 0x0}, 0x50) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa08, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, 0x0, 0x48) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000840), 0x1000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000680)=0xe8) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xb, 0xf, 0x200cc, 0x6, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200)='T', &(0x7f0000000240), 0x4af, r8}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000700)={0x0, &(0x7f0000000540)=""/245, &(0x7f00000000c0), &(0x7f0000000680), 0x2, r8}, 0x38) 1m2.314394929s ago: executing program 1 (id=4451): r0 = socket$key(0xf, 0x3, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc47, @void, @value}, 0x94) sendmsg$key(r0, &(0x7f0000000040)={0xa, 0x0, &(0x7f0000000340)={&(0x7f0000000b00)=ANY=[@ANYBLOB="020300000b0000000000000000000000030006000000000002000000e000000100000000000000000200010000001c000000fb18000000000300050000000000020000007f0000010000000000000000010018"], 0x58}, 0x1, 0x7}, 0x0) 1m2.146286398s ago: executing program 1 (id=4452): openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='cpu.stat\x00', 0x0, 0x0) setfsuid(0xee00) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000003"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x4b0}, 0x1, 0x0, 0x0, 0x44}, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffff2d, &(0x7f0000000080)=[{&(0x7f0000000040)="c00e02003c000b05d25a806f8c6394f90124fc600c05000f90c60100053582c137153e370a48018004f01700d1bd", 0x33fe0}], 0x1, 0x0, 0x0, 0x5}, 0x0) 1m1.993100227s ago: executing program 1 (id=4454): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000000)=0x1, 0x4) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e24, @multicast1}, 0x10) sendmmsg(r0, &(0x7f00000007c0)=[{{&(0x7f00000000c0)=@in={0x2, 0x4e24, @loopback}, 0x80, 0x0}}], 0x1, 0x2c000011) 1m1.113638764s ago: executing program 1 (id=4459): r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r2, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendmmsg$inet(r2, &(0x7f0000008c80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002540)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x14}, @multicast2}}}], 0x20}}, {{0x0, 0x0, 0x0}}], 0x2, 0x840) 1m1.047657013s ago: executing program 1 (id=4460): r0 = socket$key(0xf, 0x3, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b70300000000002085000000730000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc47, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) sendmsg$key(r0, &(0x7f0000000040)={0xa, 0x0, &(0x7f0000000340)={&(0x7f0000000b00)=ANY=[@ANYBLOB="020300000b0000000000000000000000030006000000000002000000e000000100000000000000000200010000001c000000fb18000000000300050000000000020000007f0000010000000000000000010018"], 0x58}, 0x1, 0x7}, 0x0) 56.726471825s ago: executing program 51 (id=4387): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="d800000018008103e00312ba0d8105040a600300ff0f040b067c55a1bc000900b80006990700000015000500fef32702d3001500030001400200000901ac040098007f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d322fe04000000730d7a5025ccca262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b66bce0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f00000e970300"/216, 0xd8}, {&(0x7f0000000380)="61e39f99710f2ba10fe5947e974ddbf5e1f0b5c8714e6beb12e2ace7e974171e6d4b1a8108a667f9e330fc03c48bb659feeaca39e48410077b9d84c3468c0fa86d1ff3bb61502ed333eb154449b357b7fb32703b2db130ce27ad41804c9aaa075d838c3b9ad3d6", 0x67}], 0x2}, 0x880) 48.0956212s ago: executing program 52 (id=4449): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f00850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x11, 0x4, &(0x7f0000000080)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xad}]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x83, &(0x7f0000000480)=""/131, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x20, 0x3, &(0x7f0000001200)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @netfilter=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x800000000003}, 0x1100, 0x1, 0x3, 0x5, 0x0, 0x8, 0x5d, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r2, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) utimes(0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000005000000010001000f00000001"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b708000000f1ff007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x10) rename(&(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000001600), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_PORTS(r6, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001680)={&(0x7f0000001640)={0x1c, r7, 0x1, 0xfffffffe}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_LINK_TOL(r5, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000c40)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="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"], 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000008c0)={r1, 0x0, 0x14, 0x0, &(0x7f00000006c0)="f6f4e9a1d78ad62ceef1884366a578bb3fb7dbfc", 0x0, 0x0, 0x0, 0x31, 0x0, &(0x7f0000000700)="49723b3ab53a13274c56e00d5be19f87e669877bbc7b7c0cb48fd1bbea1e688e7c84ccfb034a845b4493c90e1785234592", 0x0}, 0x50) socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa08, 0x0, 0x0, 0x3, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, 0x0, 0x48) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', &(0x7f0000000840), 0x1000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@loopback, @in6=@dev}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000000680)=0xe8) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xb, 0xf, 0x200cc, 0x6, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200)='T', &(0x7f0000000240), 0x4af, r8}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000700)={0x0, &(0x7f0000000540)=""/245, &(0x7f00000000c0), &(0x7f0000000680), 0x2, r8}, 0x38) 46.545064303s ago: executing program 53 (id=4460): r0 = socket$key(0xf, 0x3, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b70300000000002085000000730000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc47, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) sendmsg$key(r0, &(0x7f0000000040)={0xa, 0x0, &(0x7f0000000340)={&(0x7f0000000b00)=ANY=[@ANYBLOB="020300000b0000000000000000000000030006000000000002000000e000000100000000000000000200010000001c000000fb18000000000300050000000000020000007f0000010000000000000000010018"], 0x58}, 0x1, 0x7}, 0x0) 32.901958947s ago: executing program 8 (id=4764): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.io_service_bytes\x00', 0x275a, 0x0) write$cgroup_int(r0, &(0x7f0000000000), 0xffffff6a) ioctl$FS_IOC_RESVSP(r0, 0x4030582b, &(0x7f00000001c0)={0x1100, 0x2, 0xfbffffffffffffff, 0x9}) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x28, 0x3f7, 0x200, 0x70bd28, 0x25dfdbfd, {0x7, 0x7, './file0', './file0'}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8080}, 0x4000011) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="0600000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="010000752972900000000000bdaf8134be75eb32e24d35c49580c6f05c372277774833e463277aab3e88d066d090ac86653b7e877e665c1f0bb68e686ba2e1847d2e632f48ae57cd7e82e3872fa1f1", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) mlock(&(0x7f0000002000/0x3000)=nil, 0x3000) r3 = socket$inet(0x2, 0x80001, 0x84) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r4, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) write$cgroup_subtree(r5, &(0x7f0000000080)=ANY=[], 0x10448) setsockopt$inet_opts(r5, 0x0, 0x4, &(0x7f0000000580)="941f9908f062e99c7975d68fad5aea8af8799487e13ee96fbc0fd090c93044b1df0313be6bb5793c8907db87156405ed4e6853d7623ef06c5a4cf8ee57b416982afdfb13dfab384697666b40f47714db2d8b3665f9ae0a15a825428038ef02cf6dbf733f000752529e6ad244f57d6c1246675d3ea28a1fd9025cce6fd3d282ef4643b963a4a54a910cf673f2f3b669d880a6dd501f39687696d6f3297878c69ef48085b0f1d47ebaffaa14df162f08d560c3547668e99d29dc8aee4b8076ca6cfb4cb7abdda81bcbc6a7f37840d29c302c1670090b0cc9d0c227a6", 0xdb) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r5, 0x0) ppoll(&(0x7f0000000d40)=[{}], 0x25, &(0x7f0000000300)={0x0, 0x3938700}, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000080)=[@in6={0xa, 0xfffa, 0xfff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x8}]}, &(0x7f0000000540)=0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000022020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r8, 0x10e, 0x1, &(0x7f0000000400)=0x1, 0x2c) r9 = socket$inet6(0xa, 0x3, 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r9, 0x29, 0x23, &(0x7f0000000180)={{{@in=@empty, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x6}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x0, 0x6c}, 0x0, @in=@private=0xa010102, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xfffffffc}}, 0xe8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r7, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x16, &(0x7f0000000680)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0xca, 0x8, 0x0, 0x0}}, 0x10) ioctl$sock_inet6_SIOCSIFADDR(r9, 0x8916, 0x0) connect$inet6(r9, &(0x7f0000000280)={0xa, 0x4e20, 0x5, @empty, 0x7}, 0x1c) connect$inet6(r9, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000001580)={r6, @in={{0x2, 0x0, @empty}}, 0x0, 0x3, 0x4, 0xfffffffe, 0x0, 0x0, 0x4}, &(0x7f0000000540)=0x9c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000653abdf7a3278bd24edbdd0df9d1ffdb331f1a2d167a295b1597cc56e2b254563907822abcf102b48e524010991018b7fcccd81c9aef446c17ad7538ed30a0d7799afe0fce089ddc7afca3fe6fd0d3670b68373aab2d35f077d2cd8a7a9425a3b8993ecb4b31fc8b5d5d45244085d1a0bb7720f434ade814d3d9fb412b35becd18ee046f152fcbd1de710a72953c7eb27c94d4c1"], &(0x7f0000000240)='GPL\x00', 0x0, 0x4b, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 32.298257634s ago: executing program 8 (id=4777): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) fcntl$notify(0xffffffffffffffff, 0x402, 0x3) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b708d2baec5a00007b8af0ff00000000bfa100000000000007010000f8ffffff54a400000000000007040000f0ffffffb70200000800000010230000", @ANYRES32=r0, @ANYBLOB="0000010000000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r3, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @broadcast}, 0x2}}, 0x2e) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) r4 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r5 = dup(r4) open(&(0x7f0000000000)='./file0\x00', 0x8e040, 0x0) r6 = open_tree(0xffffffffffffff9c, &(0x7f0000000380)='\x00', 0x89901) fchdir(r6) close(r6) mount(&(0x7f0000000040)=@md0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='zonefs\x00', 0x1000431, 0x0) ioctl$PTP_EXTTS_REQUEST2(r5, 0x43403d05, 0x0) ioctl$GIO_UNISCRNMAP(r5, 0x4b69, 0x0) epoll_create1(0x511acbfec998cce6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r7, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r8, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r7, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r9 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r9, 0x1, r8, &(0x7f0000000080)={0x20000014}) syz_open_dev$vcsu(&(0x7f0000000240), 0x0, 0x80000) r10 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r10, 0x1, r10, &(0x7f0000000280)={0x90002004}) getgid() ppoll(&(0x7f0000000200)=[{r9, 0x1}], 0x1, 0x0, 0x0, 0x0) 31.23484203s ago: executing program 8 (id=4793): r0 = open(&(0x7f00000003c0)='./file2\x00', 0x64842, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) close_range(r0, r1, 0x2) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r3, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f00000005c0)=r4}, 0x20) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=@newtaction={0x78, 0x30, 0x871a15abc695fb3d, 0x0, 0x0, {}, [{0x64, 0x1, [@m_tunnel_key={0x60, 0x1, 0x0, 0x0, {{0xf}, {0x30, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV4_DST={0x8, 0x4, @multicast2}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{}, 0x1}}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @loopback}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc}}}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4048800}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_CREATE(r7, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="1d678853", @ANYRES16=r2, @ANYBLOB="17090000000000000000010000000500070000000000080009000000000008000a0000000000060002000000000014001f00000000000000000000000000000000001400200000000000000000000000ffffac1414bb0500220000000000"], 0x64}}, 0x0) accept4$unix(r0, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r8 = socket$inet6(0xa, 0x2, 0x0) r9 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000240), r9) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmmsg$inet(r8, &(0x7f00000017c0)=[{{&(0x7f0000000040)={0x2, 0xa, @remote={0xac, 0x1c}}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r10, @empty}}}], 0x20, 0x2000000}}], 0x1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r0, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9, &(0x7f0000000500)=[0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb6, &(0x7f0000000580)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x24, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0, 0xffffffffffffffff}, &(0x7f0000000800), &(0x7f0000000840)=r0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x14, 0x11, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000d000000000000002f00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000000950000000000000018640000020000000000000006000000bf9100000000000000020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000340)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x4a, '\x00', r10, @fallback=0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000380)={0x1, 0x1, 0x2, 0x9f}, 0x10, r11, r0, 0x6, &(0x7f00000008c0)=[r3, r5, r3, r5, r12, r6, r3, r3], &(0x7f0000000900)=[{0x3, 0x5, 0x9, 0x9}, {0x1, 0x5, 0xb, 0x2}, {0x5, 0x2, 0x7}, {0x0, 0x1, 0x10, 0x6}, {0x2, 0x3}, {0x0, 0x2, 0xf, 0x3}], 0x10, 0x2, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xa, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 31.151527419s ago: executing program 8 (id=4797): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000000c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r2, 0x0) shutdown(r1, 0x0) r3 = accept(r2, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000000)='\x00', 0x1, 0x4001085, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = socket(0x2, 0x5, 0x0) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x1000410, &(0x7f0000000100)={[{@grpid}, {@grpquota}]}, 0x4, 0x4eb, &(0x7f0000000540)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_all\x00', 0x275a, 0x0) setsockopt(0xffffffffffffffff, 0x65, 0x20000000, &(0x7f0000000380)="39000100fbe20000f84007378d3294f300262c24bc4b060875508b00dc6c08d7c5", 0x21) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ec00000021000100feffffff000000000000000000000000000000000000000000000000007c0000000000000000000000000000000000001700a000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000009c00110000000000000000000000000000000000fe8000000000000000000000000000bbac1414210000000000000000000000002001000000000000000000000000000000000000000000000000020000000000000000000000000000000000fe8000000000000000000000000000bb"], 0xec}}, 0x0) quotactl$Q_SETQUOTA(0xffffffff80000801, &(0x7f0000000000)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000180)={0x4, 0x0, 0x10001, 0x1, 0x1, 0x0, 0x0, 0x36a, 0x20003f}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001840)=@newtaction={0xea0, 0x30, 0x25, 0x0, 0x0, {}, [{0xe8c, 0x1, [@m_pedit={0xe88, 0x1, 0x0, 0x0, {{0xa}, {0xe5c, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0x3}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xfffffffd}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}]}}, @TCA_PEDIT_KEYS_EX={0x38, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}, {0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}]}]}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xea0}}, 0x0) capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) sendmmsg$inet_sctp(r5, &(0x7f00000032c0)=[{&(0x7f0000002e40)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000680)="03", 0x1}], 0x1}], 0x1, 0x880) sendmmsg$inet_sctp(r5, &(0x7f0000000bc0)=[{&(0x7f00000000c0)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000001c0)=[{0x0, 0x2}], 0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="30000000000000008400000001000000000000000c0000000000000002002b0388edb6556900"/51, @ANYRES32=0x0], 0x30}], 0x1, 0x0) 30.346561505s ago: executing program 8 (id=4812): r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r1, &(0x7f0000000080), &(0x7f0000000280)=@udp}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r3, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendmmsg$inet(r3, &(0x7f0000008c80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002540)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x14}, @multicast2}}}], 0x20}}, {{0x0, 0x0, 0x0}}], 0x2, 0x840) 30.238496956s ago: executing program 8 (id=4814): r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d0000"], &(0x7f0000000240)='GPL\x00', 0xc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r1}, 0x18) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x3}, 0x8) sendto$inet6(r0, &(0x7f0000000040)="aa", 0x1, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) shutdown(r0, 0x1) 29.483024022s ago: executing program 3 (id=4832): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket(0x1e, 0x5, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) listen(r2, 0x0) r3 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r3, &(0x7f0000000080)={&(0x7f0000000100)=@id={0x1e, 0x3, 0x0, {0x4e20, 0x2}}, 0x10, 0x0}, 0x4045094) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f00000000c0)=@req3={0x80000000}, 0x1c) accept4$inet6(r2, 0x0, 0x0, 0x0) sendmsg$tipc(r3, &(0x7f0000000640)={&(0x7f0000000300), 0x10, 0x0}, 0x0) socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_open_dev$tty20(0xc, 0x4, 0x0) syz_io_uring_setup(0x1868, 0x0, 0x0, &(0x7f0000000340)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = syz_open_dev$loop(&(0x7f0000000000), 0x6, 0x101000) ioctl$BLKSECDISCARD(r6, 0x127d, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) syz_io_uring_submit(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x141a82, 0x0) fsetxattr$security_selinux(r7, &(0x7f0000000000), &(0x7f0000000040)='system_u:object_r:mouse_device_t:s0\x00', 0x24, 0x0) 29.361418032s ago: executing program 3 (id=4833): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0a000000040000000400000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff85000000040000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) 29.299130702s ago: executing program 3 (id=4834): r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x3, @remote, 0x6}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@bloom_filter={0x1e, 0xdefd, 0x5d8, 0x6, 0xa0080, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x2, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) socket$inet(0x2, 0x1, 0x0) r4 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000080b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) sendfile(r4, r4, 0x0, 0x800000009) fgetxattr(r3, &(0x7f0000000000)=@known='trusted.overlay.upper\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'macvlan1\x00', 0x0}) r8 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0100000003000000610200000200000000000000", @ANYRES32=r8, @ANYBLOB="0000000059e6819000000000001a000000000000", @ANYRES32=r7, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'batadv0\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r4, &(0x7f0000000780)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000740)={&(0x7f00000007c0)=ANY=[@ANYBLOB="cc010000", @ANYRES16=0x0, @ANYBLOB="010029bd7000fbdbdf2504000000180001801400020076657468305f746f5f626f6e640000000c00018008000300020000002c00018008000300030000000800030001000000080003000300000008000100", @ANYRES32=r7, @ANYBLOB="0800030002000000300001801400020065727370616e3000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="080003ef000000000800030001000000500001800800016e2b00", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r7, @ANYBLOB="140002006272696467655f736c6176655f3000001400020076657468305f746f5f626f6e64000000140002006e6963766630000000000000000000004400018008000100", @ANYRES32=0x0, @ANYBLOB="080003000100000014000200627269646765300000000000000000001400020076657468305f746f5f7465616d00000008000300020000002000018008000100", @ANYRES32=r10, @ANYBLOB="1400020076657468315f746f5f626f6e64000000640001801400020069705f767469300000000000000000001400020073797a5f74756e00000000000000000014000200726f7365300000000000000000000000140002006272696467655f736c6176655f30000008000100", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="2000018014000200626174616476300000000000000000000800030003000000"], 0x1cc}, 0x1, 0x0, 0x0, 0x4000}, 0x4040010) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r9, &(0x7f0000000040)}, 0x20) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0x4) 29.215743861s ago: executing program 3 (id=4836): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000060000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000080), &(0x7f0000000280)=@udp}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0x800}, 0x18) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x10e, &(0x7f0000000280)={[{@errors_remount}, {@nodelalloc}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2e}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x10000}}, {@block_validity}, {@quota}]}, 0x3, 0x44d, &(0x7f0000001f80)="$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") bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095", @ANYRES16=r1, @ANYRES16=0x0, @ANYRESHEX=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[], 0x50) syz_usb_connect$uac1(0x0, 0xac, 0x0, 0x0) openat$pidfd(0xffffffffffffff9c, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000a400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup2(r2, r2) connect$pppl2tp(r3, &(0x7f00000000c0)=@pppol2tp={0xa, 0x1, {0xffff0000, 0xffffffffffffffff, {0x2, 0x0, @remote}, 0x0, 0x0, 0x2}}, 0x26) sendmsg$netlink(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000009940)=ANY=[], 0x290}, {&(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x8bc}, {0x0, 0x184}], 0x3}, 0x0) 28.647857629s ago: executing program 3 (id=4842): r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r1, &(0x7f0000000080), &(0x7f0000000280)=@udp}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000008c80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002540)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x14}, @multicast2}}}], 0x20}}, {{0x0, 0x0, 0x0}}], 0x2, 0x840) 28.570372829s ago: executing program 3 (id=4844): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0a000000040000000400000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff85000000040000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) 28.213679057s ago: executing program 7 (id=4849): socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000080)={0x0, 'batadv0\x00', {0x8}, 0x1}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x24, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_emit_ethernet(0xffffffffffffff91, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000001c0)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="fc0000001900674c0000000000000000e0000001000000000000000000000000e000000200000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000400000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000044000500000000000000000000000000000000000000000033"], 0xfc}}, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r4, &(0x7f0000000080)={0x10, 0x0, 0x0, 0xfffffffffffffffd}, 0xc) sendto$inet6(r3, &(0x7f0000000240)="c4", 0x1, 0x20000841, &(0x7f0000000280)={0xa, 0x2, 0x4, @empty}, 0x1c) 28.130350936s ago: executing program 7 (id=4851): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sys_enter\x00', r1}, 0x10) getdents(0xffffffffffffffff, 0x0, 0x0) 27.994688736s ago: executing program 7 (id=4853): truncate(0x0, 0x1) syz_mount_image$msdos(&(0x7f0000000180), &(0x7f0000000100)='.\x00', 0x126a4b5, &(0x7f000000b6c0)=ANY=[@ANYRES16, @ANYRES64, @ANYBLOB="12a4095a2aac12f0bfcb206d982e44066381388d27f14002d8d7431d3947f6399c7ff9f5193fc0398653e5a67bbb319f02bf4ac6f6ccd5acbfe1350cc3a6d2d48cf6c089ddf67171ffb3b15988e7b394c5daf3e12ca05e4dbdad7edd45f10cbc296a53a530d4c2d203ee650d5fff3a9b5aae78794fe84327e508172cdd72eeff5af4d6db9379bef20dde8e64b91d31a84ce8a7598bb78cc85108874811fc650f0520a5", @ANYRES16, @ANYRESDEC, @ANYRES16, @ANYRES16, @ANYBLOB="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", @ANYRES8, @ANYRESOCT=0x0], 0x0, 0x0, &(0x7f0000000000)) creat(&(0x7f0000000000)='./bus\x00', 0x0) mount(&(0x7f0000000100), &(0x7f0000000280)='./bus\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000300)='trans=rdma,') socket$inet6_sctp(0xa, 0x1, 0x84) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x2000002, &(0x7f0000000280)={[{@user_xattr}]}, 0x9, 0x537, &(0x7f0000000fc0)="$eJzs3c9vI1cdAPCvJ4mTbtNmF3qACtgFCgtarb3xtlHVC90LCFWVEIgD4rANiTcKseMQO1UTIpH+DXDgCn8CByQOSD1x4MYRiQNCKgekBSLQBgkkoxlPUm/idL2Nf0D8+UijmTfPM9/3ksy8mefJvAAm1o2IOIiIYkS8FREL+fpCPsXrnSn93KPD/ZWjw/2VQrTb3/pbIctP10XXNqln833ORcQ3vxbxvcLZuM3dvY3lWq26nafLrfpWubm7d3u9vrxWXatuVipLi0t3Xr37SmVgdb1e/8XDr66/8e1f/+rT7//u4Ms/TIs1n+d112OQOlWfOYmTmo6IN4YRbAym8nlxzOXgo0ki4mMR8bns+F+IqeyvEwC4zNrthWgvdKcBgMsuyfrACkkp7wuYjyQplTp9eC/ElaTWaLZuPWjsbK52+squxkzyYL1WvXNt9g8/yK4YZgppejHLy/KzdOVU+m5EXIuIn8w+k6VLK43a6vguewBgoj17qv3/52yn/e9Dj2/1AID/G3PjLgAAMHLafwCYPNp/AJg8fbT/+Zf9B0MvCwAwGk9x/58MsxwAwOjo/weAyaP9B4CJ8o0330yn9lH+/uvVt3d3Nhpv316tNjdK9Z2V0kpje6u01misZe/sqT9pf7VGY2vx5dh5p9yqNlvl5u7e/XpjZ7N1P3uv9/3qzEhqBQB8mGvX3/t9ISIOXnsmm6JrLAdtNVxunueByeUlfjC5jPYFk6v/e/zfDrUcwPj0vA+Y67n4uJ8+RRDPGcH/lJuf7L//3xjPcLno/4fJNfWRtpodeDmA0dP/D5Or3S6cHvO/eJIFAFxKF3jGv/2jQV2EAGP1pOeAB/L9PwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFwy8xHx/SgkpXws8PlIklIp4rmIuBozhQfrteqdiHg+rkfEzGyaXhx3oQGAC0r+UsjH/7q58NL86dxi4V/ZYP/FtPXP120vpuv/frJ+9nj4sMoH211gXEEAYMDeWW61tiv5vOtG/tHh/srxNMryPLwX/8mHIl45OtzPpk7OdExn87nsWuLKPwp5ujMW6YsRMTWA+AfvRsQnetW/kPWNXM1HPu2OH3ns50YaP3ksfpLldebpxdfHB1AWmDTv3YuI13sdf0ncyOa9j/+57Ax1cQ/vdXZ2fO47OtwvHsc/Pv9N9YifHvM3+o3x8m++fmZle6GT927Ei9OPxT85/xzHL5wT/6U+4//xU5/58VfOyWv/LOJm9I7fHavcqm+Vm7t7t9fry2vVtepmpbK0uHTn1buvVMpZH3X5uKf6rL++duv588qW1v/KOfHneta/eLLtF/qs/8///dZ3P/sh8b/0+V7xk3ihZ/yOtE38Yp/xl6/88tzhu9P4q+fU/0m//1t9xn//z3urfX4UABiB5u7exnKtVt2+0EJ6FzqI/ZxZSIs40B32WCh2Ff5PMdxYT7UwM6yf6tAXpk+uFQe75++kexxxdZKB1+JCC49GFWu85yVg+D446MddEgAAAAAAAAAAAAAA4Dyj+NelcdcRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAy+u/AQAA//9xkcaD") lstat(&(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x4080, &(0x7f00000001c0)={[{@inode64}, {@mode={'mode', 0x3d, 0x3ff}}], [{@context={'context', 0x3d, 'staff_u'}}, {@subj_role={'subj_role', 0x3d, '*^}'}}, {@euid_lt={'euid<', r0}}, {@measure}, {@smackfshat}]}) syz_open_dev$evdev(&(0x7f0000000240), 0x8000000000000001, 0x0) 27.901341736s ago: executing program 7 (id=4854): r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000100)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r1) socket$pptp(0x18, 0x1, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x537b}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80008}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r3}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) accept(r1, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000080000000c"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00'}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r4}, &(0x7f00000005c0), &(0x7f0000000600)}, 0x20) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x3000003, 0x8c4b815a5465c2b1, 0xffffffffffffffff, 0x0) r5 = gettid() process_vm_writev(r5, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) 27.799842335s ago: executing program 7 (id=4855): r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r1, &(0x7f0000000080), &(0x7f0000000280)=@udp}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000008c80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002540)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x14}, @multicast2}}}], 0x20}}, {{0x0, 0x0, 0x0}}], 0x2, 0x840) 27.709393795s ago: executing program 7 (id=4857): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) close(r0) 23.305474547s ago: executing program 6 (id=4878): r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000100)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r1) socket$pptp(0x18, 0x1, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x537b}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x80008}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r3}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) accept(r1, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x7, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{}, &(0x7f00000005c0), &(0x7f0000000600)}, 0x20) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x3000003, 0x8c4b815a5465c2b1, 0xffffffffffffffff, 0x0) r5 = gettid() process_vm_writev(r5, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) 23.204328766s ago: executing program 6 (id=4879): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xb4d55e7b6780ecfc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r4, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2, 0x0, @empty, @broadcast}, @timestamp_reply={0x16}}}}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700000086d7c0d6c878f064eb", @ANYRES32=r5, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000080)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xfff1, 0xffff}}}, 0x24}, 0x1, 0x0, 0x0, 0x880}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000540)=@delchain={0x24, 0x64, 0xf31, 0x1000000, 0x0, {0x0, 0x0, 0x0, r5, {0x9}, {0x10, 0xffff}}}, 0x24}}, 0x1000000) r6 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r6, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, 0x0, 0x0, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x0) 23.015146265s ago: executing program 6 (id=4880): r0 = socket$key(0xf, 0x3, 0x2) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc47, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) sendmsg$key(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, 0x1, 0x7}, 0x0) 22.866338685s ago: executing program 6 (id=4882): openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r0}, 0x18) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x441, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCXONC(r1, 0x540a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = syz_open_dev$sg(0x0, 0x0, 0x401) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000540)={'\x00', 0x7ff, 0x200006, 0xc, 0xb, 0x59c, 0xffffffffffffffff}) ioctl$SG_BLKTRACETEARDOWN(r2, 0x1276, 0x0) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x41, &(0x7f0000000340)=0x61ba, 0x4) setsockopt$inet6_int(r3, 0x29, 0x4, &(0x7f0000000000)=0x6, 0x4) sendmmsg$inet6(r3, &(0x7f00000002c0)=[{{&(0x7f0000000b00)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x63, 0x0}}], 0x1, 0x0) recvmmsg(r3, &(0x7f0000003500)=[{{0x0, 0x0, 0x0}, 0x7}], 0x1, 0x40002043, 0x0) r4 = socket$pppl2tp(0x18, 0x1, 0x1) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0xff0f}], 0x1}, 0x0) connect$pppl2tp(r4, &(0x7f0000000300)=@pppol2tpv3in6={0x18, 0x1, {0x0, r5, 0x2, 0x2, 0x3, 0x404, {0xa, 0x4e20, 0x0, @mcast1, 0xfb70}}}, 0x3a) ioctl$TCXONC(r1, 0x540a, 0x2) r6 = syz_mount_image$ext4(&(0x7f0000000540)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x88, &(0x7f00000005c0)={[{@nogrpid}, {@min_batch_time}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@nobarrier}, {@nodiscard}, {@quota}]}, 0x3, 0x42f, &(0x7f0000000940)="$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") prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYRES64=r6, @ANYRESOCT=r1, @ANYRESDEC=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) sysinfo(0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) fadvise64(r8, 0xffff, 0x0, 0x5) 22.022889981s ago: executing program 6 (id=4887): r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x10) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r3, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendmmsg$inet(r3, &(0x7f0000008c80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002540)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x14}, @multicast2}}}], 0x20}}, {{0x0, 0x0, 0x0}}], 0x2, 0x840) 21.902377531s ago: executing program 6 (id=4888): r0 = syz_create_resource$binfmt(&(0x7f0000000040)='./file0\x00') r1 = openat$binfmt(0xffffffffffffff9c, r0, 0x42, 0x1ff) close(r1) write(0xffffffffffffffff, &(0x7f0000000180)="01", 0x1) close(0xffffffffffffffff) r2 = socket(0xa, 0x40000000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000880)=@nat={'nat\x00', 0x19, 0x2, 0x348, [0x20000280, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x2, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]}, 0x3c0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000840)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) ioctl$BTRFS_IOC_SEND(r2, 0x40489426, &(0x7f0000000b00)={{r3}, 0x7, &(0x7f0000000a00)=[0xbe5, 0x1, 0x140000000000000, 0x7fff, 0x2, 0x1000, 0x9], 0x4, 0x0, 0x1}) execveat$binfmt(0xffffffffffffff9c, r0, 0x0, 0x0, 0x0) 20.986072907s ago: executing program 2 (id=4894): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000021007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = syz_open_dev$MSR(&(0x7f0000000040), 0x8, 0x0) dup(r2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) mknod$loop(&(0x7f0000000300)='./file0\x00', 0x100000000000600d, 0x1) setxattr$security_capability(0x0, &(0x7f0000000280), 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=ANY=[], 0x0, 0x0) 20.635060605s ago: executing program 2 (id=4895): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000800)='./file0\x00', 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="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", @ANYRESHEX=0x0, @ANYRESOCT], 0x2, 0x699, &(0x7f0000000140)="$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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000000c0)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\xd2q#\xc6\xca\x97\x9d\xcb\x1e\x80\xd6\xd5%N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec', 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$TCFLSH(r4, 0x40045436, 0x14) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xb, 0x5, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffe}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r8, 0x8933, &(0x7f0000000440)={'batadv0\x00', 0x0}) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="0a00000004000000080000000c"], 0x48) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r12}, 0x10) r13 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r13, 0x0, 0x4b, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$BATADV_CMD_SET_MESH(r8, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000880)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="010000000000000000000f000000050030000000000008000300", @ANYRES32=r10, @ANYBLOB="05002f"], 0x2c}, 0x1, 0x0, 0x0, 0x40800}, 0x0) sendmsg$BATADV_CMD_SET_MESH(r7, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000008c0)=ANY=[@ANYBLOB="4c000000300e78a731b1a319d496c83cbc1a82ee7aa6df9f10b957285fc4a8ce3a18d31143781f9074d1c528d7e73d1eb35d3743bca3f425d028f9d0346c4bc407c4cc6840c405c6e71a4b049f4578d59aa4440d47ff1b0edc", @ANYRES16=r9, @ANYBLOB="080029bd7000ffdbdf250f00000005003000010000000a000900aaaaaaaaaabb00000a000900aaaaaaaaaaaa0000050037000000000005002e00010000000500350008000000"], 0x4c}, 0x1, 0x0, 0x0, 0x240440d0}, 0x0) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x0) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x1000004, 0x42032, 0xffffffffffffffff, 0x0) 19.573060191s ago: executing program 2 (id=4896): open(&(0x7f0000000140)='./file0\x00', 0x2a4c0, 0x10c) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) write$P9_RLERRORu(r2, &(0x7f0000000540)=ANY=[], 0x53) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) 19.453081651s ago: executing program 2 (id=4897): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x30, 0x0, 0x0, 0xfffff038}, {0x6}]}, 0x10) r2 = fcntl$dupfd(r0, 0x0, r1) sendmsg$NL80211_CMD_NEW_MPATH(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)={0x20, 0x0, 0x300, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x97, 0x29}}}}}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x10) open(&(0x7f0000000140)='./file0\x00', 0x2a4c0, 0x10c) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r5 = dup(r4) openat$cgroup(r2, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) write$P9_RLERRORu(r5, &(0x7f0000000540)=ANY=[], 0x53) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r5]) 19.30646352s ago: executing program 2 (id=4898): r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x10) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r3, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendmmsg$inet(r3, &(0x7f0000008c80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002540)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x14}, @multicast2}}}], 0x20}}, {{0x0, 0x0, 0x0}}], 0x2, 0x840) 19.22693176s ago: executing program 2 (id=4899): mkdir(&(0x7f0000000200)='./file0\x00', 0xffffffffffffffde) (async) mkdir(&(0x7f0000000200)='./file0\x00', 0xffffffffffffffde) syz_mount_image$ext4(&(0x7f0000001140)='ext4\x00', &(0x7f00000007c0)='./file1\x00', 0x410c84, &(0x7f0000000340), 0x1, 0x775, &(0x7f0000001180)="$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") sendmsg$IPCTNL_MSG_CT_DELETE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x1c, 0x2, 0x1, 0x101, 0x0, 0x0, {0x0, 0x0, 0x5}, [@CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000001}, 0x40000844) r0 = open(&(0x7f0000000000)='./file1\x00', 0x1c927e, 0xb4) bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000080)='kfree\x00', r2}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000080)='kfree\x00', r2}, 0x18) fallocate(r0, 0x1, 0x0, 0x1001f0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050000000850000000800000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r3}, 0x10) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) (async) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000000)='cpu\t>0&&\t') pwritev2(r0, &(0x7f0000000800)=[{&(0x7f00000000c0)="85", 0x1}], 0x1, 0x33000, 0x0, 0x3) capset(&(0x7f0000000100)={0x20071026}, &(0x7f0000000140)) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.metadata\x00') 15.828131075s ago: executing program 54 (id=4814): r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d0000"], &(0x7f0000000240)='GPL\x00', 0xc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r1}, 0x18) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x3}, 0x8) sendto$inet6(r0, &(0x7f0000000040)="aa", 0x1, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) shutdown(r0, 0x1) 13.361347655s ago: executing program 55 (id=4844): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0a000000040000000400000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff85000000040000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) 13.347425035s ago: executing program 56 (id=4857): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) close(r0) 7.31625144s ago: executing program 57 (id=4888): r0 = syz_create_resource$binfmt(&(0x7f0000000040)='./file0\x00') r1 = openat$binfmt(0xffffffffffffff9c, r0, 0x42, 0x1ff) close(r1) write(0xffffffffffffffff, &(0x7f0000000180)="01", 0x1) close(0xffffffffffffffff) r2 = socket(0xa, 0x40000000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000880)=@nat={'nat\x00', 0x19, 0x2, 0x348, [0x20000280, 0x0, 0x0, 0x200002b0, 0x200002e0], 0x2, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]}, 0x3c0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000840)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) ioctl$BTRFS_IOC_SEND(r2, 0x40489426, &(0x7f0000000b00)={{r3}, 0x7, &(0x7f0000000a00)=[0xbe5, 0x1, 0x140000000000000, 0x7fff, 0x2, 0x1000, 0x9], 0x4, 0x0, 0x1}) execveat$binfmt(0xffffffffffffff9c, r0, 0x0, 0x0, 0x0) 5.833893874s ago: executing program 0 (id=4900): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000000000000000000004b84ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kfree\x00', r2}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000600)={0x0, 0x8, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x4b0}}, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) unshare(0x22020400) pselect6(0x40, &(0x7f0000000080)={0x7, 0x3, 0x1, 0x1, 0x3fc0000000, 0x100000001, 0x8, 0x2}, &(0x7f0000000240)={0x9, 0x5, 0x9, 0x0, 0x299, 0x2, 0xffffffff80000001, 0x2c362cc3}, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x25, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e20, @empty}}, 0x6, 0x3ff, 0x15ff, 0x8}, 0x9c) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)={[{0x2b, 'hugetlb'}, {0x2d, 'cpu'}, {0x2d, 'rlimit'}, {0x2b, 'net_cls'}, {0x2d, 'cpu'}]}, 0x24) getsockopt$inet_int(r0, 0x0, 0x33, 0x0, &(0x7f0000000080)) 5.685557354s ago: executing program 0 (id=4905): ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0e"], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x89fe, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="4400000010000104a5270b7357000000925e4a44", @ANYRES32, @ANYBLOB="0dfa130016000000240012000c00010000000000000000000c0002f60800000001180000080001"], 0x44}}, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000002a00000095"], &(0x7f00000000c0)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kfree\x00', r1}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000480), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0xfffd, 0x0, @empty, 0x4}, {0xa, 0x0, 0x0, @empty, 0xfffffffc}, r3}}, 0x48) r4 = dup2(r2, r2) ioctl$RTC_WKALM_SET(r4, 0x4028700f, &(0x7f0000000380)={0x0, 0x0, {0x7, 0x1a, 0x10, 0x7, 0xa, 0x1, 0x0, 0xb3, 0x1}}) write$RDMA_USER_CM_CMD_JOIN_MCAST(r4, &(0x7f00000008c0)={0x16, 0x98, 0xfa00, {0x0, 0x2, r3, 0x10, 0x0, @in={0x2, 0x4e22, @loopback}}}, 0xa0) r5 = socket(0x10, 0x803, 0x0) sendmsg$FOU_CMD_ADD(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x14}}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f00000015c0)='kmem_cache_free\x00', r6}, 0x10) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r7, 0x1, 0x3c, &(0x7f0000000040)=0x1, 0xfff0) sendmmsg$inet(r7, &(0x7f0000000f40)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000006c0)="ed", 0x1}], 0x1}}], 0x1, 0x4048841) 5.192106321s ago: executing program 0 (id=4907): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000800)='./file0\x00', 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="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", @ANYRESHEX=0x0, @ANYRESOCT], 0x2, 0x699, &(0x7f0000000140)="$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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\xd2q#\xc6\xca\x97\x9d\xcb\x1e\x80\xd6\xd5%N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec', 0x0) write$binfmt_script(r0, &(0x7f0000000300)={'#! ', './file0'}, 0xb) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 4.766746729s ago: executing program 58 (id=4899): mkdir(&(0x7f0000000200)='./file0\x00', 0xffffffffffffffde) (async) mkdir(&(0x7f0000000200)='./file0\x00', 0xffffffffffffffde) syz_mount_image$ext4(&(0x7f0000001140)='ext4\x00', &(0x7f00000007c0)='./file1\x00', 0x410c84, &(0x7f0000000340), 0x1, 0x775, &(0x7f0000001180)="$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") sendmsg$IPCTNL_MSG_CT_DELETE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x1c, 0x2, 0x1, 0x101, 0x0, 0x0, {0x0, 0x0, 0x5}, [@CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000001}, 0x40000844) r0 = open(&(0x7f0000000000)='./file1\x00', 0x1c927e, 0xb4) bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) (async) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r1}, 0x38) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000080)='kfree\x00', r2}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000080)='kfree\x00', r2}, 0x18) fallocate(r0, 0x1, 0x0, 0x1001f0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050000000850000000800000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r3}, 0x10) r4 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) (async) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000000)='cpu\t>0&&\t') pwritev2(r0, &(0x7f0000000800)=[{&(0x7f00000000c0)="85", 0x1}], 0x1, 0x33000, 0x0, 0x3) capset(&(0x7f0000000100)={0x20071026}, &(0x7f0000000140)) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.metadata\x00') 4.311851368s ago: executing program 0 (id=4909): r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x10) setsockopt$sock_int(r3, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r3, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendmmsg$inet(r3, &(0x7f0000008c80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002540)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x14}, @multicast2}}}], 0x20}}, {{0x0, 0x0, 0x0}}], 0x2, 0x840) 4.170663767s ago: executing program 0 (id=4910): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f00000000c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r2, 0x0) shutdown(r1, 0x0) r3 = accept(r2, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000000)='\x00', 0x1, 0x4001085, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = socket(0x2, 0x5, 0x0) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x1000410, &(0x7f0000000100)={[{@grpid}, {@grpquota}]}, 0x4, 0x4eb, &(0x7f0000000540)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_all\x00', 0x275a, 0x0) setsockopt(0xffffffffffffffff, 0x65, 0x20000000, &(0x7f0000000380)="39000100fbe20000f84007378d3294f300262c24bc4b060875508b00dc6c08d7c5", 0x21) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="ec00000021000100feffffff000000000000000000000000000000000000000000000000007c0000000000000000000000000000000000001700a000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000009c00110000000000000000000000000000000000fe8000000000000000000000000000bbac1414210000000000000000000000002001000000000000000000000000000000000000000000000000020000000000000000000000000000000000fe8000000000000000000000000000bb"], 0xec}}, 0x0) quotactl$Q_SETQUOTA(0xffffffff80000801, &(0x7f0000000000)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000180)={0x4, 0x0, 0x10001, 0x1, 0x1, 0x0, 0x0, 0x36a, 0x20003f}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001840)=@newtaction={0xea0, 0x30, 0x25, 0x0, 0x0, {}, [{0xe8c, 0x1, [@m_pedit={0xe88, 0x1, 0x0, 0x0, {{0xa}, {0xe5c, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{}, 0x3}, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0xfffffffd}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}]}}, @TCA_PEDIT_KEYS_EX={0x38, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}, {0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}]}]}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xea0}}, 0x0) capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) sendmmsg$inet_sctp(r5, &(0x7f00000032c0)=[{&(0x7f0000002e40)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000680)="03", 0x1}], 0x1}], 0x1, 0x880) sendmmsg$inet_sctp(r5, &(0x7f0000000bc0)=[{&(0x7f00000000c0)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000001c0)=[{0x0, 0x2}], 0x1, &(0x7f0000000140)=ANY=[@ANYBLOB="30000000000000008400000001000000000000000c0000000000000002002b0388edb6556900"/51, @ANYRES32=0x0], 0x30}], 0x1, 0x0) 2.45181406s ago: executing program 9 (id=4918): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000cc0)={0x0, 0x28}}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)=@generic={&(0x7f0000000200)='./file0\x00', 0x0, 0x8}, 0x18) bpf$TOKEN_CREATE(0x24, &(0x7f0000000400)={0x0, r2}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x21, '\x00', 0x0, @cgroup_skb=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x4000, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000002c0)='mm_page_free\x00', r3, 0x0, 0xd}, 0x18) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$SG_IO(r5, 0x2285, &(0x7f0000000040)={0x53, 0x0, 0x6, 0x0, @buffer={0x2, 0x40002, &(0x7f00000000c0)=""/81}, &(0x7f0000000380)="259374c96ee3", 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0b00000007000000050000000800000005"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000027b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='kfree\x00', r8}, 0x10) pwrite64(r6, &(0x7f0000000080)='3', 0x1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r9 = socket$igmp(0x2, 0x3, 0x2) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x23, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r10}, 0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(r9, 0x0, 0x48b, &(0x7f0000002100)={0x1, 'ip6gre0\x00', 0x1}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r9, 0x0, 0x48c, &(0x7f0000000000)={0x1, 'dummy0\x00'}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xe, 0x5, &(0x7f0000000240)=ANY=[@ANYBLOB="760a00000000000061115000000000001800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 2.284356609s ago: executing program 9 (id=4920): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="00002000000000cf000000000000000000000000800322b46c428b3106f2aa1e6b81831e5f34af2b0881601c90073612f9033c43f4bc5ae414b0bb0fc3098cfe168092518cf372f65f57", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz0\x00', 0x1ff) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="1600000000000000040005d0fffffffff1000000a9ac5915977ca847bb2b4c13269bff073ee2a725e517f3b726ada49b517e20fc845d0cf20e84b09643d71487190502d07951aadb794e", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r3, &(0x7f0000000000), 0x0}, 0x20) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000280)=""/43, 0x2b) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000400)={&(0x7f00000001c0)="d67c52a0c8e139e66925a20b6f0633ad59e02d9f66ec99f37b0b39abed15bad1e20bab8e8dd23bbba6b95a4e416f34a89100e59311e1da", &(0x7f00000002c0)=""/18, &(0x7f0000000640)="f0c3a6892cf60c1a9037925bceec3b790a98ac92df8b23a86b63af8a30ad03ba14590538145d9bc14063059d5056dcb5e5e6e72e396c08c5c45e647053a8ef18206e0778e61d0f5ebd11344403ea4da255c175a0ec4dc3c5435373a4c802f8b16fa84b707905fc321ea40bec9cb14fe4eed0f2203cacc8c9077c0f5c51258c71a821b17e0af941f89d1fb3b1bc9c9e23d75590db15e2d51b8799582962f7db1926538e3240626834a9f58863d47c411d828f5a7a7a4494e17d3814c23a34baa3836d4f87ae5e6018c6d0170cdcb3bf42141dc33a52892d69933a0a468259943a49e4af447ebab730080ac4b3", &(0x7f0000000740)="7fe30a552e778e7b016e43bda28f63c8204fce66c27a95ddfd038d57f3175fa446e1a35bfeefb6caa63320313f302349e6d80287510827ba6181c39fc5a037c9c4cbf5150bcbe4c636d4b1cad3e471589ad4d51e1ae270ddbef494b5d172004eb9b38ac6a7367a6ceaf70b9a3295d43d7d304cf23f0179f3c4d02533d49e6426318e11839fd8c21da01e2b5ee178edb3d516531dd3cfc866652ed93f015de5b943ffab45d3eb74470e58fbcd4920f75a0d407d2316da29d06024ced0257ae1ac6c9de75e2f4ee041fa52", 0x6, r4, 0x4}, 0x38) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000020000000100000000000001e5ff0000200700000000000001000084060000000000"], 0x0, 0x42, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0200000004000000030000000500000000100000", @ANYRES32, @ANYBLOB="0600"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000000000e8065e9870fda508ca34bffb0f4f8b8eddef3ac6c034be30aa1ac05458d59fe1ce66821a58aaebb8f304a797b9b273da0d02ce00a21ad7bac47cbe9dc1"], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x8000, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x100, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000880)={'erspan0\x00', 0x800}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[], 0x50) r6 = getpgid(0x0) r7 = syz_pidfd_open(r6, 0x0) pidfd_send_signal(r7, 0xfe, 0x0, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="181b0010000000000000000000000000181188ea2cb7cc137f862d7217ac60de89b52bd478b7baf1d0838a518eb31dce01b83ede428ef164e114eca2cf9827bfbad263b9be1293e700"/96, @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000014007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x70, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000280)={'wg2\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 2.131424739s ago: executing program 9 (id=4921): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000021007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = syz_open_dev$MSR(&(0x7f0000000040), 0x8, 0x0) dup(r2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) setxattr$security_capability(0x0, &(0x7f0000000280), 0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f00000000c0), &(0x7f00000006c0)=@v2={0x2000000, [{0x10, 0x9}, {0x0, 0x3f}]}, 0x14, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=ANY=[], 0x0, 0x0) 2.067694188s ago: executing program 9 (id=4922): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={r1}, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x40, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x3, 0x14, &(0x7f00000004c0)=@framed={{0x18, 0x2}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x405, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000300)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x10, &(0x7f0000000100)={[{@sysvgroups}, {@nomblk_io_submit}, {@init_itable_val={'init_itable', 0x3d, 0x8001}}, {@grpjquota}]}, 0xfe, 0x244, &(0x7f00000006c0)="$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") r4 = openat(0xffffffffffffff9c, 0x0, 0x2040, 0x0) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000000040), 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x10}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) listxattr(&(0x7f0000000200)='./file1\x00', 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="0600000004000000101000008900000000000000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB], 0x50) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xf, 0x4008032, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000740), &(0x7f0000001b40), 0x80, r5, 0x0, 0x7}, 0x38) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r7}, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000510700140000000000000001b7080000000000007b8af8ff00000000b7080000fcffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000004c0)='sched_switch\x00', r8}, 0x10) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000080)=0x11) r9 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r9, 0x10e, 0xc, &(0x7f0000000000)={0xfffffffb}, 0x10) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000580)=@getlink={0x40, 0x12, 0x100, 0x70bd3d, 0x0, {0x7}, [@IFLA_CARRIER={0x5, 0x21, 0xf9}, @IFLA_NET_NS_PID={0x8}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x55}, @IFLA_PROTO_DOWN={0x5, 0x27, 0x6e}]}, 0x40}, 0x1, 0x0, 0x0, 0x40010}, 0x0) capset(&(0x7f0000000c00)={0x20080522}, &(0x7f0000000140)) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000140)=0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0, 0x0, 0x4}, 0x18) socket$nl_netfilter(0x10, 0x3, 0xc) 1.534575926s ago: executing program 5 (id=4923): r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x3, @remote, 0x6}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@bloom_filter={0x1e, 0xdefd, 0x5d8, 0x6, 0xa0080, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x2, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) socket$inet(0x2, 0x1, 0x0) r4 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000080b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) sendfile(r4, r4, 0x0, 0x800000009) fgetxattr(r3, &(0x7f0000000000)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 1.480757016s ago: executing program 5 (id=4924): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x1000410, &(0x7f0000000000)={[{@nouid32}, {@grpquota}, {@abort}]}, 0x1, 0x4fe, &(0x7f0000000a40)="$eJzs3U9vVF8ZAOD3Tju0vzJQUBZqVBBRNITpH6AhuBAWagghMRJXLqC2Q9N0hmk6LdDKoizdGyVxpR/BnQsTVi7cudOdG1yYoBINNXEx5t4Z2qHt0FHajp15nuTOvefcYd5zZjjnzD2X4QTQt85FxHpEHIuBLD3azE+aW9xsbOnz3r55NrPx5tlMEvX6vb8l2fk0L1r+TOp48zWHI+J734n4YbIzbm11bWG6XC4tNdNjy5XFsdrq2uX5XDNncmpiavz6lWuT+1bXs5Vfvf72/J3v/+bXX3j1+/Wv/ygtVuHHJ7JzrfXYT42q56PQkjcYEXcOIliXDGZ/fziK0tb2qYg4HxEPYjQGsk8TAOhl9fpo1Edb0wBAr0uv/wuR5IrNuYBC5HLFYmMO70yM5MrV2vKl0erKo9nI5rBORT73cL5cGm/OFZ6KfJKmJ7LjrfTktvSViDgdET8Z+iRLF2eq5dlufvEBgD52fNv4/8+hxvgPAPS44W4XAAA4dMZ/AOg/xn8A6D//xfjv14EA0CNc/wNA/zH+A0D/2XP8f94m390AADiKvnv3brrVN5r///Xs49WVbxQeX54t1RaKlZWZ4kx1abE4V63OlUvFmXp9r9crV6uLE1c3k7XVtfuV6sqj5fvzlem50v1S/oDrAwDs7fTZl39MImL9xifZFi1rORirobflul0AoGsGul0AoGvcwYP+1cE1vmkA6HG7LNH7nrb/ROiFxV/hqLr4WfP/0K/M/0P/+t/m/7+57+UADp/5f+hf9XpizX8A6DPm+IGPuv8PAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAfaqQbUmumK0Fvp4+5orFiBMRcSryycP5cmk8Ik5GxB+G8kNpeqLbhQYAPlLuL0lz/a+LoxcK288eS/41lO0j4snP7/3s6fTy8tJEmv/3zfzlF838yWPdqAAA0OrmzqzGON3ct1zIv33zbObddphFfH2rsbhoGnejuTXODMZgth+OfESM/CNpphvS7ysD+xB//XlEfGar/k9bIhSyOZDGyqfb46exTxxA/K33f3v83Hvxc9m5dJ/P3otPdxRtaB9KDL3j5a1GP9lse2kTa7a/XJzL9ru3/+Gsh/p47/q/jR39X26z/xvYET/J2vy5zfSHS/L66m9v78isjzbOPY/43OBu8ZPN+Emb/vdCh3X80+e/eL7dufovIi7G7vEbKlk3O7ZcWRyrra5dnq9Mz5XmSo8mJ6cmpsavX7k2OZbNUTcef7dbjL/euHSyXfy0/iNt4g/vUf+vdFj/X/77wQ++9IH4X/vy7p//mQ/ET8fEr3YYf3rkZtvlu9P4s23qv9fnf6nD+K/+vDbb4VMBgENQW11bmC6XS0t7HKTfNfd6joOjeRDr2W2cbhej84Nv3f7pk/+DYhzswbsW2q1idLdfAg7eVqPvdkkAAAAAAAAAAAAAAIB2aqtrC0NxsD8n6nYdAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA6F3/CQAA//9rHMmx") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r0, &(0x7f0000003a80)='\t', 0x1, 0x8000c61) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x141042, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = socket(0x10, 0x3, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0xb, 0x4, 0x6, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000600)='kfree\x00', r7}, 0x10) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000001000d40000000000000000000000000a20000000000a03000000000000000000010000000900010073797a3000000000bc000000160a01000000217100000001010000000900010073797a30000000000900020073797a30000000009000038008000240000000007c00038014000100626f6e64300000000000000000000016d8ce4db711d5e46c616e31000000000000000000140001006970766c616e300000000000000000001400010073697430000000000000fbffffffffffffff0100776c616e30000000000000000000000014000100677265e52ea619052f9c08000000040008000140000000005c000000180a01010000000000000000010000000900020073797a30000000000900010073797a3000000000300003802c00038014000100626f6e6430000000000000000000000014"], 0x4b0}}, 0x0) sendto$inet6(r6, &(0x7f0000000100)="c10e000018001f06b9409b0dffff110d0207be040205060506100a044300040018000000fac8388827a685a168d9a44604094565360c648dcaaf6c26c291214549932fde4a460c89b6ec0cff3959547f509058ba86c902fc3a10004a320c0400160012000a00000000000000000000080756ede4ccbe5880", 0xec1, 0x0, 0x0, 0x9e5e111c47e3504f) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) r9 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r9, 0x107, 0x14, &(0x7f0000000080)=0x8, 0x4) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r10, 0x8933, &(0x7f00000005c0)={'wg0\x00', 0x0}) fcntl$dupfd(r4, 0x0, r10) sendto$packet(r9, &(0x7f0000000180)='7', 0x1, 0x0, &(0x7f0000000040)={0x11, 0x0, r11, 0x1, 0x0, 0x6, @random="bf73a9e561c5"}, 0x14) bpf$MAP_CREATE(0x0, 0x0, 0x0) writev(r2, &(0x7f00000025c0)=[{&(0x7f0000000240)='4', 0x1}, {0x0, 0xffffffdc}], 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00', r12}, 0x10) pwritev2(r1, &(0x7f00000001c0)=[{&(0x7f0000000200)='\x00', 0x1}], 0x1, 0x5406, 0x0, 0x0) 1.056108004s ago: executing program 5 (id=4925): bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x10) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r1, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendmmsg$inet(r1, &(0x7f0000008c80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002540)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x14}, @multicast2}}}], 0x20}}, {{0x0, 0x0, 0x0}}], 0x2, 0x840) 994.099384ms ago: executing program 5 (id=4926): syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000800)='./file0\x00', 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="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", @ANYRESHEX=0x0, @ANYRESOCT], 0x2, 0x699, &(0x7f0000000140)="$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") r0 = memfd_create(&(0x7f00000000c0)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\xd2q#\xc6\xca\x97\x9d\xcb\x1e\x80\xd6\xd5%N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec', 0x0) write$binfmt_script(r0, &(0x7f0000000300)={'#! ', './file0'}, 0xb) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 936.631654ms ago: executing program 9 (id=4927): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000800)='./file0\x00', 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="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", @ANYRESHEX=0x0, @ANYRESOCT], 0x2, 0x699, &(0x7f0000000140)="$eJzs3V9rG9n9x/HPyLIte3+E5dcSQsifk6QLDk2VkbxxMCl01dHInlbSiBm52FBY0o29hMjZNkmh8c3WN/0D2yfQu970og+i0Ot9Fr0pLSztXaE3KnNmJEvRv3ijOLvN+2V2NTrznTnfmaPoy9iaIwEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADle1XVLjupBc2fXTOZVo7AxZX26t0XdTBduzuxXcpL/VCjoQtp04Zsnq88n/7uuS+mzSyokDwUdvXP+3XvfyOd6209J6MvQaXf49PnRo/udzv6Tl4hd0Kl3/yYp11taycZkTNCW3wziMGhUtnwTxKHZ3Nhwb2/XYlML6n68F7f9hvEiP9cOI7Pm3TSlzc114xf3wp3mVrVS93uNd79Tdt0N84PldKAlFWNvO6jXg+aWjUlWJzF3zWc/TgP8SsOYg4ed/fVZR5IElV4mqDwrqOyWy6VSuVzauLN5567r5kca3ITj9mkkYu4vWnzNzOeNG5iDXFL//+pIdRXU1I52Zcb+eKoqUqjGhPWZXv1/77Y/td/B+t+r8hek72WrL8rW/yvpsyuT6v+EXIyM3WDcGmdC++l+Fm1GRk/1XEd6pPvqqKN9PZnDvo3M1bns5Qx+tuSrqUCxQgVqqGJbTNZitKkNbcjVh9pWTbGMagpUl69Ye4rVlm9fUZ4i+aqorVCRjNbk6aaMStrUptZl5KuoPYXaUVNbqqqif3e73QM9tOd9fUqO6gWVJgQsDwaVp+xpUv3/yafp6zSr/y71/22Vvg6W04fPp8UAXwHd7Pp/UG72ZldfX0YAAAAAAGDeHPvbd8f+7f6ypK5qQd1333RaAAAAAABgjhx1l3VJTnL9L+myHK7/AQAAAAD4X+PYe+wcSav2Q/3OyZ1QL/NLgIUzSBEAAAAAALwie+f/lSWpayetuCrnVNf/AAAAAADga+A3A3Ps53tz7HZ7f9bPSYpby86f/7msaNE5bu1+yzmsJGsqh1nMyCcA2rWLzrlsol77sCTJPvP8S07WWzYJZn/ewS8OZs3170QvJLC0MLiDCQk4Sc8b+eyZPtO1dJNr2TzzD45ysmvSXlZrQd0vemH9XkmVyrlc299t//zxw19IUf84Dx529osffdJ5YHM5TpqOD5OdfjqUTm78yTjJ5Zmdb8HeczHuiFdU63X522Zj1bH9ur3jX1DlMDfY0bQBOOnzV7qejtn11TR29ag/435y/IXk+EtFO2RDRx8tOidZlF488nEDMSGLgs3iRhpzY+2Gyn9Ll/ujkHMK316QysXRMRjKojyYxexz4fxr5FwMZGEfemsGzsV6ksVfkh1NyGL9dFmMjAgAvCkHuiz7LnRZdhLzfhUqZHW3Vx56b2pfqu7Mru4fDFf3Z7/vdu0GC1I++9vE1F4KSt7R1xxbh5bSQ8pfHPOO7mZ1paAJ7+juK1S3pK8/nXwHUpb2SBb/6Xa790q239+9UFX/MNTdSL9xvbyQnMLbzw5/aifAT3y8//H+43J5fcN933XvlLVoDyN7WBC1BwAwYvZ37MyMcN7XtTTi2oN/vJcuDVW8/+9/pKCoj/SJOnqgW72vELg6fq+rAx9DuJVetWrgqtWcf/ee/V664diSbk28qrO1dCC23I9dVG+T4Up9Erv+mkcBAICzdX1GHR5f/wtD9f+W1tKItYtjr7uHa3l2ddy/pJ8UW5qd/AfzPhsAALwd/OgLZ7X9ayeKgtaHpc3NUqW97Zso9H5ooqC65Zug2fYjb7vS3PJNKwrboRfWTSvSclD1YxPvtFph1Da1MDKtMA527Te/m+yr32O/UWm2Ay9u1f1K7BsvbLYrXttUg9gzrZ3v14N424/sxnHL94Ja4FXaQdg0cbgTeX7RmNj3BwKDqt9sB7UgWWyaVhQ0KtGe+VFY32n4purHXhS02mG6w15fQbMWRg2722K+O+7zAgAAvHWePj96dL/T2X/y4sJKcmmethxrQszowpKePk+uypOWfLaKOYIAAPiKOSngp9io8BoTAgAAAAAAAAAAAAAAAAAAAAAAI2bf0nfKhcVxNwtK/Zafncta9Eud3GI4sh9H807sNAu5027VuyXi6NHnU4JX+i290z8Yc3xmB/j3/5PesS1KW/Lz72tlyuC+joXvHqRndGJMsnLsquX+WOTn/88hWXj8xwmrut1ud/rmy8PncGnaAQ4v5CU9WXqFITj79yIAZ+u/AQAA//9b5DOa") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000000c0)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\xd2q#\xc6\xca\x97\x9d\xcb\x1e\x80\xd6\xd5%N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec', 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$TCFLSH(r4, 0x40045436, 0x14) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xb, 0x5, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffe}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r7, 0x8933, &(0x7f0000000440)) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r8, 0x0, 0x4b, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 695.555383ms ago: executing program 5 (id=4928): r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x3, @remote, 0x6}, 0x1c) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@bloom_filter={0x1e, 0xdefd, 0x5d8, 0x6, 0xa0080, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x2, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) socket$inet(0x2, 0x1, 0x0) open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000080b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) fsetxattr(r3, &(0x7f0000000080)=@known='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) fgetxattr(r3, &(0x7f0000000000)=@known='trusted.overlay.upper\x00', 0x0, 0x0) 588.256713ms ago: executing program 5 (id=4929): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000800)='./file0\x00', 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB="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", @ANYRESHEX=0x0, @ANYRESOCT], 0x2, 0x699, &(0x7f0000000140)="$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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000000c0)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf3:\x99\x1e\xac`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\xd2q#\xc6\xca\x97\x9d\xcb\x1e\x80\xd6\xd5%N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec', 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$TCFLSH(r4, 0x40045436, 0x14) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xb, 0x5, 0x2, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffe}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r7, 0x8933, &(0x7f0000000440)) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="0a00000004000000080000000c"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r9, 0x0, 0x4b, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 0s ago: executing program 9 (id=4930): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=@newqdisc={0x40, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pie={{0x8}, {0x14, 0x2, [@TCA_PIE_TUPDATE={0x8, 0x3, 0xfffffff7}, @TCA_PIE_LIMIT={0x8, 0x2, 0x7}]}}]}, 0x40}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1a, 0x6, &(0x7f00000002c0)=ANY=[@ANYRESDEC], &(0x7f0000000080)='GPL\x00', 0x9, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', r2, @fallback, r3, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) pipe(&(0x7f0000000200)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000380)={0x1f7, &(0x7f00000003c0)=[{0x200000000006, 0xfd, 0x0, 0x7ffc1ffb}, {0x8, 0x1, 0x0, 0x4}, {0x7, 0xd, 0xff, 0x5e15}, {0x6, 0x6, 0x5, 0xb}, {0xff, 0x8, 0x4d, 0x2}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000de0000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x10) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000500)={'veth0_to_bond\x00', 0x100}) r7 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_int(r7, 0x0, 0x33, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r8}, 0x10) r9 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000300)={'rose0\x00', 0x0}) r11 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="2000000011000100"/20, @ANYRES32=r10], 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb0100180000ffffff7f00000000004400000004000000000000000100000d00000000010000000300000000000000000000030000000005000000010000000000000000000000000000030000000005000043aaab40971824e00000612e00"], 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) umount2(&(0x7f0000000000)='./file0\x00', 0x0) vmsplice(r4, &(0x7f00000000c0)=[{&(0x7f0000000480)='(', 0x1}], 0x1, 0x4) kernel console output (not intermixed with test programs): 7][T19513] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 378.648360][T19513] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 378.991470][T19897] FAULT_INJECTION: forcing a failure. [ 378.991470][T19897] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 379.004774][T19897] CPU: 0 UID: 0 PID: 19897 Comm: syz.7.4481 Not tainted 6.13.0-rc3-syzkaller-00136-g8faabc041a00 #0 [ 379.015561][T19897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 379.025717][T19897] Call Trace: [ 379.029009][T19897] [ 379.032044][T19897] dump_stack_lvl+0xf2/0x150 [ 379.036686][T19897] dump_stack+0x15/0x1a [ 379.040957][T19897] should_fail_ex+0x223/0x230 [ 379.045751][T19897] should_fail+0xb/0x10 [ 379.049923][T19897] should_fail_usercopy+0x1a/0x20 [ 379.054964][T19897] _copy_from_user+0x1e/0xb0 [ 379.059668][T19897] __sys_bpf+0x14e/0x7a0 [ 379.064006][T19897] __x64_sys_bpf+0x43/0x50 [ 379.068503][T19897] x64_sys_call+0x2914/0x2dc0 [ 379.073223][T19897] do_syscall_64+0xc9/0x1c0 [ 379.077752][T19897] ? clear_bhb_loop+0x55/0xb0 [ 379.082463][T19897] ? clear_bhb_loop+0x55/0xb0 [ 379.087287][T19897] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 379.093255][T19897] RIP: 0033:0x7f3585b15d29 [ 379.097726][T19897] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 379.117442][T19897] RSP: 002b:00007f3584181038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 379.125882][T19897] RAX: ffffffffffffffda RBX: 00007f3585d05fa0 RCX: 00007f3585b15d29 [ 379.133864][T19897] RDX: 0000000000000094 RSI: 0000000020000180 RDI: 0000000000000005 [ 379.141868][T19897] RBP: 00007f3584181090 R08: 0000000000000000 R09: 0000000000000000 [ 379.149868][T19897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 379.157858][T19897] R13: 0000000000000000 R14: 00007f3585d05fa0 R15: 00007ffc2f408b58 [ 379.165911][T19897] [ 379.171526][T19898] netlink: 133492 bytes leftover after parsing attributes in process `syz.3.4519'. [ 379.529881][T19876] FAULT_INJECTION: forcing a failure. [ 379.529881][T19876] name failslab, interval 1, probability 0, space 0, times 0 [ 379.542629][T19876] CPU: 0 UID: 0 PID: 19876 Comm: syz.2.4518 Not tainted 6.13.0-rc3-syzkaller-00136-g8faabc041a00 #0 [ 379.553513][T19876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 379.563655][T19876] Call Trace: [ 379.566958][T19876] [ 379.570340][T19876] dump_stack_lvl+0xf2/0x150 [ 379.574982][T19876] dump_stack+0x15/0x1a [ 379.579248][T19876] should_fail_ex+0x223/0x230 [ 379.583967][T19876] ? percpu_ref_init+0x96/0x240 [ 379.588937][T19876] should_failslab+0x8f/0xb0 [ 379.593566][T19876] ? __pfx_free_ioctx_users+0x10/0x10 [ 379.599099][T19876] __kmalloc_cache_noprof+0x4e/0x320 [ 379.604433][T19876] ? __pfx_free_ioctx_users+0x10/0x10 [ 379.609934][T19876] percpu_ref_init+0x96/0x240 [ 379.614640][T19876] ioctx_alloc+0x1b8/0x4c0 [ 379.619264][T19876] __se_sys_io_setup+0x6b/0x1b0 [ 379.624239][T19876] __x64_sys_io_setup+0x31/0x40 [ 379.629131][T19876] x64_sys_call+0x160f/0x2dc0 [ 379.633930][T19876] do_syscall_64+0xc9/0x1c0 [ 379.638583][T19876] ? clear_bhb_loop+0x55/0xb0 [ 379.643397][T19876] ? clear_bhb_loop+0x55/0xb0 [ 379.648101][T19876] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 379.654058][T19876] RIP: 0033:0x7fd556875d29 [ 379.658486][T19876] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 379.678119][T19876] RSP: 002b:00007fd554ee1038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ce [ 379.686624][T19876] RAX: ffffffffffffffda RBX: 00007fd556a65fa0 RCX: 00007fd556875d29 [ 379.694622][T19876] RDX: 0000000000000000 RSI: 0000000020005cc0 RDI: 0000000000000b48 [ 379.702710][T19876] RBP: 00007fd554ee1090 R08: 0000000000000000 R09: 0000000000000000 [ 379.710727][T19876] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 379.718718][T19876] R13: 0000000000000000 R14: 00007fd556a65fa0 R15: 00007ffdcab60e18 [ 379.726718][T19876] [ 379.852354][T19912] ebtables: ebtables: counters copy to user failed while replacing table [ 379.970463][T19924] ebtables: ebtables: counters copy to user failed while replacing table [ 380.215924][T19921] chnl_net:caif_netlink_parms(): no params data found [ 380.350361][T19956] veth0_vlan: entered allmulticast mode [ 380.358892][T19921] bridge0: port 1(bridge_slave_0) entered blocking state [ 380.366211][T19921] bridge0: port 1(bridge_slave_0) entered disabled state [ 380.386795][T19921] bridge_slave_0: entered allmulticast mode [ 380.400942][T19921] bridge_slave_0: entered promiscuous mode [ 380.436473][T19921] bridge0: port 2(bridge_slave_1) entered blocking state [ 380.443698][T19921] bridge0: port 2(bridge_slave_1) entered disabled state [ 380.476354][T19921] bridge_slave_1: entered allmulticast mode [ 380.495289][T19921] bridge_slave_1: entered promiscuous mode [ 380.569559][T19921] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 380.624959][T19921] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 380.701717][T19921] team0: Port device team_slave_0 added [ 380.711781][T19921] team0: Port device team_slave_1 added [ 380.740371][T19921] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 380.747472][T19921] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 380.773452][T19921] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 380.788561][T19921] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 380.795605][T19921] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 380.821589][T19921] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 380.888054][ T2156] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 380.927391][T19921] hsr_slave_0: entered promiscuous mode [ 380.933910][T19921] hsr_slave_1: entered promiscuous mode [ 380.939977][T19921] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 380.947819][T19921] Cannot create hsr debugfs directory [ 380.953300][T19993] smc: net device bond0 applied user defined pnetid SYZ0 [ 380.964476][T19995] smc: net device bond0 erased user defined pnetid SYZ0 [ 380.973486][ T2156] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 381.012883][T19998] FAULT_INJECTION: forcing a failure. [ 381.012883][T19998] name failslab, interval 1, probability 0, space 0, times 0 [ 381.025611][T19998] CPU: 1 UID: 0 PID: 19998 Comm: syz.7.4536 Not tainted 6.13.0-rc3-syzkaller-00136-g8faabc041a00 #0 [ 381.036442][T19998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 381.046530][T19998] Call Trace: [ 381.049876][T19998] [ 381.052831][T19998] dump_stack_lvl+0xf2/0x150 [ 381.057469][T19998] dump_stack+0x15/0x1a [ 381.061663][T19998] should_fail_ex+0x223/0x230 [ 381.066532][T19998] should_failslab+0x8f/0xb0 [ 381.071160][T19998] __kmalloc_noprof+0xab/0x3f0 [ 381.075968][T19998] ? security_sk_alloc+0x53/0x120 [ 381.081107][T19998] security_sk_alloc+0x53/0x120 [ 381.085993][T19998] sk_prot_alloc+0xc6/0x190 [ 381.090526][T19998] sk_alloc+0x33/0x360 [ 381.094684][T19998] ? tipc_sk_create+0x82/0xf00 [ 381.099485][T19998] tipc_sk_create+0xfc/0xf00 [ 381.104153][T19998] ? kmem_cache_alloc_noprof+0x18e/0x320 [ 381.109823][T19998] ? security_inode_alloc+0x37/0x100 [ 381.115183][T19998] ? selinux_inode_alloc_security+0x100/0x120 [ 381.121283][T19998] ? security_inode_alloc+0x68/0x100 [ 381.126675][T19998] ? inode_init_always_gfp+0x4b8/0x4f0 [ 381.132181][T19998] ? __pfx_sock_alloc_inode+0x10/0x10 [ 381.137667][T19998] __sock_create+0x2e9/0x5a0 [ 381.142287][T19998] __sys_socketpair+0x17c/0x430 [ 381.147213][T19998] __x64_sys_socketpair+0x52/0x60 [ 381.152271][T19998] x64_sys_call+0x1cad/0x2dc0 [ 381.156977][T19998] do_syscall_64+0xc9/0x1c0 [ 381.161569][T19998] ? clear_bhb_loop+0x55/0xb0 [ 381.166358][T19998] ? clear_bhb_loop+0x55/0xb0 [ 381.171227][T19998] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 381.177237][T19998] RIP: 0033:0x7f3585b15d29 [ 381.181720][T19998] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 381.201492][T19998] RSP: 002b:00007f3584181038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 381.209930][T19998] RAX: ffffffffffffffda RBX: 00007f3585d05fa0 RCX: 00007f3585b15d29 [ 381.217928][T19998] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 000000000000001e [ 381.225916][T19998] RBP: 00007f3584181090 R08: 0000000000000000 R09: 0000000000000000 [ 381.234002][T19998] R10: 0000000020000080 R11: 0000000000000246 R12: 0000000000000001 [ 381.242064][T19998] R13: 0000000000000000 R14: 00007f3585d05fa0 R15: 00007ffc2f408b58 [ 381.250200][T19998] [ 381.289917][ T2156] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 381.399047][ T2156] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 381.439398][T20015] netlink: 40 bytes leftover after parsing attributes in process `+}[@'. [ 381.530277][T20026] ebtables: ebtables: counters copy to user failed while replacing table [ 381.557589][ T2156] bridge_slave_1: left allmulticast mode [ 381.563293][ T2156] bridge_slave_1: left promiscuous mode [ 381.569001][ T2156] bridge0: port 2(bridge_slave_1) entered disabled state [ 381.581989][ T2156] bridge_slave_0: left allmulticast mode [ 381.587767][ T2156] bridge_slave_0: left promiscuous mode [ 381.593533][ T2156] bridge0: port 1(bridge_slave_0) entered disabled state [ 381.673089][ T2156] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 381.683049][ T2156] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 381.692795][ T2156] bond0 (unregistering): Released all slaves [ 381.707516][T20042] smc: net device bond0 applied user defined pnetid SYZ0 [ 381.715045][T20043] smc: net device bond0 erased user defined pnetid SYZ0 [ 381.762179][ T2156] hsr_slave_0: left promiscuous mode [ 381.772696][ T2156] hsr_slave_1: left promiscuous mode [ 381.779358][ T2156] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 381.786887][ T2156] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 381.795061][ T2156] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 381.802500][ T2156] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 381.812439][ T2156] veth1_macvtap: left promiscuous mode [ 381.818002][ T2156] veth0_macvtap: left promiscuous mode [ 381.823560][ T2156] veth1_vlan: left promiscuous mode [ 381.828892][ T2156] veth0_vlan: left promiscuous mode [ 381.911242][ T2156] team0 (unregistering): Port device team_slave_1 removed [ 381.920771][ T2156] team0 (unregistering): Port device team_slave_0 removed [ 381.982470][T20068] FAULT_INJECTION: forcing a failure. [ 381.982470][T20068] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 381.995606][T20068] CPU: 1 UID: 0 PID: 20068 Comm: syz.2.4549 Not tainted 6.13.0-rc3-syzkaller-00136-g8faabc041a00 #0 [ 382.006392][T20068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 382.016466][T20068] Call Trace: [ 382.019807][T20068] [ 382.022748][T20068] dump_stack_lvl+0xf2/0x150 [ 382.027425][T20068] dump_stack+0x15/0x1a [ 382.031620][T20068] should_fail_ex+0x223/0x230 [ 382.036356][T20068] should_fail+0xb/0x10 [ 382.040551][T20068] should_fail_usercopy+0x1a/0x20 [ 382.045611][T20068] strncpy_from_user+0x25/0x210 [ 382.050568][T20068] ? kmem_cache_alloc_noprof+0x18e/0x320 [ 382.056291][T20068] ? getname_flags+0x81/0x3b0 [ 382.061014][T20068] getname_flags+0xb0/0x3b0 [ 382.065548][T20068] user_path_at+0x26/0x120 [ 382.070027][T20068] do_utimes+0xc7/0x1f0 [ 382.074226][T20068] __x64_sys_futimesat+0xd4/0x1a0 [ 382.079278][T20068] ? fpregs_assert_state_consistent+0x83/0xa0 [ 382.085393][T20068] x64_sys_call+0x2d2e/0x2dc0 [ 382.090097][T20068] do_syscall_64+0xc9/0x1c0 [ 382.094683][T20068] ? clear_bhb_loop+0x55/0xb0 [ 382.099456][T20068] ? clear_bhb_loop+0x55/0xb0 [ 382.104158][T20068] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 382.110228][T20068] RIP: 0033:0x7fd556875d29 [ 382.114662][T20068] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 382.134320][T20068] RSP: 002b:00007fd554ee1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000105 [ 382.142821][T20068] RAX: ffffffffffffffda RBX: 00007fd556a65fa0 RCX: 00007fd556875d29 [ 382.150808][T20068] RDX: 0000000000000000 RSI: 0000000020000580 RDI: ffffffffffffffff [ 382.158790][T20068] RBP: 00007fd554ee1090 R08: 0000000000000000 R09: 0000000000000000 [ 382.166793][T20068] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 382.174834][T20068] R13: 0000000000000001 R14: 00007fd556a65fa0 R15: 00007ffdcab60e18 [ 382.182823][T20068] [ 382.207244][T19921] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 382.217258][T19921] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 382.236856][T19921] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 382.252299][T19921] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 382.286384][T20075] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4552'. [ 382.325756][ T29] kauditd_printk_skb: 107 callbacks suppressed [ 382.325771][ T29] audit: type=1326 audit(1734687824.035:14606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20074 comm="syz.2.4552" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd556875d29 code=0x7ffc0000 [ 382.358353][ T29] audit: type=1326 audit(1734687824.056:14607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20074 comm="syz.2.4552" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd556875d29 code=0x7ffc0000 [ 382.382008][ T29] audit: type=1326 audit(1734687824.056:14608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20074 comm="syz.2.4552" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd556875d29 code=0x7ffc0000 [ 382.405815][ T29] audit: type=1326 audit(1734687824.056:14609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20074 comm="syz.2.4552" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd556875d29 code=0x7ffc0000 [ 382.444929][T19921] 8021q: adding VLAN 0 to HW filter on device bond0 [ 382.461395][T19921] 8021q: adding VLAN 0 to HW filter on device team0 [ 382.482437][T19921] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 382.492866][T19921] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 382.531379][T18453] bridge0: port 1(bridge_slave_0) entered blocking state [ 382.538564][T18453] bridge0: port 1(bridge_slave_0) entered forwarding state [ 382.552054][T20098] FAULT_INJECTION: forcing a failure. [ 382.552054][T20098] name failslab, interval 1, probability 0, space 0, times 0 [ 382.564813][T20098] CPU: 0 UID: 0 PID: 20098 Comm: syz.2.4557 Not tainted 6.13.0-rc3-syzkaller-00136-g8faabc041a00 #0 [ 382.575633][T20098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 382.581322][T18453] bridge0: port 2(bridge_slave_1) entered blocking state [ 382.585739][T20098] Call Trace: [ 382.585748][T20098] [ 382.585760][T20098] dump_stack_lvl+0xf2/0x150 [ 382.592823][T18453] bridge0: port 2(bridge_slave_1) entered forwarding state [ 382.596057][T20098] dump_stack+0x15/0x1a [ 382.615100][T20098] should_fail_ex+0x223/0x230 [ 382.619901][T20098] ? copy_cgroup_ns+0x167/0x370 [ 382.624797][T20098] should_failslab+0x8f/0xb0 [ 382.629424][T20098] __kmalloc_cache_noprof+0x4e/0x320 [ 382.634744][T20098] copy_cgroup_ns+0x167/0x370 [ 382.639460][T20098] create_new_namespaces+0x1d8/0x430 [ 382.644791][T20098] unshare_nsproxy_namespaces+0xe6/0x120 [ 382.650610][T20098] ksys_unshare+0x3c9/0x6e0 [ 382.655151][T20098] __x64_sys_unshare+0x1f/0x30 [ 382.659955][T20098] x64_sys_call+0x1a3e/0x2dc0 [ 382.664698][T20098] do_syscall_64+0xc9/0x1c0 [ 382.669218][T20098] ? clear_bhb_loop+0x55/0xb0 [ 382.673912][T20098] ? clear_bhb_loop+0x55/0xb0 [ 382.678607][T20098] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 382.684640][T20098] RIP: 0033:0x7fd556875d29 [ 382.689066][T20098] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 382.708716][T20098] RSP: 002b:00007fd554ee1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 382.717150][T20098] RAX: ffffffffffffffda RBX: 00007fd556a65fa0 RCX: 00007fd556875d29 [ 382.725242][T20098] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000002040200 [ 382.733234][T20098] RBP: 00007fd554ee1090 R08: 0000000000000000 R09: 0000000000000000 [ 382.741349][T20098] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 382.749457][T20098] R13: 0000000000000000 R14: 00007fd556a65fa0 R15: 00007ffdcab60e18 [ 382.757449][T20098] [ 382.775852][T20012] chnl_net:caif_netlink_parms(): no params data found [ 382.922296][T20012] bridge0: port 1(bridge_slave_0) entered blocking state [ 382.929482][T20012] bridge0: port 1(bridge_slave_0) entered disabled state [ 382.970718][T20012] bridge_slave_0: entered allmulticast mode [ 382.996541][T20012] bridge_slave_0: entered promiscuous mode [ 383.027396][T20012] bridge0: port 2(bridge_slave_1) entered blocking state [ 383.034704][T20012] bridge0: port 2(bridge_slave_1) entered disabled state [ 383.072318][T20012] bridge_slave_1: entered allmulticast mode [ 383.080621][T20012] bridge_slave_1: entered promiscuous mode [ 383.168297][ T29] audit: type=1326 audit(1734687824.928:14610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20145 comm="syz.3.4563" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2b42305d29 code=0x7ffc0000 [ 383.197790][T20012] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 383.207956][ T29] audit: type=1326 audit(1734687824.928:14611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20145 comm="syz.3.4563" exe="/root/syz-executor" sig=0 arch=c000003e syscall=448 compat=0 ip=0x7f2b42305d29 code=0x7ffc0000 [ 383.231714][ T29] audit: type=1326 audit(1734687824.928:14612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20145 comm="syz.3.4563" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2b42305d29 code=0x7ffc0000 [ 383.255433][ T29] audit: type=1326 audit(1734687824.928:14613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20145 comm="syz.3.4563" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2b42305d29 code=0x7ffc0000 [ 383.279190][ T29] audit: type=1326 audit(1734687824.928:14614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20145 comm="syz.3.4563" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f2b42305d29 code=0x7ffc0000 [ 383.302947][ T29] audit: type=1326 audit(1734687824.928:14615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20145 comm="syz.3.4563" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2b42305d29 code=0x7ffc0000 [ 383.342816][T20012] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 383.360417][T19921] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 383.411802][T20012] team0: Port device team_slave_0 added [ 383.436931][T20012] team0: Port device team_slave_1 added [ 383.558700][T20012] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 383.565897][T20012] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 383.591958][T20012] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 383.639480][ T2156] bridge_slave_1: left allmulticast mode [ 383.645195][ T2156] bridge_slave_1: left promiscuous mode [ 383.650928][ T2156] bridge0: port 2(bridge_slave_1) entered disabled state [ 383.675916][ T2156] bridge_slave_0: left allmulticast mode [ 383.681745][ T2156] bridge_slave_0: left promiscuous mode [ 383.687458][ T2156] bridge0: port 1(bridge_slave_0) entered disabled state [ 383.719918][T20213] FAULT_INJECTION: forcing a failure. [ 383.719918][T20213] name failslab, interval 1, probability 0, space 0, times 0 [ 383.732829][T20213] CPU: 0 UID: 0 PID: 20213 Comm: syz.7.4577 Not tainted 6.13.0-rc3-syzkaller-00136-g8faabc041a00 #0 [ 383.743706][T20213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 383.753828][T20213] Call Trace: [ 383.757114][T20213] [ 383.760055][T20213] dump_stack_lvl+0xf2/0x150 [ 383.764842][T20213] dump_stack+0x15/0x1a [ 383.769067][T20213] should_fail_ex+0x223/0x230 [ 383.773796][T20213] should_failslab+0x8f/0xb0 [ 383.778487][T20213] kmem_cache_alloc_node_noprof+0x59/0x320 [ 383.784380][T20213] ? __alloc_skb+0x10b/0x310 [ 383.789028][T20213] __alloc_skb+0x10b/0x310 [ 383.793457][T20213] netlink_alloc_large_skb+0xad/0xe0 [ 383.798833][T20213] netlink_sendmsg+0x3b4/0x6e0 [ 383.803619][T20213] ? __pfx_netlink_sendmsg+0x10/0x10 [ 383.808970][T20213] __sock_sendmsg+0x140/0x180 [ 383.813670][T20213] ____sys_sendmsg+0x312/0x410 [ 383.818493][T20213] __sys_sendmsg+0x19d/0x230 [ 383.823117][T20213] __x64_sys_sendmsg+0x46/0x50 [ 383.827911][T20213] x64_sys_call+0x2734/0x2dc0 [ 383.832680][T20213] do_syscall_64+0xc9/0x1c0 [ 383.837207][T20213] ? clear_bhb_loop+0x55/0xb0 [ 383.842025][T20213] ? clear_bhb_loop+0x55/0xb0 [ 383.846754][T20213] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 383.852728][T20213] RIP: 0033:0x7f3585b15d29 [ 383.857168][T20213] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 383.877322][T20213] RSP: 002b:00007f3584181038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 383.885750][T20213] RAX: ffffffffffffffda RBX: 00007f3585d05fa0 RCX: 00007f3585b15d29 [ 383.893804][T20213] RDX: 0000000000000000 RSI: 0000000020001200 RDI: 0000000000000005 [ 383.901794][T20213] RBP: 00007f3584181090 R08: 0000000000000000 R09: 0000000000000000 [ 383.909782][T20213] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 383.917776][T20213] R13: 0000000000000000 R14: 00007f3585d05fa0 R15: 00007ffc2f408b58 [ 383.925800][T20213] [ 383.940985][T20217] FAULT_INJECTION: forcing a failure. [ 383.940985][T20217] name failslab, interval 1, probability 0, space 0, times 0 [ 383.953678][T20217] CPU: 0 UID: 0 PID: 20217 Comm: syz.2.4579 Not tainted 6.13.0-rc3-syzkaller-00136-g8faabc041a00 #0 [ 383.964484][T20217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 383.974559][T20217] Call Trace: [ 383.977875][T20217] [ 383.980825][T20217] dump_stack_lvl+0xf2/0x150 [ 383.985442][T20217] dump_stack+0x15/0x1a [ 383.989655][T20217] should_fail_ex+0x223/0x230 [ 383.994451][T20217] should_failslab+0x8f/0xb0 [ 383.999118][T20217] kmem_cache_alloc_noprof+0x52/0x320 [ 384.004507][T20217] ? security_inode_alloc+0x37/0x100 [ 384.009848][T20217] security_inode_alloc+0x37/0x100 [ 384.015045][T20217] inode_init_always_gfp+0x4a2/0x4f0 [ 384.020432][T20217] ? __pfx_sock_alloc_inode+0x10/0x10 [ 384.025971][T20217] alloc_inode+0x82/0x160 [ 384.030381][T20217] new_inode_pseudo+0x15/0x20 [ 384.035087][T20217] __sock_create+0x12b/0x5a0 [ 384.039890][T20217] sock_create_kern+0x38/0x50 [ 384.044658][T20217] mptcp_subflow_create_socket+0x84/0x710 [ 384.050454][T20217] ? __rcu_read_unlock+0x4e/0x70 [ 384.055449][T20217] ? mntput_no_expire+0x70/0x3c0 [ 384.060460][T20217] __mptcp_nmpc_sk+0xb4/0x3c0 [ 384.065167][T20217] mptcp_sendmsg_fastopen+0x94/0x2f0 [ 384.070489][T20217] mptcp_sendmsg+0xd8f/0xe60 [ 384.075152][T20217] ? avc_has_perm+0xd4/0x160 [ 384.079818][T20217] ? selinux_socket_sendmsg+0x185/0x1c0 [ 384.085392][T20217] ? __pfx_mptcp_sendmsg+0x10/0x10 [ 384.090587][T20217] inet6_sendmsg+0xc5/0xd0 [ 384.095023][T20217] __sock_sendmsg+0x8b/0x180 [ 384.099675][T20217] __sys_sendto+0x1a8/0x230 [ 384.104229][T20217] __x64_sys_sendto+0x78/0x90 [ 384.108934][T20217] x64_sys_call+0x29fa/0x2dc0 [ 384.113693][T20217] do_syscall_64+0xc9/0x1c0 [ 384.118271][T20217] ? clear_bhb_loop+0x55/0xb0 [ 384.122957][T20217] ? clear_bhb_loop+0x55/0xb0 [ 384.127648][T20217] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 384.133687][T20217] RIP: 0033:0x7fd556875d29 [ 384.138172][T20217] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 384.157852][T20217] RSP: 002b:00007fd554ee1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 384.166277][T20217] RAX: ffffffffffffffda RBX: 00007fd556a65fa0 RCX: 00007fd556875d29 [ 384.174325][T20217] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 384.182320][T20217] RBP: 00007fd554ee1090 R08: 0000000000000000 R09: 0000000000000000 [ 384.190316][T20217] R10: 0000000020048004 R11: 0000000000000246 R12: 0000000000000001 [ 384.198371][T20217] R13: 0000000000000000 R14: 00007fd556a65fa0 R15: 00007ffdcab60e18 [ 384.206361][T20217] [ 384.209591][T20217] socket: no more sockets [ 384.225692][ T2156] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 384.235399][ T2156] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 384.247028][ T2156] bond0 (unregistering): Released all slaves [ 384.262353][T20012] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 384.269650][T20012] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 384.295760][T20012] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 384.314225][T20215] netem: change failed [ 384.334906][ T2156] hsr_slave_0: left promiscuous mode [ 384.341197][ T2156] hsr_slave_1: left promiscuous mode [ 384.402998][ T2156] team0 (unregistering): Port device team_slave_1 removed [ 384.426945][ T2156] team0 (unregistering): Port device team_slave_0 removed [ 384.471384][T20252] FAULT_INJECTION: forcing a failure. [ 384.471384][T20252] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 384.484761][T20252] CPU: 1 UID: 0 PID: 20252 Comm: syz.3.4589 Not tainted 6.13.0-rc3-syzkaller-00136-g8faabc041a00 #0 [ 384.495687][T20252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 384.505770][T20252] Call Trace: [ 384.509060][T20252] [ 384.512084][T20252] dump_stack_lvl+0xf2/0x150 [ 384.516758][T20252] dump_stack+0x15/0x1a [ 384.520964][T20252] should_fail_ex+0x223/0x230 [ 384.525661][T20252] should_fail+0xb/0x10 [ 384.529829][T20252] should_fail_usercopy+0x1a/0x20 [ 384.534873][T20252] _copy_from_user+0x1e/0xb0 [ 384.539493][T20252] __se_sys_memfd_create+0x26b/0x5c0 [ 384.544837][T20252] __x64_sys_memfd_create+0x31/0x40 [ 384.550103][T20252] x64_sys_call+0x2d4c/0x2dc0 [ 384.554876][T20252] do_syscall_64+0xc9/0x1c0 [ 384.559393][T20252] ? clear_bhb_loop+0x55/0xb0 [ 384.564157][T20252] ? clear_bhb_loop+0x55/0xb0 [ 384.568854][T20252] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 384.574810][T20252] RIP: 0033:0x7f2b42305d29 [ 384.579231][T20252] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 384.598977][T20252] RSP: 002b:00007f2b40976e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 384.607404][T20252] RAX: ffffffffffffffda RBX: 000000000000044a RCX: 00007f2b42305d29 [ 384.615383][T20252] RDX: 00007f2b40976ef0 RSI: 0000000000000000 RDI: 00007f2b42382409 [ 384.623409][T20252] RBP: 0000000020000400 R08: 00007f2b40976bb7 R09: 00007f2b40976e40 [ 384.631388][T20252] R10: 000000000000000a R11: 0000000000000202 R12: 00000000200001c0 [ 384.639518][T20252] R13: 00007f2b40976ef0 R14: 00007f2b40976eb0 R15: 0000000020000880 [ 384.647523][T20252] [ 384.686153][T20254] netem: change failed [ 384.720652][T20012] hsr_slave_0: entered promiscuous mode [ 384.728796][T20012] hsr_slave_1: entered promiscuous mode [ 384.734836][T20012] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 384.762370][T20012] Cannot create hsr debugfs directory [ 384.782889][T19921] veth0_vlan: entered promiscuous mode [ 384.798044][T20276] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20276 comm=syz.7.4592 [ 384.803456][T19921] veth1_vlan: entered promiscuous mode [ 384.810647][T20276] netlink: 12 bytes leftover after parsing attributes in process `syz.7.4592'. [ 384.825249][T20276] netlink: 'syz.7.4592': attribute type 30 has an invalid length. [ 384.871972][T20284] FAULT_INJECTION: forcing a failure. [ 384.871972][T20284] name failslab, interval 1, probability 0, space 0, times 0 [ 384.876282][T19921] veth0_macvtap: entered promiscuous mode [ 384.884708][T20284] CPU: 0 UID: 0 PID: 20284 Comm: syz.2.4594 Not tainted 6.13.0-rc3-syzkaller-00136-g8faabc041a00 #0 [ 384.901132][T20284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 384.911269][T20284] Call Trace: [ 384.914663][T20284] [ 384.917623][T20284] dump_stack_lvl+0xf2/0x150 [ 384.922310][T20284] dump_stack+0x15/0x1a [ 384.926495][T20284] should_fail_ex+0x223/0x230 [ 384.931202][T20284] should_failslab+0x8f/0xb0 [ 384.935819][T20284] kmem_cache_alloc_node_noprof+0x59/0x320 [ 384.941652][T20284] ? __alloc_skb+0x10b/0x310 [ 384.946330][T20284] __alloc_skb+0x10b/0x310 [ 384.950799][T20284] netlink_alloc_large_skb+0xad/0xe0 [ 384.956109][T20284] netlink_sendmsg+0x3b4/0x6e0 [ 384.960911][T20284] ? __pfx_netlink_sendmsg+0x10/0x10 [ 384.966253][T20284] __sock_sendmsg+0x140/0x180 [ 384.971005][T20284] ____sys_sendmsg+0x312/0x410 [ 384.975793][T20284] __sys_sendmsg+0x19d/0x230 [ 384.980615][T20284] __x64_sys_sendmsg+0x46/0x50 [ 384.985451][T20284] x64_sys_call+0x2734/0x2dc0 [ 384.990249][T20284] do_syscall_64+0xc9/0x1c0 [ 384.994777][T20284] ? clear_bhb_loop+0x55/0xb0 [ 384.999491][T20284] ? clear_bhb_loop+0x55/0xb0 [ 385.004389][T20284] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 385.010323][T20284] RIP: 0033:0x7fd556875d29 [ 385.014791][T20284] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 385.034423][T20284] RSP: 002b:00007fd554ee1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 385.042920][T20284] RAX: ffffffffffffffda RBX: 00007fd556a65fa0 RCX: 00007fd556875d29 [ 385.050903][T20284] RDX: 0000000000000000 RSI: 0000000020000480 RDI: 0000000000000003 [ 385.058915][T20284] RBP: 00007fd554ee1090 R08: 0000000000000000 R09: 0000000000000000 [ 385.067062][T20284] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 385.075042][T20284] R13: 0000000000000000 R14: 00007fd556a65fa0 R15: 00007ffdcab60e18 [ 385.083035][T20284] [ 385.093989][T19921] veth1_macvtap: entered promiscuous mode [ 385.135931][T19921] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 385.146631][T19921] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 385.156523][T19921] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 385.167009][T19921] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 385.167503][T20289] ebtables: ebtables: counters copy to user failed while replacing table [ 385.176860][T19921] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 385.176880][T19921] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 385.188673][T19921] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 385.265679][T19921] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 385.276337][T19921] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 385.280713][T20300] Process accounting resumed [ 385.286199][T19921] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 385.290825][T20300] kernel write not supported for file /asound/timers (pid: 20300 comm: syz.3.4598) [ 385.310840][T19921] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 385.320708][T19921] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 385.331244][T19921] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 385.341827][T19921] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 385.350556][T19921] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 385.359355][T19921] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 385.368222][T19921] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 385.376971][T19921] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 385.498810][T20318] netlink: 'syz.3.4602': attribute type 7 has an invalid length. [ 385.532171][T20012] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 385.555105][T20322] sd 0:0:1:0: device reset [ 385.571688][T20012] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 385.582909][T20012] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 385.598750][T20335] netlink: 277 bytes leftover after parsing attributes in process `syz.7.4603'. [ 385.602539][T20012] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 385.700091][T20341] ebtables: ebtables: counters copy to user failed while replacing table [ 385.725079][T20346] ebtables: ebtables: counters copy to user failed while replacing table [ 385.746238][T20012] 8021q: adding VLAN 0 to HW filter on device bond0 [ 385.781158][T20012] 8021q: adding VLAN 0 to HW filter on device team0 [ 385.803422][ T123] bridge0: port 1(bridge_slave_0) entered blocking state [ 385.810621][ T123] bridge0: port 1(bridge_slave_0) entered forwarding state [ 385.844621][ T123] bridge0: port 2(bridge_slave_1) entered blocking state [ 385.851757][ T123] bridge0: port 2(bridge_slave_1) entered forwarding state [ 385.907671][T20366] netlink: 277 bytes leftover after parsing attributes in process `syz.3.4612'. [ 385.921251][T20367] netlink: 80 bytes leftover after parsing attributes in process `syz.2.4613'. [ 385.958882][T20367] netlink: 80 bytes leftover after parsing attributes in process `syz.2.4613'. [ 386.000205][T20374] sd 0:0:1:0: device reset [ 386.041827][T20371] bond1: entered promiscuous mode [ 386.046958][T20371] bond1: entered allmulticast mode [ 386.052699][T20371] 8021q: adding VLAN 0 to HW filter on device bond1 [ 386.097058][T20371] bond1 (unregistering): Released all slaves [ 386.122933][T20380] netlink: 'syz.2.4613': attribute type 21 has an invalid length. [ 386.130969][T20380] netlink: 'syz.2.4613': attribute type 20 has an invalid length. [ 386.172287][T20012] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 386.246917][T20405] ip6tnl1: entered promiscuous mode [ 386.252333][T20405] ip6tnl1: entered allmulticast mode [ 386.405669][T20437] ebtables: ebtables: counters copy to user failed while replacing table [ 386.462384][T20012] veth0_vlan: entered promiscuous mode [ 386.484143][T20012] veth1_vlan: entered promiscuous mode [ 386.519177][T20012] veth0_macvtap: entered promiscuous mode [ 386.529013][T20455] ebtables: ebtables: counters copy to user failed while replacing table [ 386.538823][T20466] FAULT_INJECTION: forcing a failure. [ 386.538823][T20466] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 386.551975][T20466] CPU: 0 UID: 0 PID: 20466 Comm: syz.6.4623 Not tainted 6.13.0-rc3-syzkaller-00136-g8faabc041a00 #0 [ 386.562773][T20466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 386.572864][T20466] Call Trace: [ 386.576168][T20466] [ 386.579126][T20466] dump_stack_lvl+0xf2/0x150 [ 386.583769][T20466] dump_stack+0x15/0x1a [ 386.588032][T20466] should_fail_ex+0x223/0x230 [ 386.592895][T20466] should_fail+0xb/0x10 [ 386.597087][T20466] should_fail_usercopy+0x1a/0x20 [ 386.602215][T20466] _copy_to_iter+0x248/0xd00 [ 386.604237][T20012] veth1_macvtap: entered promiscuous mode [ 386.606932][T20466] ? __virt_addr_valid+0x1ed/0x250 [ 386.617809][T20466] ? __check_object_size+0x364/0x520 [ 386.618130][T20012] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 386.623192][T20466] ? __pfx_simple_copy_to_iter+0x10/0x10 [ 386.623228][T20466] __skb_datagram_iter+0xc8/0x610 [ 386.633656][T20012] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 386.633675][T20012] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 386.633703][T20012] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 386.633716][T20012] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 386.639338][T20466] skb_copy_datagram_iter+0x41/0x130 [ 386.644381][T20012] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 386.654163][T20466] netlink_recvmsg+0x1a4/0x780 [ 386.664776][T20012] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 386.674539][T20466] ? __pfx_netlink_recvmsg+0x10/0x10 [ 386.684961][T20012] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 386.690273][T20466] sock_recvmsg+0x13f/0x170 [ 386.704648][T20012] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 386.704889][T20466] ____sys_recvmsg+0xf9/0x280 [ 386.747083][T20466] do_recvmmsg+0x2aa/0x6d0 [ 386.751538][T20466] __x64_sys_recvmmsg+0xf9/0x170 [ 386.756546][T20466] x64_sys_call+0x2a9a/0x2dc0 [ 386.761277][T20466] do_syscall_64+0xc9/0x1c0 [ 386.765792][T20466] ? clear_bhb_loop+0x55/0xb0 [ 386.770484][T20466] ? clear_bhb_loop+0x55/0xb0 [ 386.775245][T20466] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 386.781229][T20466] RIP: 0033:0x7f1d586b5d29 [ 386.785659][T20466] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 386.805371][T20466] RSP: 002b:00007f1d56d27038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 386.813876][T20466] RAX: ffffffffffffffda RBX: 00007f1d588a5fa0 RCX: 00007f1d586b5d29 [ 386.821869][T20466] RDX: 04000000000003b4 RSI: 00000000200037c0 RDI: 0000000000000003 [ 386.829852][T20466] RBP: 00007f1d56d27090 R08: 0000000020003700 R09: 0000000000000000 [ 386.837933][T20466] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 386.845962][T20466] R13: 0000000000000000 R14: 00007f1d588a5fa0 R15: 00007ffd043bd898 [ 386.854009][T20466] [ 386.865713][T20012] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 386.876239][T20012] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 386.886146][T20012] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 386.896628][T20012] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 386.906489][T20012] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 386.916998][T20012] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 386.926845][T20012] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 386.937587][T20012] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 386.950202][T20482] sd 0:0:1:0: device reset [ 386.954968][T20470] FAULT_INJECTION: forcing a failure. [ 386.954968][T20470] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 386.957948][T20012] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 386.968187][T20470] CPU: 1 UID: 0 PID: 20470 Comm: syz.3.4624 Not tainted 6.13.0-rc3-syzkaller-00136-g8faabc041a00 #0 [ 386.968218][T20470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 386.968233][T20470] Call Trace: [ 386.968240][T20470] [ 386.968249][T20470] dump_stack_lvl+0xf2/0x150 [ 387.003488][T20012] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 387.007119][T20470] dump_stack+0x15/0x1a [ 387.015957][T20012] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 387.019951][T20470] should_fail_ex+0x223/0x230 [ 387.028682][T20012] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 387.033302][T20470] should_fail+0xb/0x10 [ 387.033330][T20470] should_fail_usercopy+0x1a/0x20 [ 387.042080][T20012] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 387.046181][T20470] _copy_to_user+0x20/0xa0 [ 387.064467][T20470] simple_read_from_buffer+0xa0/0x110 [ 387.069907][T20470] proc_fail_nth_read+0xf9/0x140 [ 387.074956][T20470] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 387.080664][T20470] vfs_read+0x1a2/0x700 [ 387.084863][T20470] ? __rcu_read_unlock+0x4e/0x70 [ 387.089923][T20470] ? __fget_files+0x17c/0x1c0 [ 387.094657][T20470] ksys_read+0xe8/0x1b0 [ 387.098910][T20470] __x64_sys_read+0x42/0x50 [ 387.103563][T20470] x64_sys_call+0x2874/0x2dc0 [ 387.108285][T20470] do_syscall_64+0xc9/0x1c0 [ 387.112905][T20470] ? clear_bhb_loop+0x55/0xb0 [ 387.117696][T20470] ? clear_bhb_loop+0x55/0xb0 [ 387.122405][T20470] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 387.128396][T20470] RIP: 0033:0x7f2b4230473c [ 387.132843][T20470] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 387.152545][T20470] RSP: 002b:00007f2b40977030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 387.161014][T20470] RAX: ffffffffffffffda RBX: 00007f2b424f5fa0 RCX: 00007f2b4230473c [ 387.169016][T20470] RDX: 000000000000000f RSI: 00007f2b409770a0 RDI: 0000000000000005 [ 387.177015][T20470] RBP: 00007f2b40977090 R08: 0000000000000000 R09: 0000000000000000 [ 387.182774][ T29] kauditd_printk_skb: 39 callbacks suppressed [ 387.182798][ T29] audit: type=1400 audit(1734687829.118:14655): avc: denied { read } for pid=20469 comm="syz.3.4624" name="ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 387.185072][T20470] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 387.185091][T20470] R13: 0000000000000000 R14: 00007f2b424f5fa0 R15: 00007ffdd95a8428 [ 387.191180][ T29] audit: type=1400 audit(1734687829.118:14656): avc: denied { open } for pid=20469 comm="syz.3.4624" path="/dev/ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 387.213967][T20470] [ 387.256992][ T29] audit: type=1400 audit(1734687829.118:14657): avc: denied { ioctl } for pid=20469 comm="syz.3.4624" path="/dev/ppp" dev="devtmpfs" ino=140 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 387.318059][ T29] audit: type=1326 audit(1734687829.286:14658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20499 comm="syz.7.4627" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3585b15d29 code=0x7ffc0000 [ 387.341805][ T29] audit: type=1326 audit(1734687829.286:14659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20499 comm="syz.7.4627" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3585b15d29 code=0x7ffc0000 [ 387.399075][ T29] audit: type=1326 audit(1734687829.339:14660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20499 comm="syz.7.4627" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f3585b15d29 code=0x7ffc0000 [ 387.422984][ T29] audit: type=1326 audit(1734687829.339:14661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20499 comm="syz.7.4627" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3585b15d29 code=0x7ffc0000 [ 387.446605][ T29] audit: type=1326 audit(1734687829.339:14662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20499 comm="syz.7.4627" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3585b15d29 code=0x7ffc0000 [ 387.470409][ T29] audit: type=1326 audit(1734687829.339:14663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20499 comm="syz.7.4627" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f3585b15d29 code=0x7ffc0000 [ 387.494228][ T29] audit: type=1326 audit(1734687829.339:14664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20499 comm="syz.7.4627" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3585b15d29 code=0x7ffc0000 [ 387.565737][T20522] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 387.573045][T20522] IPv6: NLM_F_CREATE should be set when creating new route [ 387.616454][T20530] FAULT_INJECTION: forcing a failure. [ 387.616454][T20530] name failslab, interval 1, probability 0, space 0, times 0 [ 387.629301][T20530] CPU: 1 UID: 0 PID: 20530 Comm: syz.7.4633 Not tainted 6.13.0-rc3-syzkaller-00136-g8faabc041a00 #0 [ 387.640101][T20530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 387.650197][T20530] Call Trace: [ 387.653516][T20530] [ 387.656542][T20530] dump_stack_lvl+0xf2/0x150 [ 387.661229][T20530] dump_stack+0x15/0x1a [ 387.665483][T20530] should_fail_ex+0x223/0x230 [ 387.670263][T20530] ? do_inotify_init+0x94/0x270 [ 387.675151][T20530] should_failslab+0x8f/0xb0 [ 387.679782][T20530] __kmalloc_cache_noprof+0x4e/0x320 [ 387.685109][T20530] ? __mutex_init+0x4c/0x60 [ 387.689671][T20530] do_inotify_init+0x94/0x270 [ 387.694506][T20530] __x64_sys_inotify_init1+0x1e/0x30 [ 387.699913][T20530] x64_sys_call+0x1434/0x2dc0 [ 387.704630][T20530] do_syscall_64+0xc9/0x1c0 [ 387.709237][T20530] ? clear_bhb_loop+0x55/0xb0 [ 387.713979][T20530] ? clear_bhb_loop+0x55/0xb0 [ 387.718877][T20530] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 387.724881][T20530] RIP: 0033:0x7f3585b15d29 [ 387.729348][T20530] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 387.749106][T20530] RSP: 002b:00007f3584181038 EFLAGS: 00000246 ORIG_RAX: 0000000000000126 [ 387.757624][T20530] RAX: ffffffffffffffda RBX: 00007f3585d05fa0 RCX: 00007f3585b15d29 [ 387.765618][T20530] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 387.773611][T20530] RBP: 00007f3584181090 R08: 0000000000000000 R09: 0000000000000000 [ 387.781615][T20530] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 387.789659][T20530] R13: 0000000000000000 R14: 00007f3585d05fa0 R15: 00007ffc2f408b58 [ 387.797759][T20530] [ 387.874129][T20559] ebtables: ebtables: counters copy to user failed while replacing table [ 387.903472][T20571] netlink: 156 bytes leftover after parsing attributes in process `syz.2.4636'. [ 387.941386][T20579] sd 0:0:1:0: device reset [ 388.105658][T20606] wg2: entered promiscuous mode [ 388.110824][T20606] wg2: entered allmulticast mode [ 388.169142][T20621] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 388.176442][T20621] IPv6: NLM_F_CREATE should be set when creating new route [ 388.244339][T20629] ebtables: ebtables: counters copy to user failed while replacing table [ 388.254069][T20634] sd 0:0:1:0: device reset [ 388.580602][T20701] syz.8.4659[20701] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 388.580714][T20701] syz.8.4659[20701] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 388.593983][T20701] syz.8.4659[20701] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 388.616003][T20705] FAULT_INJECTION: forcing a failure. [ 388.616003][T20705] name failslab, interval 1, probability 0, space 0, times 0 [ 388.640242][T20705] CPU: 0 UID: 0 PID: 20705 Comm: syz.7.4660 Not tainted 6.13.0-rc3-syzkaller-00136-g8faabc041a00 #0 [ 388.651044][T20705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 388.661158][T20705] Call Trace: [ 388.664461][T20705] [ 388.667412][T20705] dump_stack_lvl+0xf2/0x150 [ 388.672123][T20705] dump_stack+0x15/0x1a [ 388.676456][T20705] should_fail_ex+0x223/0x230 [ 388.681170][T20705] should_failslab+0x8f/0xb0 [ 388.685805][T20705] kmem_cache_alloc_lru_noprof+0x57/0x320 [ 388.691630][T20705] ? __d_alloc+0x3d/0x340 [ 388.695993][T20705] __d_alloc+0x3d/0x340 [ 388.700188][T20705] d_alloc_pseudo+0x1e/0x80 [ 388.704721][T20705] alloc_file_pseudo+0x70/0x140 [ 388.709605][T20705] anon_inode_getfile+0xa3/0x120 [ 388.714574][T20705] bpf_link_prime+0x10a/0x1e0 [ 388.719309][T20705] bpf_raw_tp_link_attach+0x2dc/0x3e0 [ 388.724797][T20705] bpf_raw_tracepoint_open+0x135/0x2c0 [ 388.730328][T20705] __sys_bpf+0x32b/0x7a0 [ 388.734606][T20705] __x64_sys_bpf+0x43/0x50 [ 388.739059][T20705] x64_sys_call+0x2914/0x2dc0 [ 388.743920][T20705] do_syscall_64+0xc9/0x1c0 [ 388.748477][T20705] ? clear_bhb_loop+0x55/0xb0 [ 388.753184][T20705] ? clear_bhb_loop+0x55/0xb0 [ 388.758035][T20705] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 388.763988][T20705] RIP: 0033:0x7f3585b15d29 [ 388.768444][T20705] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 388.788093][T20705] RSP: 002b:00007f3584181038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 388.796632][T20705] RAX: ffffffffffffffda RBX: 00007f3585d05fa0 RCX: 00007f3585b15d29 [ 388.804688][T20705] RDX: 0000000000000010 RSI: 00000000200002c0 RDI: 0000000000000011 [ 388.812684][T20705] RBP: 00007f3584181090 R08: 0000000000000000 R09: 0000000000000000 [ 388.820689][T20705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 388.828765][T20705] R13: 0000000000000000 R14: 00007f3585d05fa0 R15: 00007ffc2f408b58 [ 388.836782][T20705] [ 388.867190][T20719] ebtables: ebtables: counters copy to user failed while replacing table [ 388.890724][T20734] sd 0:0:1:0: device reset [ 389.241545][T20804] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 389.261697][T20796] sd 0:0:1:0: device reset [ 389.296720][T20803] ebtables: ebtables: counters copy to user failed while replacing table [ 389.345494][T20814] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 389.368455][T20814] SELinux: Context system_u:object_r:chfn_exec_t:s0 is not valid (left unmapped). [ 389.416629][T20832] FAULT_INJECTION: forcing a failure. [ 389.416629][T20832] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 389.429802][T20832] CPU: 0 UID: 0 PID: 20832 Comm: syz.2.4685 Not tainted 6.13.0-rc3-syzkaller-00136-g8faabc041a00 #0 [ 389.440594][T20832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 389.450686][T20832] Call Trace: [ 389.453979][T20832] [ 389.456932][T20832] dump_stack_lvl+0xf2/0x150 [ 389.461573][T20832] dump_stack+0x15/0x1a [ 389.465782][T20832] should_fail_ex+0x223/0x230 [ 389.470489][T20832] should_fail+0xb/0x10 [ 389.474726][T20832] should_fail_usercopy+0x1a/0x20 [ 389.479804][T20832] _copy_to_user+0x20/0xa0 [ 389.484320][T20832] readlink_copy+0x67/0xa0 [ 389.488815][T20832] vfs_readlink+0xe6/0x1f0 [ 389.493362][T20832] do_readlinkat+0x13d/0x210 [ 389.497999][T20832] __x64_sys_readlink+0x47/0x60 [ 389.502919][T20832] x64_sys_call+0x28ba/0x2dc0 [ 389.507630][T20832] do_syscall_64+0xc9/0x1c0 [ 389.512159][T20832] ? clear_bhb_loop+0x55/0xb0 [ 389.516905][T20832] ? clear_bhb_loop+0x55/0xb0 [ 389.521643][T20832] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 389.527586][T20832] RIP: 0033:0x7fd556875d29 [ 389.532123][T20832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 389.551798][T20832] RSP: 002b:00007fd554ee1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000059 [ 389.560294][T20832] RAX: ffffffffffffffda RBX: 00007fd556a65fa0 RCX: 00007fd556875d29 [ 389.568297][T20832] RDX: 0000000000001000 RSI: 0000000020001200 RDI: 0000000020000240 [ 389.576337][T20832] RBP: 00007fd554ee1090 R08: 0000000000000000 R09: 0000000000000000 [ 389.584367][T20832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 389.592360][T20832] R13: 0000000000000000 R14: 00007fd556a65fa0 R15: 00007ffdcab60e18 [ 389.600367][T20832] [ 389.696841][T20869] netlink: 24 bytes leftover after parsing attributes in process `syz.7.4689'. [ 389.724162][T20869] futex_wake_op: syz.7.4689 tries to shift op by -1; fix this program [ 389.894740][T20902] sd 0:0:1:0: device reset [ 389.974444][T20918] ebtables: ebtables: counters copy to user failed while replacing table [ 390.110619][T20940] pim6reg1: entered promiscuous mode [ 390.116082][T20940] pim6reg1: entered allmulticast mode [ 390.333574][T20965] sd 0:0:1:0: device reset [ 390.812959][T20992] FAULT_INJECTION: forcing a failure. [ 390.812959][T20992] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 390.826093][T20992] CPU: 0 UID: 0 PID: 20992 Comm: syz.2.4710 Not tainted 6.13.0-rc3-syzkaller-00136-g8faabc041a00 #0 [ 390.836893][T20992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 390.846967][T20992] Call Trace: [ 390.850352][T20992] [ 390.853356][T20992] dump_stack_lvl+0xf2/0x150 [ 390.858052][T20992] dump_stack+0x15/0x1a [ 390.862334][T20992] should_fail_ex+0x223/0x230 [ 390.867050][T20992] should_fail+0xb/0x10 [ 390.871354][T20992] should_fail_usercopy+0x1a/0x20 [ 390.876414][T20992] _copy_from_user+0x1e/0xb0 [ 390.881039][T20992] __se_sys_memfd_create+0x26b/0x5c0 [ 390.886479][T20992] __x64_sys_memfd_create+0x31/0x40 [ 390.891705][T20992] x64_sys_call+0x2d4c/0x2dc0 [ 390.896398][T20992] do_syscall_64+0xc9/0x1c0 [ 390.900993][T20992] ? clear_bhb_loop+0x55/0xb0 [ 390.905688][T20992] ? clear_bhb_loop+0x55/0xb0 [ 390.910461][T20992] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 390.916427][T20992] RIP: 0033:0x7fd556875d29 [ 390.920878][T20992] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 390.940510][T20992] RSP: 002b:00007fd554ee0e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 390.949008][T20992] RAX: ffffffffffffffda RBX: 0000000000000611 RCX: 00007fd556875d29 [ 390.957077][T20992] RDX: 00007fd554ee0ef0 RSI: 0000000000000000 RDI: 00007fd5568f2409 [ 390.965076][T20992] RBP: 0000000020001080 R08: 00007fd554ee0bb7 R09: 00007fd554ee0e40 [ 390.973060][T20992] R10: 000000000000000a R11: 0000000000000202 R12: 0000000020000040 [ 390.981127][T20992] R13: 00007fd554ee0ef0 R14: 00007fd554ee0eb0 R15: 0000000020000100 [ 390.989119][T20992] [ 391.088563][T21007] ebtables: ebtables: counters copy to user failed while replacing table [ 391.100192][T21002] ebtables: ebtables: counters copy to user failed while replacing table [ 391.166620][T21020] sd 0:0:1:0: device reset [ 391.272197][T21041] tipc: Started in network mode [ 391.277269][T21041] tipc: Node identity 7f000001, cluster identity 4711 [ 391.291820][T21041] tipc: Enabled bearer , priority 10 [ 391.366585][T21050] FAULT_INJECTION: forcing a failure. [ 391.366585][T21050] name failslab, interval 1, probability 0, space 0, times 0 [ 391.379336][T21050] CPU: 0 UID: 0 PID: 21050 Comm: syz.8.4718 Not tainted 6.13.0-rc3-syzkaller-00136-g8faabc041a00 #0 [ 391.390115][T21050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 391.400194][T21050] Call Trace: [ 391.403478][T21050] [ 391.406445][T21050] dump_stack_lvl+0xf2/0x150 [ 391.411120][T21050] dump_stack+0x15/0x1a [ 391.415314][T21050] should_fail_ex+0x223/0x230 [ 391.420023][T21050] should_failslab+0x8f/0xb0 [ 391.424704][T21050] kmem_cache_alloc_noprof+0x52/0x320 [ 391.430204][T21050] ? security_inode_alloc+0x37/0x100 [ 391.435606][T21050] security_inode_alloc+0x37/0x100 [ 391.440801][T21050] inode_init_always_gfp+0x4a2/0x4f0 [ 391.446192][T21050] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 391.451683][T21050] alloc_inode+0x82/0x160 [ 391.456047][T21050] new_inode+0x1e/0x100 [ 391.460217][T21050] shmem_get_inode+0x24e/0x730 [ 391.465095][T21050] __shmem_file_setup+0x127/0x1f0 [ 391.470144][T21050] shmem_file_setup+0x3b/0x50 [ 391.474847][T21050] __se_sys_memfd_create+0x31d/0x5c0 [ 391.480163][T21050] __x64_sys_memfd_create+0x31/0x40 [ 391.485428][T21050] x64_sys_call+0x2d4c/0x2dc0 [ 391.490125][T21050] do_syscall_64+0xc9/0x1c0 [ 391.494663][T21050] ? clear_bhb_loop+0x55/0xb0 [ 391.499384][T21050] ? clear_bhb_loop+0x55/0xb0 [ 391.504135][T21050] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 391.510062][T21050] RIP: 0033:0x7f63cb255d29 [ 391.514557][T21050] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 391.534211][T21050] RSP: 002b:00007f63c9884e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 391.542652][T21050] RAX: ffffffffffffffda RBX: 0000000000000500 RCX: 00007f63cb255d29 [ 391.550680][T21050] RDX: 00007f63c9884ef0 RSI: 0000000000000000 RDI: 00007f63cb2d2409 [ 391.558665][T21050] RBP: 0000000020000500 R08: 00007f63c9884bb7 R09: 00007f63c9884e40 [ 391.566658][T21050] R10: 000000000000000a R11: 0000000000000202 R12: 00000000200000c0 [ 391.574706][T21050] R13: 00007f63c9884ef0 R14: 00007f63c9884eb0 R15: 0000000020000100 [ 391.582710][T21050] [ 391.640297][T21041] tipc: Enabled bearer , priority 0 [ 391.783266][T21072] netlink: 156 bytes leftover after parsing attributes in process `syz.7.4724'. [ 391.955096][T21085] ebtables: ebtables: counters copy to user failed while replacing table [ 392.011159][ T29] kauditd_printk_skb: 62 callbacks suppressed [ 392.011220][ T29] audit: type=1326 audit(1734687834.212:14727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21093 comm="syz.3.4727" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2b42305d29 code=0x7ffc0000 [ 392.102406][ T29] audit: type=1326 audit(1734687834.244:14728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21093 comm="syz.3.4727" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2b42305d29 code=0x7ffc0000 [ 392.126160][ T29] audit: type=1326 audit(1734687834.265:14729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21093 comm="syz.3.4727" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2b42305d29 code=0x7ffc0000 [ 392.149806][ T29] audit: type=1326 audit(1734687834.265:14730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21093 comm="syz.3.4727" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2b42305d29 code=0x7ffc0000 [ 392.173536][ T29] audit: type=1326 audit(1734687834.265:14731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21093 comm="syz.3.4727" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2b42305d29 code=0x7ffc0000 [ 392.197724][ T29] audit: type=1326 audit(1734687834.265:14732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21093 comm="syz.3.4727" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2b42305d29 code=0x7ffc0000 [ 392.221509][ T29] audit: type=1326 audit(1734687834.265:14733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21093 comm="syz.3.4727" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2b42305d29 code=0x7ffc0000 [ 392.245181][ T29] audit: type=1326 audit(1734687834.265:14734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21093 comm="syz.3.4727" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2b42305d29 code=0x7ffc0000 [ 392.268779][ T29] audit: type=1326 audit(1734687834.265:14735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21093 comm="syz.3.4727" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2b42305d29 code=0x7ffc0000 [ 392.292430][ T29] audit: type=1326 audit(1734687834.265:14736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21093 comm="syz.3.4727" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2b42305d29 code=0x7ffc0000 [ 392.301201][T21110] sd 0:0:1:0: device reset [ 392.648287][ T3590] tipc: Node number set to 2130706433 [ 392.665886][T21146] ebtables: ebtables: counters copy to user failed while replacing table [ 393.384736][T21180] ebtables: ebtables: counters copy to user failed while replacing table [ 393.801659][T21218] FAULT_INJECTION: forcing a failure. [ 393.801659][T21218] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 393.814836][T21218] CPU: 0 UID: 0 PID: 21218 Comm: syz.6.4745 Not tainted 6.13.0-rc3-syzkaller-00136-g8faabc041a00 #0 [ 393.825709][T21218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 393.835770][T21218] Call Trace: [ 393.839098][T21218] [ 393.842191][T21218] dump_stack_lvl+0xf2/0x150 [ 393.846860][T21218] dump_stack+0x15/0x1a [ 393.851063][T21218] should_fail_ex+0x223/0x230 [ 393.855766][T21218] should_fail+0xb/0x10 [ 393.859969][T21218] should_fail_usercopy+0x1a/0x20 [ 393.865089][T21218] _copy_from_user+0x1e/0xb0 [ 393.869773][T21218] copy_msghdr_from_user+0x54/0x2a0 [ 393.875119][T21218] ? __fget_files+0x17c/0x1c0 [ 393.879846][T21218] __sys_sendmsg+0x13e/0x230 [ 393.884505][T21218] __x64_sys_sendmsg+0x46/0x50 [ 393.889293][T21218] x64_sys_call+0x2734/0x2dc0 [ 393.893997][T21218] do_syscall_64+0xc9/0x1c0 [ 393.898513][T21218] ? clear_bhb_loop+0x55/0xb0 [ 393.903270][T21218] ? clear_bhb_loop+0x55/0xb0 [ 393.907962][T21218] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 393.913901][T21218] RIP: 0033:0x7f1d586b5d29 [ 393.918333][T21218] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 393.937960][T21218] RSP: 002b:00007f1d56d27038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 393.946399][T21218] RAX: ffffffffffffffda RBX: 00007f1d588a5fa0 RCX: 00007f1d586b5d29 [ 393.954422][T21218] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000004 [ 393.962410][T21218] RBP: 00007f1d56d27090 R08: 0000000000000000 R09: 0000000000000000 [ 393.970400][T21218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 393.978381][T21218] R13: 0000000000000000 R14: 00007f1d588a5fa0 R15: 00007ffd043bd898 [ 393.986425][T21218] [ 394.125959][T21225] sd 0:0:1:0: device reset [ 394.632050][T21286] netlink: 'syz.8.4757': attribute type 6 has an invalid length. [ 394.758230][T21292] ebtables: ebtables: counters copy to user failed while replacing table [ 394.879399][T21307] sd 0:0:1:0: device reset [ 394.941776][T21269] program syz.6.4756 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 395.110075][T21349] FAULT_INJECTION: forcing a failure. [ 395.110075][T21349] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 395.123306][T21349] CPU: 1 UID: 0 PID: 21349 Comm: syz.3.4768 Not tainted 6.13.0-rc3-syzkaller-00136-g8faabc041a00 #0 [ 395.134154][T21349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 395.144237][T21349] Call Trace: [ 395.147534][T21349] [ 395.150492][T21349] dump_stack_lvl+0xf2/0x150 [ 395.155273][T21349] dump_stack+0x15/0x1a [ 395.159554][T21349] should_fail_ex+0x223/0x230 [ 395.164262][T21349] should_fail+0xb/0x10 [ 395.168514][T21349] should_fail_usercopy+0x1a/0x20 [ 395.173593][T21349] _copy_to_user+0x20/0xa0 [ 395.178151][T21349] readlink_copy+0x67/0xa0 [ 395.182675][T21349] vfs_readlink+0xe6/0x1f0 [ 395.187255][T21349] do_readlinkat+0x13d/0x210 [ 395.191880][T21349] __x64_sys_readlinkat+0x53/0x60 [ 395.197091][T21349] x64_sys_call+0x86c/0x2dc0 [ 395.201716][T21349] do_syscall_64+0xc9/0x1c0 [ 395.206251][T21349] ? clear_bhb_loop+0x55/0xb0 [ 395.210995][T21349] ? clear_bhb_loop+0x55/0xb0 [ 395.215759][T21349] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 395.221706][T21349] RIP: 0033:0x7f2b42305d29 [ 395.226149][T21349] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 395.240931][T21363] netlink: 202920 bytes leftover after parsing attributes in process `syz.6.4769'. [ 395.245773][T21349] RSP: 002b:00007f2b40977038 EFLAGS: 00000246 ORIG_RAX: 000000000000010b [ 395.263627][T21349] RAX: ffffffffffffffda RBX: 00007f2b424f5fa0 RCX: 00007f2b42305d29 [ 395.271633][T21349] RDX: ffffffffffffffff RSI: 0000000020000100 RDI: ffffffffffffff9c [ 395.279708][T21349] RBP: 00007f2b40977090 R08: 0000000000000000 R09: 0000000000000000 [ 395.287827][T21349] R10: 00000000000000b4 R11: 0000000000000246 R12: 0000000000000001 [ 395.295828][T21349] R13: 0000000000000000 R14: 00007f2b424f5fa0 R15: 00007ffdd95a8428 [ 395.303875][T21349] [ 395.417371][T21376] sd 0:0:1:0: device reset [ 395.440354][T21373] ebtables: ebtables: counters copy to user failed while replacing table [ 395.507783][T21399] FAULT_INJECTION: forcing a failure. [ 395.507783][T21399] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 395.520971][T21399] CPU: 1 UID: 0 PID: 21399 Comm: syz.3.4776 Not tainted 6.13.0-rc3-syzkaller-00136-g8faabc041a00 #0 [ 395.531785][T21399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 395.541895][T21399] Call Trace: [ 395.545186][T21399] [ 395.548130][T21399] dump_stack_lvl+0xf2/0x150 [ 395.552759][T21399] dump_stack+0x15/0x1a [ 395.556950][T21399] should_fail_ex+0x223/0x230 [ 395.561732][T21399] should_fail+0xb/0x10 [ 395.566003][T21399] should_fail_usercopy+0x1a/0x20 [ 395.571090][T21399] _copy_from_user+0x1e/0xb0 [ 395.575803][T21399] copy_msghdr_from_user+0x54/0x2a0 [ 395.581046][T21399] ? __fget_files+0x17c/0x1c0 [ 395.585779][T21399] __sys_sendmsg+0x13e/0x230 [ 395.590416][T21399] __x64_sys_sendmsg+0x46/0x50 [ 395.595340][T21399] x64_sys_call+0x2734/0x2dc0 [ 395.600132][T21399] do_syscall_64+0xc9/0x1c0 [ 395.604667][T21399] ? clear_bhb_loop+0x55/0xb0 [ 395.609376][T21399] ? clear_bhb_loop+0x55/0xb0 [ 395.614176][T21399] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 395.620144][T21399] RIP: 0033:0x7f2b42305d29 [ 395.624603][T21399] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 395.644261][T21399] RSP: 002b:00007f2b40977038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 395.652699][T21399] RAX: ffffffffffffffda RBX: 00007f2b424f5fa0 RCX: 00007f2b42305d29 [ 395.660693][T21399] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000003 [ 395.668689][T21399] RBP: 00007f2b40977090 R08: 0000000000000000 R09: 0000000000000000 [ 395.676735][T21399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 395.684927][T21399] R13: 0000000000000000 R14: 00007f2b424f5fa0 R15: 00007ffdd95a8428 [ 395.692925][T21399] [ 395.786090][T21423] ebtables: ebtables: counters copy to user failed while replacing table [ 395.873959][T21442] netlink: 'syz.3.4781': attribute type 4 has an invalid length. [ 395.898615][T21442] netlink: 28 bytes leftover after parsing attributes in process `syz.3.4781'. [ 395.941375][T21448] 9pnet: Could not find request transport: fdfd [ 396.206129][T21499] sd 0:0:1:0: device reset [ 396.236478][T21501] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 396.245167][T21501] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 396.342985][T21516] netlink: 133492 bytes leftover after parsing attributes in process `syz.7.4792'. [ 396.348975][T21510] ebtables: ebtables: counters copy to user failed while replacing table [ 396.369151][T21518] FAULT_INJECTION: forcing a failure. [ 396.369151][T21518] name failslab, interval 1, probability 0, space 0, times 0 [ 396.381890][T21518] CPU: 0 UID: 0 PID: 21518 Comm: syz.6.4787 Not tainted 6.13.0-rc3-syzkaller-00136-g8faabc041a00 #0 [ 396.392838][T21518] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 396.402907][T21518] Call Trace: [ 396.406191][T21518] [ 396.409136][T21518] dump_stack_lvl+0xf2/0x150 [ 396.413785][T21518] dump_stack+0x15/0x1a [ 396.418013][T21518] should_fail_ex+0x223/0x230 [ 396.422709][T21518] should_failslab+0x8f/0xb0 [ 396.427374][T21518] kmem_cache_alloc_lru_noprof+0x57/0x320 [ 396.433111][T21518] ? shmem_alloc_inode+0x34/0x50 [ 396.438151][T21518] shmem_alloc_inode+0x34/0x50 [ 396.442933][T21518] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 396.448411][T21518] alloc_inode+0x3c/0x160 [ 396.452775][T21518] new_inode+0x1e/0x100 [ 396.456977][T21518] shmem_get_inode+0x24e/0x730 [ 396.461937][T21518] __shmem_file_setup+0x127/0x1f0 [ 396.466974][T21518] shmem_file_setup+0x3b/0x50 [ 396.471728][T21518] __se_sys_memfd_create+0x31d/0x5c0 [ 396.477142][T21518] __x64_sys_memfd_create+0x31/0x40 [ 396.482360][T21518] x64_sys_call+0x2d4c/0x2dc0 [ 396.487052][T21518] do_syscall_64+0xc9/0x1c0 [ 396.491617][T21518] ? clear_bhb_loop+0x55/0xb0 [ 396.496340][T21518] ? clear_bhb_loop+0x55/0xb0 [ 396.501039][T21518] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 396.507026][T21518] RIP: 0033:0x7f1d586b5d29 [ 396.511536][T21518] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 396.531230][T21518] RSP: 002b:00007f1d56ce4e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 396.539681][T21518] RAX: ffffffffffffffda RBX: 000000000000043e RCX: 00007f1d586b5d29 [ 396.547669][T21518] RDX: 00007f1d56ce4ef0 RSI: 0000000000000000 RDI: 00007f1d58732409 [ 396.555656][T21518] RBP: 00000000200004c0 R08: 00007f1d56ce4bb7 R09: 00007f1d56ce4e40 [ 396.563635][T21518] R10: 000000000000000a R11: 0000000000000202 R12: 0000000020000480 [ 396.571767][T21518] R13: 00007f1d56ce4ef0 R14: 00007f1d56ce4eb0 R15: 0000000020000280 [ 396.580189][T21518] [ 396.771213][T21538] netlink: 156 bytes leftover after parsing attributes in process `syz.8.4797'. [ 396.804973][T21537] ebtables: ebtables: counters copy to user failed while replacing table [ 396.840028][T21542] sd 0:0:1:0: device reset [ 397.000188][ T29] kauditd_printk_skb: 117 callbacks suppressed [ 397.000206][ T29] audit: type=1326 audit(1734687839.443:14854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21572 comm="syz.2.4803" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd556875d29 code=0x7ffc0000 [ 397.030217][ T29] audit: type=1326 audit(1734687839.443:14855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21572 comm="syz.2.4803" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd556875d29 code=0x7ffc0000 [ 397.054427][ T29] audit: type=1326 audit(1734687839.443:14856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21572 comm="syz.2.4803" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fd556875d29 code=0x7ffc0000 [ 397.078395][ T29] audit: type=1326 audit(1734687839.443:14857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21572 comm="syz.2.4803" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd556875d29 code=0x7ffc0000 [ 397.102033][ T29] audit: type=1326 audit(1734687839.443:14858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21572 comm="syz.2.4803" exe="/root/syz-executor" sig=0 arch=c000003e syscall=49 compat=0 ip=0x7fd556875d29 code=0x7ffc0000 [ 397.125697][ T29] audit: type=1326 audit(1734687839.443:14859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21572 comm="syz.2.4803" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd556875d29 code=0x7ffc0000 [ 397.149348][ T29] audit: type=1326 audit(1734687839.443:14860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21572 comm="syz.2.4803" exe="/root/syz-executor" sig=0 arch=c000003e syscall=50 compat=0 ip=0x7fd556875d29 code=0x7ffc0000 [ 397.172876][ T29] audit: type=1326 audit(1734687839.443:14861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21572 comm="syz.2.4803" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd556875d29 code=0x7ffc0000 [ 397.196521][ T29] audit: type=1326 audit(1734687839.443:14862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21572 comm="syz.2.4803" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fd556875d29 code=0x7ffc0000 [ 397.220182][ T29] audit: type=1326 audit(1734687839.443:14863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21572 comm="syz.2.4803" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd556875d29 code=0x7ffc0000 [ 397.589966][T21623] ebtables: ebtables: counters copy to user failed while replacing table [ 397.911200][T21665] netlink: 40 bytes leftover after parsing attributes in process `+}[@'. [ 398.327280][T21719] netlink: 40 bytes leftover after parsing attributes in process `+}[@'. [ 398.352561][T21703] ebtables: ebtables: counters copy to user failed while replacing table [ 399.446412][T21837] netlink: 40 bytes leftover after parsing attributes in process `+}[@'. [ 399.821497][T21858] bridge0: entered promiscuous mode [ 399.837201][T21858] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4852'. [ 399.862234][T21858] bridge_slave_1: left allmulticast mode [ 399.868062][T21858] bridge_slave_1: left promiscuous mode [ 399.873860][T21858] bridge0: port 2(bridge_slave_1) entered disabled state [ 399.923135][T21858] bridge_slave_0: left allmulticast mode [ 399.928930][T21858] bridge_slave_0: left promiscuous mode [ 399.934688][T21858] bridge0: port 1(bridge_slave_0) entered disabled state [ 400.005625][T21858] bridge0 (unregistering): left promiscuous mode [ 401.797951][ T29] kauditd_printk_skb: 307 callbacks suppressed [ 401.797971][ T29] audit: type=1326 audit(1734687844.442:15171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21959 comm="syz.6.4870" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1d586b5d29 code=0x7ffc0000 [ 401.827931][ T29] audit: type=1326 audit(1734687844.442:15172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21959 comm="syz.6.4870" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d586b5d29 code=0x7ffc0000 [ 401.851567][ T29] audit: type=1326 audit(1734687844.442:15173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21959 comm="syz.6.4870" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d586b5d29 code=0x7ffc0000 [ 401.875203][ T29] audit: type=1326 audit(1734687844.442:15174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21959 comm="syz.6.4870" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f1d586b5d29 code=0x7ffc0000 [ 401.898787][ T29] audit: type=1326 audit(1734687844.442:15175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21959 comm="syz.6.4870" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d586b5d29 code=0x7ffc0000 [ 401.922544][ T29] audit: type=1326 audit(1734687844.442:15176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21959 comm="syz.6.4870" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f1d586b5d29 code=0x7ffc0000 [ 401.946119][ T29] audit: type=1326 audit(1734687844.442:15177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21959 comm="syz.6.4870" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d586b5d29 code=0x7ffc0000 [ 401.969825][ T29] audit: type=1326 audit(1734687844.442:15178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21959 comm="syz.6.4870" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f1d586b5d29 code=0x7ffc0000 [ 401.993632][ T29] audit: type=1326 audit(1734687844.442:15179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21959 comm="syz.6.4870" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d586b5d29 code=0x7ffc0000 [ 402.017230][ T29] audit: type=1326 audit(1734687844.442:15180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21959 comm="syz.6.4870" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1d586b5d29 code=0x7ffc0000 [ 403.379364][T21967] netlink: 156 bytes leftover after parsing attributes in process `syz.2.4868'. [ 403.756520][T21980] netlink: '+}[@': attribute type 11 has an invalid length. [ 404.131258][T21998] netlink: 156 bytes leftover after parsing attributes in process `syz.2.4875'. [ 404.267668][T22007] x_tables: duplicate underflow at hook 2 [ 404.295729][T22007] netdevsim netdevsim6: loading /lib/firmware/. failed with error -22 [ 404.304123][T22007] netdevsim netdevsim6: Direct firmware load for . failed with error -22 [ 404.694693][T22024] netlink: 24 bytes leftover after parsing attributes in process `syz.6.4879'. [ 405.186190][T22050] netlink: 24 bytes leftover after parsing attributes in process `syz.2.4884'. [ 405.195344][T22050] netlink: 24 bytes leftover after parsing attributes in process `syz.2.4884'. [ 406.303176][T22091] tipc: Enabling of bearer rejected, failed to enable media [ 406.530661][T22098] netlink: 20 bytes leftover after parsing attributes in process `syz.2.4892'. [ 406.542295][T22098] netlink: 20 bytes leftover after parsing attributes in process `syz.2.4892'. [ 406.751072][ T29] kauditd_printk_skb: 112 callbacks suppressed [ 406.751091][ T29] audit: type=1326 audit(1734687849.694:15293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22104 comm="syz.2.4893" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd556875d29 code=0x7ffc0000 [ 406.911991][ T29] audit: type=1326 audit(1734687849.736:15294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22104 comm="syz.2.4893" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fd556875d29 code=0x7ffc0000 [ 406.935731][ T29] audit: type=1326 audit(1734687849.736:15295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22104 comm="syz.2.4893" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd556875d29 code=0x7ffc0000 [ 406.959458][ T29] audit: type=1326 audit(1734687849.736:15296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22104 comm="syz.2.4893" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7fd556875d29 code=0x7ffc0000 [ 406.983094][ T29] audit: type=1326 audit(1734687849.736:15297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22104 comm="syz.2.4893" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd556875d29 code=0x7ffc0000 [ 407.006747][ T29] audit: type=1326 audit(1734687849.736:15298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22104 comm="syz.2.4893" exe="/root/syz-executor" sig=0 arch=c000003e syscall=258 compat=0 ip=0x7fd556875d29 code=0x7ffc0000 [ 407.030470][ T29] audit: type=1326 audit(1734687849.736:15299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22104 comm="syz.2.4893" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd556875d29 code=0x7ffc0000 [ 407.054229][ T29] audit: type=1326 audit(1734687849.736:15300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22104 comm="syz.2.4893" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fd556875d29 code=0x7ffc0000 [ 407.077862][ T29] audit: type=1326 audit(1734687849.736:15301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22104 comm="syz.2.4893" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd556875d29 code=0x7ffc0000 [ 407.101519][ T29] audit: type=1326 audit(1734687849.736:15302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22104 comm="syz.2.4893" exe="/root/syz-executor" sig=0 arch=c000003e syscall=2 compat=0 ip=0x7fd556875d29 code=0x7ffc0000 [ 412.334941][ T363] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 412.486095][ T363] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 412.598220][ T363] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 412.721019][ T363] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 413.109413][ T363] bridge_slave_1: left allmulticast mode [ 413.115113][ T363] bridge_slave_1: left promiscuous mode [ 413.121042][ T363] bridge0: port 2(bridge_slave_1) entered disabled state [ 413.226551][ T363] bridge_slave_0: left allmulticast mode [ 413.232249][ T363] bridge_slave_0: left promiscuous mode [ 413.238118][ T363] bridge0: port 1(bridge_slave_0) entered disabled state [ 413.577811][ T363] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 413.615121][ T363] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 413.666450][ T363] bond0 (unregistering): Released all slaves [ 413.712673][T22222] chnl_net:caif_netlink_parms(): no params data found [ 413.764366][ T363] hsr_slave_0: left promiscuous mode [ 413.804641][ T363] hsr_slave_1: left promiscuous mode [ 413.834147][ T363] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 413.841602][ T363] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 413.890410][ T363] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 413.897847][ T363] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 413.969746][ T363] veth1_macvtap: left promiscuous mode [ 413.975343][ T363] veth0_macvtap: left promiscuous mode [ 413.981001][ T363] veth1_vlan: left promiscuous mode [ 413.986419][ T363] veth0_vlan: left promiscuous mode [ 414.357841][ T363] team0 (unregistering): Port device team_slave_1 removed [ 414.398064][ T363] team0 (unregistering): Port device team_slave_0 removed [ 414.924214][T22222] bridge0: port 1(bridge_slave_0) entered blocking state [ 414.931488][T22222] bridge0: port 1(bridge_slave_0) entered disabled state [ 414.946720][T22222] bridge_slave_0: entered allmulticast mode [ 414.965723][T22222] bridge_slave_0: entered promiscuous mode [ 414.998166][T22222] bridge0: port 2(bridge_slave_1) entered blocking state [ 415.005310][T22222] bridge0: port 2(bridge_slave_1) entered disabled state [ 415.046130][T22222] bridge_slave_1: entered allmulticast mode [ 415.053951][T22222] bridge_slave_1: entered promiscuous mode [ 415.121213][T22222] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 415.187529][T22222] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 415.429194][T22222] team0: Port device team_slave_0 added [ 415.439509][T22222] team0: Port device team_slave_1 added [ 415.481747][T22222] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 415.488774][T22222] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 415.514755][T22222] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 415.623704][T22222] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 415.630712][T22222] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 415.656712][T22222] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 415.741363][T22266] chnl_net:caif_netlink_parms(): no params data found [ 416.181479][T22222] hsr_slave_0: entered promiscuous mode [ 416.187843][T22222] hsr_slave_1: entered promiscuous mode [ 416.194115][T22222] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 416.201688][T22222] Cannot create hsr debugfs directory [ 416.224781][T22261] chnl_net:caif_netlink_parms(): no params data found [ 416.670183][ T363] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 416.705503][T22261] bridge0: port 1(bridge_slave_0) entered blocking state [ 416.712642][T22261] bridge0: port 1(bridge_slave_0) entered disabled state [ 416.721819][T22261] bridge_slave_0: entered allmulticast mode [ 416.729036][T22261] bridge_slave_0: entered promiscuous mode [ 416.735833][T22261] bridge0: port 2(bridge_slave_1) entered blocking state [ 416.742943][T22261] bridge0: port 2(bridge_slave_1) entered disabled state [ 416.752066][T22261] bridge_slave_1: entered allmulticast mode [ 416.758904][T22261] bridge_slave_1: entered promiscuous mode [ 416.787578][T22261] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 416.816059][T22261] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 416.832502][T22266] bridge0: port 1(bridge_slave_0) entered blocking state [ 416.839651][T22266] bridge0: port 1(bridge_slave_0) entered disabled state [ 416.862094][T22266] bridge_slave_0: entered allmulticast mode [ 416.870092][T22266] bridge_slave_0: entered promiscuous mode [ 416.902798][ T363] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 416.976901][T22266] bridge0: port 2(bridge_slave_1) entered blocking state [ 416.984222][T22266] bridge0: port 2(bridge_slave_1) entered disabled state [ 417.013944][T22266] bridge_slave_1: entered allmulticast mode [ 417.041839][T22266] bridge_slave_1: entered promiscuous mode [ 417.075698][T22261] team0: Port device team_slave_0 added [ 417.109237][T22261] team0: Port device team_slave_1 added [ 417.117293][ T363] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 417.193865][T22266] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 417.205681][ T363] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 417.232186][T22261] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 417.239939][T22261] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 417.266082][T22261] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 417.325034][T22266] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 417.348772][T22261] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 417.355838][T22261] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 417.381811][T22261] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 417.456480][T22266] team0: Port device team_slave_0 added [ 417.494360][T22266] team0: Port device team_slave_1 added [ 417.576267][T22266] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 417.583697][T22266] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 417.609687][T22266] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 417.690541][ T363] bridge_slave_1: left allmulticast mode [ 417.696239][ T363] bridge_slave_1: left promiscuous mode [ 417.701943][ T363] bridge0: port 2(bridge_slave_1) entered disabled state [ 417.730992][ T363] bridge_slave_0: left allmulticast mode [ 417.736714][ T363] bridge_slave_0: left promiscuous mode [ 417.742430][ T363] bridge0: port 1(bridge_slave_0) entered disabled state [ 417.977557][ T363] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 417.994680][ T363] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 418.005739][ T363] bond0 (unregistering): Released all slaves [ 418.018386][T22266] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 418.025452][T22266] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 418.051432][T22266] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 418.124692][T22261] hsr_slave_0: entered promiscuous mode [ 418.140410][T22261] hsr_slave_1: entered promiscuous mode [ 418.148111][T22261] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 418.164820][T22261] Cannot create hsr debugfs directory [ 418.178864][ T363] hsr_slave_0: left promiscuous mode [ 418.188797][ T363] hsr_slave_1: left promiscuous mode [ 418.197537][ T363] veth1_macvtap: left promiscuous mode [ 418.203102][ T363] veth0_macvtap: left promiscuous mode [ 418.208664][ T363] veth1_vlan: left promiscuous mode [ 418.213977][ T363] veth0_vlan: left promiscuous mode [ 418.362029][ T363] team0 (unregistering): Port device team_slave_1 removed [ 418.389857][ T363] team0 (unregistering): Port device team_slave_0 removed [ 418.525218][T22266] hsr_slave_0: entered promiscuous mode [ 418.557609][T22266] hsr_slave_1: entered promiscuous mode [ 418.583903][T22266] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 418.591495][T22266] Cannot create hsr debugfs directory [ 418.770152][T22222] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 418.805094][T22222] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 418.834963][T22222] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 418.874998][T22222] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 418.998515][T22222] 8021q: adding VLAN 0 to HW filter on device bond0 [ 419.028418][T22222] 8021q: adding VLAN 0 to HW filter on device team0 [ 419.120872][ T2156] bridge0: port 1(bridge_slave_0) entered blocking state [ 419.127986][ T2156] bridge0: port 1(bridge_slave_0) entered forwarding state [ 419.165367][ T2156] bridge0: port 2(bridge_slave_1) entered blocking state [ 419.172480][ T2156] bridge0: port 2(bridge_slave_1) entered forwarding state [ 419.243818][T22222] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 419.254252][T22222] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 419.298723][T22261] netdevsim netdevsim9 netdevsim0: renamed from eth0 [ 419.329185][T22261] netdevsim netdevsim9 netdevsim1: renamed from eth1 [ 419.374131][T22261] netdevsim netdevsim9 netdevsim2: renamed from eth2 [ 419.419251][T22261] netdevsim netdevsim9 netdevsim3: renamed from eth3 [ 419.529956][T22222] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 419.642618][T22261] 8021q: adding VLAN 0 to HW filter on device bond0 [ 419.669728][T22266] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 419.753307][T22261] 8021q: adding VLAN 0 to HW filter on device team0 [ 419.789105][T22266] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 419.814721][T22266] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 419.851009][ T50] bridge0: port 1(bridge_slave_0) entered blocking state [ 419.858118][ T50] bridge0: port 1(bridge_slave_0) entered forwarding state [ 419.895669][ T50] bridge0: port 2(bridge_slave_1) entered blocking state [ 419.902775][ T50] bridge0: port 2(bridge_slave_1) entered forwarding state [ 419.958749][T22266] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 419.985295][T22261] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 419.995843][T22261] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 420.061830][ T363] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 420.138857][ T363] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 420.234036][ T363] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 420.304056][T22266] 8021q: adding VLAN 0 to HW filter on device bond0 [ 420.356699][ T363] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 420.454251][T22266] 8021q: adding VLAN 0 to HW filter on device team0 [ 420.475459][T22261] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 420.546411][ T28] bridge0: port 1(bridge_slave_0) entered blocking state [ 420.553528][ T28] bridge0: port 1(bridge_slave_0) entered forwarding state [ 420.582958][ T28] bridge0: port 2(bridge_slave_1) entered blocking state [ 420.590083][ T28] bridge0: port 2(bridge_slave_1) entered forwarding state [ 420.638369][T22266] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 420.683931][T22222] veth0_vlan: entered promiscuous mode [ 420.706661][T22222] veth1_vlan: entered promiscuous mode [ 420.732408][ T363] bridge_slave_1: left allmulticast mode [ 420.738261][ T363] bridge_slave_1: left promiscuous mode [ 420.743933][ T363] bridge0: port 2(bridge_slave_1) entered disabled state [ 420.763827][ T363] bridge_slave_0: left allmulticast mode [ 420.769659][ T363] bridge_slave_0: left promiscuous mode [ 420.775497][ T363] bridge0: port 1(bridge_slave_0) entered disabled state [ 420.918483][ T363] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 420.928890][ T363] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 420.940714][ T363] bond0 (unregistering): Released all slaves [ 420.973549][T22222] veth0_macvtap: entered promiscuous mode [ 421.026073][ T363] hsr_slave_0: left promiscuous mode [ 421.051989][ T363] hsr_slave_1: left promiscuous mode [ 421.070599][ T363] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 421.078056][ T363] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 421.097861][ T363] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 421.105460][ T363] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 421.142031][ T363] veth1_macvtap: left promiscuous mode [ 421.147650][ T363] veth0_macvtap: left promiscuous mode [ 421.153247][ T363] veth1_vlan: left promiscuous mode [ 421.158625][ T363] veth0_vlan: left promiscuous mode [ 421.238230][ T363] team0 (unregistering): Port device team_slave_1 removed [ 421.251750][ T363] team0 (unregistering): Port device team_slave_0 removed [ 421.291109][T22222] veth1_macvtap: entered promiscuous mode [ 421.308598][T22266] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 421.363737][T22222] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 421.374288][T22222] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 421.384470][T22222] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 421.395064][T22222] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 421.405145][T22222] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 421.415772][T22222] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 421.429439][T22222] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 421.447841][T22222] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 421.458532][T22222] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 421.468365][T22222] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 421.478911][T22222] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 421.488770][T22222] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 421.499322][T22222] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 421.520694][T22222] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 421.547653][T22261] veth0_vlan: entered promiscuous mode [ 421.555470][T22261] veth1_vlan: entered promiscuous mode [ 421.567005][T22261] veth0_macvtap: entered promiscuous mode [ 421.574118][T22261] veth1_macvtap: entered promiscuous mode [ 421.583651][T22261] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 421.594236][T22261] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 421.604114][T22261] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 421.614587][T22261] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 421.624422][T22261] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 421.634983][T22261] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 421.644856][T22261] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 421.655361][T22261] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 421.665908][T22261] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 421.674339][T22261] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 421.684806][T22261] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 421.694742][T22261] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 421.705190][T22261] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 421.715018][T22261] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 421.725493][T22261] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 421.735335][T22261] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 421.745798][T22261] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 421.756204][T22261] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 421.764614][T22261] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 421.773389][T22261] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 421.782233][T22261] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 421.791022][T22261] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 421.816051][T22222] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 421.824953][T22222] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 421.833807][T22222] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 421.844897][T22222] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 421.964691][T22415] chnl_net:caif_netlink_parms(): no params data found [ 422.112211][T22486] ebtables: ebtables: counters copy to user failed while replacing table [ 422.133843][T22266] veth0_vlan: entered promiscuous mode [ 422.219833][T22415] bridge0: port 1(bridge_slave_0) entered blocking state [ 422.227060][T22415] bridge0: port 1(bridge_slave_0) entered disabled state [ 422.239896][T22415] bridge_slave_0: entered allmulticast mode [ 422.246380][T22415] bridge_slave_0: entered promiscuous mode [ 422.263073][ T29] kauditd_printk_skb: 27 callbacks suppressed [ 422.263089][ T29] audit: type=1326 audit(1734687865.984:15330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22505 comm="syz.9.4904" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82a1055d29 code=0x7ffc0000 [ 422.292932][ T29] audit: type=1326 audit(1734687865.984:15331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22505 comm="syz.9.4904" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82a1055d29 code=0x7ffc0000 [ 422.316725][ T29] audit: type=1326 audit(1734687865.984:15332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22505 comm="syz.9.4904" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f82a1055d29 code=0x7ffc0000 [ 422.340666][ T29] audit: type=1326 audit(1734687865.984:15333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22505 comm="syz.9.4904" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82a1055d29 code=0x7ffc0000 [ 422.364376][ T29] audit: type=1326 audit(1734687865.984:15334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22505 comm="syz.9.4904" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f82a1055d29 code=0x7ffc0000 [ 422.387989][ T29] audit: type=1326 audit(1734687865.984:15335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22505 comm="syz.9.4904" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82a1055d29 code=0x7ffc0000 [ 422.411752][ T29] audit: type=1326 audit(1734687865.984:15336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22505 comm="syz.9.4904" exe="/root/syz-executor" sig=0 arch=c000003e syscall=258 compat=0 ip=0x7f82a1055d29 code=0x7ffc0000 [ 422.435528][ T29] audit: type=1326 audit(1734687865.984:15337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22505 comm="syz.9.4904" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82a1055d29 code=0x7ffc0000 [ 422.459188][ T29] audit: type=1326 audit(1734687865.984:15338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22505 comm="syz.9.4904" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f82a1055d29 code=0x7ffc0000 [ 422.482779][ T29] audit: type=1326 audit(1734687865.984:15339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22505 comm="syz.9.4904" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f82a1055d29 code=0x7ffc0000 [ 422.628425][T22415] bridge0: port 2(bridge_slave_1) entered blocking state [ 422.635979][T22415] bridge0: port 2(bridge_slave_1) entered disabled state [ 422.674509][T22415] bridge_slave_1: entered allmulticast mode [ 422.687455][T22415] bridge_slave_1: entered promiscuous mode [ 422.706987][T22266] veth1_vlan: entered promiscuous mode [ 422.721858][T22526] loop9: detected capacity change from 0 to 128 [ 422.734484][T22526] EXT4-fs: Ignoring removed oldalloc option [ 422.754837][ T363] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 422.792402][T22415] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 422.826203][ T363] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 422.837528][T22526] EXT4-fs (loop9): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 422.872194][T22266] veth0_macvtap: entered promiscuous mode [ 422.907861][T22415] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 422.919655][T22526] ext4 filesystem being mounted at /2/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 422.961855][ T363] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 423.002405][T22266] veth1_macvtap: entered promiscuous mode [ 423.069655][ T363] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 423.125518][T22415] team0: Port device team_slave_0 added [ 423.133096][T22266] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 423.143635][T22266] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 423.153568][T22266] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 423.164101][T22266] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 423.173985][T22266] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 423.184524][T22266] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 423.194488][T22266] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 423.205119][T22266] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 423.215183][T22266] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 423.225659][T22266] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 423.257719][T22266] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 423.290194][T22415] team0: Port device team_slave_1 added [ 423.331844][T22415] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 423.338903][T22415] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 423.364911][T22415] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 423.421163][T22266] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 423.431664][T22266] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 423.441532][T22266] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 423.451989][T22266] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 423.461874][T22266] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 423.472466][T22266] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 423.482327][T22266] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 423.492920][T22266] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 423.502863][T22266] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 423.513682][T22266] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 423.545177][T22266] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 423.563071][T22415] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 423.570132][T22415] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 423.596218][T22415] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 423.640351][T22266] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 423.649161][T22266] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 423.657985][T22266] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 423.666803][T22266] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 423.704256][T22415] hsr_slave_0: entered promiscuous mode [ 423.725996][T22415] hsr_slave_1: entered promiscuous mode [ 423.933924][ T363] bridge_slave_1: left allmulticast mode [ 423.939661][ T363] bridge_slave_1: left promiscuous mode [ 423.945390][ T363] bridge0: port 2(bridge_slave_1) entered disabled state [ 423.961787][ T363] bridge_slave_0: left allmulticast mode [ 423.967512][ T363] bridge_slave_0: left promiscuous mode [ 423.973226][ T363] bridge0: port 1(bridge_slave_0) entered disabled state [ 424.049039][T22261] EXT4-fs (loop9): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 424.090483][ T363] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 424.103577][ T363] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 424.113745][ T363] bond0 (unregistering): Released all slaves [ 424.167837][T22572] loop9: detected capacity change from 0 to 512 [ 424.183680][ T363] tipc: Disabling bearer [ 424.189045][ T363] tipc: Disabling bearer [ 424.200084][ T363] tipc: Left network mode [ 424.225778][T22572] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 424.248981][T22572] ext4 filesystem being mounted at /3/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 424.276499][T22572] netlink: 156 bytes leftover after parsing attributes in process `syz.9.4911'. [ 424.304549][T22580] loop5: detected capacity change from 0 to 2048 [ 424.331592][ T363] hsr_slave_0: left promiscuous mode [ 424.343998][ T363] hsr_slave_1: left promiscuous mode [ 424.350109][ T363] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 424.357652][ T363] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 424.369435][ T363] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 424.376983][ T363] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 424.409926][ T363] veth1_macvtap: left promiscuous mode [ 424.415503][ T363] veth0_macvtap: left promiscuous mode [ 424.421065][ T363] veth1_vlan: left promiscuous mode [ 424.426373][ T363] veth0_vlan: left promiscuous mode [ 424.557443][ T363] team0 (unregistering): Port device team_slave_1 removed [ 424.579572][ T363] team0 (unregistering): Port device team_slave_0 removed [ 424.710985][T22534] chnl_net:caif_netlink_parms(): no params data found [ 424.873666][T22534] bridge0: port 1(bridge_slave_0) entered blocking state [ 424.880906][T22534] bridge0: port 1(bridge_slave_0) entered disabled state [ 424.888155][T22534] bridge_slave_0: entered allmulticast mode [ 424.894841][T22534] bridge_slave_0: entered promiscuous mode [ 424.901566][T22534] bridge0: port 2(bridge_slave_1) entered blocking state [ 424.908763][T22534] bridge0: port 2(bridge_slave_1) entered disabled state [ 424.916038][T22534] bridge_slave_1: entered allmulticast mode [ 424.922820][T22534] bridge_slave_1: entered promiscuous mode [ 424.951150][T22606] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(7) [ 424.957721][T22606] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 424.965394][T22606] vhci_hcd vhci_hcd.0: Device attached [ 424.984994][T22261] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 425.019942][T22607] vhci_hcd: connection closed [ 425.025433][ T123] vhci_hcd: stop threads [ 425.034837][ T123] vhci_hcd: release socket [ 425.039343][ T123] vhci_hcd: disconnect device [ 425.059859][T22534] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 425.070302][T22534] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 425.096418][T22611] loop9: detected capacity change from 0 to 8192 [ 425.103511][T22534] team0: Port device team_slave_0 added [ 425.111042][T22534] team0: Port device team_slave_1 added [ 425.149527][T22534] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 425.156556][T22534] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 425.182671][T22534] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 425.194065][T22611] loop9: p1 p2 < > p3 p4 < p5 > [ 425.199138][T22611] loop9: p1 size 108986237 extends beyond EOD, truncated [ 425.207295][T22611] loop9: p3 size 131072 extends beyond EOD, truncated [ 425.217105][T22611] loop9: p5 size 108986237 extends beyond EOD, truncated [ 425.219842][T22415] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 425.252048][T22415] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 425.286165][T22534] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 425.293205][T22534] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 425.319281][T22534] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 425.347470][T22243] udevd[22243]: inotify_add_watch(7, /dev/loop9p3, 10) failed: No such file or directory [ 425.355942][T22614] udevd[22614]: inotify_add_watch(7, /dev/loop9p5, 10) failed: No such file or directory [ 425.358978][T22246] udevd[22246]: inotify_add_watch(7, /dev/loop9p2, 10) failed: No such file or directory [ 425.368439][T22327] udevd[22327]: inotify_add_watch(7, /dev/loop9p1, 10) failed: No such file or directory [ 425.383549][T22599] udevd[22599]: inotify_add_watch(7, /dev/loop9p4, 10) failed: No such file or directory [ 425.405742][T22415] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 425.419300][T22246] udevd[22246]: inotify_add_watch(7, /dev/loop9p3, 10) failed: No such file or directory [ 425.430936][T22243] udevd[22243]: inotify_add_watch(7, /dev/loop9p4, 10) failed: No such file or directory [ 425.442906][T22534] hsr_slave_0: entered promiscuous mode [ 425.450879][T22599] udevd[22599]: inotify_add_watch(7, /dev/loop9p5, 10) failed: No such file or directory [ 425.461227][T22534] hsr_slave_1: entered promiscuous mode [ 425.467397][T22534] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 425.475015][T22534] Cannot create hsr debugfs directory [ 425.490456][T22415] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 425.528228][T22616] IPVS: stopping master sync thread 22618 ... [ 425.537749][T22618] IPVS: sync thread started: state = MASTER, mcast_ifn = ip6gre0, syncid = 1, id = 0 [ 425.554061][ T36] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 425.657463][ T36] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 425.687187][T22622] wg2: entered promiscuous mode [ 425.692176][T22622] wg2: entered allmulticast mode [ 425.810822][T22627] syz.9.4922[22627] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 425.810923][T22627] syz.9.4922[22627] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 425.822578][T22627] syz.9.4922[22627] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 425.838313][T22627] loop9: detected capacity change from 0 to 128 [ 425.856628][T22627] EXT4-fs: Ignoring removed nomblk_io_submit option [ 425.894300][T22627] EXT4-fs (loop9): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 425.908347][ T36] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 425.922453][T22627] ext4 filesystem being mounted at /9/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 426.040061][T22415] 8021q: adding VLAN 0 to HW filter on device bond0 [ 426.051712][ T36] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 426.114084][T22415] 8021q: adding VLAN 0 to HW filter on device team0 [ 426.133365][ T28] bridge0: port 1(bridge_slave_0) entered blocking state [ 426.140522][ T28] bridge0: port 1(bridge_slave_0) entered forwarding state [ 426.177677][ T28] bridge0: port 2(bridge_slave_1) entered blocking state [ 426.184877][ T28] bridge0: port 2(bridge_slave_1) entered forwarding state [ 426.284136][T22415] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 426.294855][T22415] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 426.383695][T22651] loop5: detected capacity change from 0 to 512 [ 426.439491][T22651] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 426.478632][ T36] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 426.487468][T22651] ext4 filesystem being mounted at /7/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 426.518582][ T36] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 426.531879][ T36] bond0 (unregistering): Released all slaves [ 426.571208][T22651] netlink: 'syz.5.4924': attribute type 4 has an invalid length. [ 426.579118][T22651] netlink: 3657 bytes leftover after parsing attributes in process `syz.5.4924'. [ 426.622939][ T36] hsr_slave_0: left promiscuous mode [ 426.632928][ T36] hsr_slave_1: left promiscuous mode [ 426.653460][ T36] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 426.660995][ T36] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 426.714653][ T36] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 426.722109][ T36] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 426.731676][ T36] veth1_macvtap: left promiscuous mode [ 426.737263][ T36] veth0_macvtap: left promiscuous mode [ 426.742908][ T36] veth1_vlan: left promiscuous mode [ 426.748208][ T36] veth0_vlan: left promiscuous mode [ 426.782256][T22651] syz.5.4924 (22651) used greatest stack depth: 9328 bytes left [ 426.811157][T22266] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 426.848395][ T36] team0 (unregistering): Port device team_slave_1 removed [ 426.863483][T22668] slcan: can't register candev [ 426.864872][T22673] loop5: detected capacity change from 0 to 164 [ 426.879376][ T36] team0 (unregistering): Port device team_slave_0 removed [ 426.897811][T22673] syz.5.4926: attempt to access beyond end of device [ 426.897811][T22673] loop5: rw=524288, sector=263328, nr_sectors = 4 limit=164 [ 426.913840][T22261] EXT4-fs (loop9): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 426.925444][T22673] syz.5.4926: attempt to access beyond end of device [ 426.925444][T22673] loop5: rw=0, sector=263328, nr_sectors = 4 limit=164 [ 426.952984][T22415] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 426.971022][T22677] loop9: detected capacity change from 0 to 164 [ 426.980852][T22534] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 427.011657][T22534] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 427.040761][T22534] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 427.058376][ T29] kauditd_printk_skb: 225 callbacks suppressed [ 427.058391][ T29] audit: type=1400 audit(1734687871.025:15565): avc: denied { read } for pid=2985 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 427.086829][ T29] audit: type=1400 audit(1734687871.025:15566): avc: denied { search } for pid=2985 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 427.108581][ T29] audit: type=1400 audit(1734687871.025:15567): avc: denied { open } for pid=2985 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 427.131525][ T29] audit: type=1400 audit(1734687871.025:15568): avc: denied { getattr } for pid=2985 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 427.203489][T22534] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 427.296632][ T29] audit: type=1400 audit(1734687871.025:15569): avc: denied { unmount } for pid=22266 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:iso9660_t tclass=filesystem permissive=1 [ 427.301119][T22694] loop5: detected capacity change from 0 to 164 [ 427.317000][ T29] audit: type=1400 audit(1734687871.141:15570): avc: denied { read } for pid=22681 comm="sed" name="eth0.dhcp" dev="tmpfs" ino=441 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 427.317033][ T29] audit: type=1400 audit(1734687871.141:15571): avc: denied { open } for pid=22681 comm="sed" path="/run/dhcpcd/hook-state/resolv.conf/eth0.dhcp" dev="tmpfs" ino=441 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 427.333165][T22534] 8021q: adding VLAN 0 to HW filter on device bond0 [ 427.345521][ T29] audit: type=1326 audit(1734687871.162:15572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22682 comm="syz.5.4928" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa2781a5d29 code=0x7ffc0000 [ 427.401091][ T29] audit: type=1326 audit(1734687871.162:15573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22682 comm="syz.5.4928" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa2781a5d29 code=0x7ffc0000 [ 427.424825][ T29] audit: type=1326 audit(1734687871.162:15574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22682 comm="syz.5.4928" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fa2781a5d29 code=0x7ffc0000 [ 427.440855][T22534] 8021q: adding VLAN 0 to HW filter on device team0 [ 427.477763][ T2222] bridge0: port 1(bridge_slave_0) entered blocking state [ 427.484865][ T2222] bridge0: port 1(bridge_slave_0) entered forwarding state [ 427.518473][ T2222] bridge0: port 2(bridge_slave_1) entered blocking state [ 427.525644][ T2222] bridge0: port 2(bridge_slave_1) entered forwarding state [ 427.584671][T22534] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 427.601604][T22677] syz.9.4927: attempt to access beyond end of device [ 427.601604][T22677] loop9: rw=524288, sector=263328, nr_sectors = 4 limit=164 [ 427.639688][T22415] veth0_vlan: entered promiscuous mode [ 427.667236][T22677] syz.9.4927: attempt to access beyond end of device [ 427.667236][T22677] loop9: rw=0, sector=263328, nr_sectors = 4 limit=164 [ 427.688658][T22415] veth1_vlan: entered promiscuous mode [ 427.722383][T22415] veth0_macvtap: entered promiscuous mode [ 427.775335][T22714] syz.5.4929: attempt to access beyond end of device [ 427.775335][T22714] loop5: rw=524288, sector=263328, nr_sectors = 4 limit=164 [ 427.803025][T22415] veth1_macvtap: entered promiscuous mode [ 427.803029][T22714] syz.5.4929: attempt to access beyond end of device [ 427.803029][T22714] loop5: rw=0, sector=263328, nr_sectors = 4 limit=164 [ 427.889480][T22534] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 427.929040][T22415] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 427.939791][T22415] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 427.949723][T22415] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 427.949804][ T2992] ================================================================== [ 427.960279][T22415] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 427.968332][ T2992] BUG: KCSAN: data-race in _prb_read_valid / prb_reserve [ 427.968371][ T2992] [ 427.968378][ T2992] write to 0xffffffff866af7e8 of 8 bytes by task 22415 on cpu 0: [ 427.968396][ T2992] prb_reserve+0x740/0xb60 [ 427.968420][ T2992] vprintk_store+0x558/0x870 [ 427.968446][ T2992] vprintk_emit+0x15e/0x680 [ 427.968472][ T2992] vprintk_default+0x26/0x30 [ 427.968502][ T2992] vprintk+0x75/0x80 [ 427.968520][ T2992] _printk+0x7a/0xa0 [ 427.968541][ T2992] batadv_check_known_mac_addr+0x147/0x180 [ 427.968578][ T2992] batadv_hard_if_event+0x4b9/0xfb0 [ 427.968613][ T2992] raw_notifier_call_chain+0x6f/0x1d0 [ 427.968651][ T2992] call_netdevice_notifiers_info+0xae/0x100 [ 427.968684][ T2992] dev_set_mac_address+0x1ff/0x260 [ 427.968719][ T2992] dev_set_mac_address_user+0x31/0x50 [ 427.968756][ T2992] do_setlink+0x3ec/0x22c0 [ 427.968782][ T2992] rtnl_newlink+0xde9/0x1250 [ 427.968806][ T2992] rtnetlink_rcv_msg+0x651/0x710 [ 427.968830][ T2992] netlink_rcv_skb+0x12c/0x230 [ 427.968857][ T2992] rtnetlink_rcv+0x1c/0x30 [ 427.968881][ T2992] netlink_unicast+0x599/0x670 [ 427.968900][ T2992] netlink_sendmsg+0x5cc/0x6e0 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 427.968924][ T2992] __sock_sendmsg+0x140/0x180 [ 427.968952][ T2992] __sys_sendto+0x1a8/0x230 [ 427.978887][T22415] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 427.985834][ T2992] __x64_sys_sendto+0x78/0x90 [ 427.985862][ T2992] x64_sys_call+0x29fa/0x2dc0 [ 427.988186][T22415] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 427.995884][ T2992] do_syscall_64+0xc9/0x1c0 [ 427.995911][ T2992] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 427.995950][ T2992] [ 427.995957][ T2992] read to 0xffffffff866af7e8 of 8 bytes by task 2992 on cpu 1: [ 427.995975][ T2992] _prb_read_valid+0x1ec/0xba0 [ 427.996001][ T2992] prb_read_valid+0x3d/0x60 [ 428.000451][T22415] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 428.004980][ T2992] syslog_print+0x26f/0x760 [ 428.009593][T22415] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 428.014139][ T2992] do_syslog+0x3a1/0x7f0 [ 428.033676][T22415] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 428.038548][ T2992] __x64_sys_syslog+0x43/0x50 [ 428.038584][ T2992] x64_sys_call+0x29be/0x2dc0 [ 428.038607][ T2992] do_syscall_64+0xc9/0x1c0 [ 428.038628][ T2992] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 428.038668][ T2992] [ 428.038673][ T2992] value changed: 0x00000000000004ff -> 0x0000000000000000 [ 428.038687][ T2992] [ 428.038691][ T2992] Reported by Kernel Concurrency Sanitizer on: [ 428.038700][ T2992] CPU: 1 UID: 0 PID: 2992 Comm: klogd Not tainted 6.13.0-rc3-syzkaller-00136-g8faabc041a00 #0 [ 428.038730][ T2992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 [ 428.038746][ T2992] ================================================================== [ 428.046276][T22415] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 428.270724][T22415] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 428.280833][T22415] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 428.291520][T22415] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 428.301366][T22415] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 428.311877][T22415] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 428.321726][T22415] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 428.332191][T22415] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 428.357680][T22415] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 428.553659][ T36] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 428.651782][ T36] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 428.689468][ T36] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 428.756214][ T36] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 428.850702][ T36] bridge_slave_1: left allmulticast mode [ 428.856493][ T36] bridge_slave_1: left promiscuous mode [ 428.862265][ T36] bridge0: port 2(bridge_slave_1) entered disabled state [ 428.871182][ T36] bridge_slave_0: left allmulticast mode [ 428.876915][ T36] bridge_slave_0: left promiscuous mode [ 428.882616][ T36] bridge0: port 1(bridge_slave_0) entered disabled state [ 428.983362][ T36] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 428.993361][ T36] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 429.003006][ T36] bond0 (unregistering): Released all slaves [ 429.052743][ T36] hsr_slave_0: left promiscuous mode [ 429.059893][ T36] hsr_slave_1: left promiscuous mode [ 429.065676][ T36] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 429.073249][ T36] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 429.082967][ T36] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 429.090519][ T36] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 429.104609][ T36] veth1_macvtap: left promiscuous mode [ 429.110125][ T36] veth0_macvtap: left promiscuous mode [ 429.115864][ T36] veth1_vlan: left promiscuous mode [ 429.121231][ T36] veth0_vlan: left promiscuous mode [ 429.256559][ T36] team0 (unregistering): Port device team_slave_1 removed [ 429.267176][ T36] team0 (unregistering): Port device team_slave_0 removed [ 430.849475][ T36] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 430.887315][ T36] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 430.935457][ T36] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 430.973108][ T36] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 431.043117][ T36] netdevsim netdevsim9 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 431.079453][ T36] netdevsim netdevsim9 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 431.125476][ T36] netdevsim netdevsim9 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 431.182961][ T36] netdevsim netdevsim9 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 431.252052][ T36] bridge_slave_1: left allmulticast mode [ 431.257774][ T36] bridge_slave_1: left promiscuous mode [ 431.263471][ T36] bridge0: port 2(bridge_slave_1) entered disabled state [ 431.271721][ T36] bridge_slave_0: left allmulticast mode [ 431.277453][ T36] bridge_slave_0: left promiscuous mode [ 431.283096][ T36] bridge0: port 1(bridge_slave_0) entered disabled state [ 431.291342][ T36] bridge_slave_1: left allmulticast mode [ 431.297055][ T36] bridge_slave_1: left promiscuous mode [ 431.302685][ T36] bridge0: port 2(bridge_slave_1) entered disabled state [ 431.310647][ T36] bridge_slave_0: left allmulticast mode [ 431.316410][ T36] bridge_slave_0: left promiscuous mode [ 431.322082][ T36] bridge0: port 1(bridge_slave_0) entered disabled state [ 431.330213][ T36] bridge_slave_1: left allmulticast mode [ 431.335898][ T36] bridge_slave_1: left promiscuous mode [ 431.341534][ T36] bridge0: port 2(bridge_slave_1) entered disabled state [ 431.349451][ T36] bridge_slave_0: left allmulticast mode [ 431.355133][ T36] bridge_slave_0: left promiscuous mode [ 431.360847][ T36] bridge0: port 1(bridge_slave_0) entered disabled state [ 431.368959][ T36] bridge_slave_1: left allmulticast mode [ 431.374650][ T36] bridge_slave_1: left promiscuous mode [ 431.380451][ T36] bridge0: port 2(bridge_slave_1) entered disabled state [ 431.388119][ T36] bridge_slave_0: left allmulticast mode [ 431.393922][ T36] bridge_slave_0: left promiscuous mode [ 431.399590][ T36] bridge0: port 1(bridge_slave_0) entered disabled state [ 431.744338][ T36] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 431.754237][ T36] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 431.763814][ T36] bond0 (unregistering): Released all slaves [ 431.772930][ T36] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 431.782822][ T36] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 431.792545][ T36] bond0 (unregistering): Released all slaves [ 431.801330][ T36] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 431.811066][ T36] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 431.820764][ T36] bond0 (unregistering): Released all slaves [ 431.829770][ T36] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 431.839823][ T36] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 431.849560][ T36] bond0 (unregistering): Released all slaves [ 431.921384][ T36] hsr_slave_0: left promiscuous mode [ 431.928133][ T36] hsr_slave_1: left promiscuous mode [ 431.934187][ T36] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 431.942296][ T36] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 431.952211][ T36] hsr_slave_0: left promiscuous mode [ 431.957873][ T36] hsr_slave_1: left promiscuous mode [ 431.964037][ T36] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 431.971669][ T36] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 431.979384][ T36] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 431.986930][ T36] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 431.996790][ T36] hsr_slave_0: left promiscuous mode [ 432.003646][ T36] hsr_slave_1: left promiscuous mode [ 432.009700][ T36] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 432.017164][ T36] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 432.026186][ T36] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 432.033710][ T36] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 432.044205][ T36] hsr_slave_0: left promiscuous mode [ 432.050086][ T36] hsr_slave_1: left promiscuous mode [ 432.055725][ T36] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 432.063220][ T36] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 432.072020][ T36] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 432.079593][ T36] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 432.095193][ T36] veth1_macvtap: left promiscuous mode [ 432.100715][ T36] veth0_macvtap: left promiscuous mode [ 432.106319][ T36] veth1_vlan: left promiscuous mode [ 432.111569][ T36] veth0_vlan: left promiscuous mode [ 432.117219][ T36] veth1_macvtap: left promiscuous mode [ 432.122752][ T36] veth0_macvtap: left promiscuous mode [ 432.128370][ T36] veth1_vlan: left promiscuous mode [ 432.133669][ T36] veth0_vlan: left promiscuous mode [ 432.139585][ T36] veth1_macvtap: left promiscuous mode [ 432.145150][ T36] veth0_macvtap: left promiscuous mode [ 432.150673][ T36] veth1_vlan: left promiscuous mode [ 432.156085][ T36] veth0_vlan: left promiscuous mode [ 432.295931][ T36] team0 (unregistering): Port device team_slave_1 removed [ 432.305865][ T36] team0 (unregistering): Port device team_slave_0 removed [ 432.356027][ T36] team0 (unregistering): Port device team_slave_1 removed [ 432.365698][ T36] team0 (unregistering): Port device team_slave_0 removed [ 432.416686][ T36] team0 (unregistering): Port device team_slave_1 removed [ 432.426259][ T36] team0 (unregistering): Port device team_slave_0 removed [ 432.478420][ T36] team0 (unregistering): Port device team_slave_1 removed [ 432.488248][ T36] team0 (unregistering): Port device team_slave_0 removed [ 433.079649][ T29] kauditd_printk_skb: 36 callbacks suppressed [ 433.079668][ T29] audit: type=1400 audit(1734687877.348:15611): avc: denied { sys_chroot } for pid=23191 comm="dhcpcd" capability=18 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 433.110399][ T29] audit: type=1400 audit(1734687877.348:15612): avc: denied { setgid } for pid=23191 comm="dhcpcd" capability=6 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 433.131485][ T29] audit: type=1400 audit(1734687877.348:15613): avc: denied { setuid } for pid=23191 comm="dhcpcd" capability=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=capability permissive=1 [ 433.152600][ T29] audit: type=1400 audit(1734687877.348:15614): avc: denied { setrlimit } for pid=23191 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=process permissive=1