last executing test programs: 5m27.224037648s ago: executing program 0 (id=121): syz_open_dev$vcsu(&(0x7f0000000000), 0x800, 0x20040) 5m27.223127988s ago: executing program 0 (id=122): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x80, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r0}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x6f) write$binfmt_elf64(r1, &(0x7f0000000ac0)=ANY=[@ANYBLOB="7f454c4600000006010000000000000003003e000000000003000000000000004000000000000000980100000000000002000000000038000200000002000000000000600300000008000000000000000d0000f0ffffffffec08000000000000f0ffffffffffffff0000000000000000080000000000000003000000cff5ffff800300000000000001000000000000000500000000000000ff"], 0x5b0) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0) 5m27.13125036s ago: executing program 0 (id=124): bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340), 0xffffffffffffffff) socket$inet(0x2, 0x1, 0xfffffffe) connect$unix(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) creat(&(0x7f0000000000)='./bus\x00', 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x700, 0x0, [@sadb_key={0x2, 0x9, 0x18, 0x0, "e9255b"}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @private}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xd}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0xfbff, @in={0x2, 0x0, @dev}}]}, 0x60}, 0x1, 0x7}, 0x0) 5m26.728285656s ago: executing program 0 (id=134): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x70, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0xa, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x63, 0x0, 0x0, 0x10, 0x100c93a, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xe0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000100)=[0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0], 0x0, 0xc2, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000200), &(0x7f0000000380), 0x8, 0x98, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) flock(r2, 0x1) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x20, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x5, '\x00', r1, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='kmem_cache_free\x00', r3, 0x0, 0x2}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000003200)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$key(0xf, 0x3, 0x2) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000240)='./file2\x00', 0x0, &(0x7f0000000080)={[{@discard}]}, 0xc1, 0x7b7, &(0x7f0000000f80)="$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") r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x12, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000005000000000000000200000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000ef4b00008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r5, @ANYBLOB="00000000000000008500000075000000bf91000000000000b7020000010000008500000085000000b70000000000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r6}, 0x10) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='hugetlbfs\x00', 0x0, 0x0) dup3(r5, r2, 0x0) mount$tmpfs(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1230023, 0x0) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000280)='./file1\x00', 0x10c42, &(0x7f0000000d80)=ANY=[@ANYBLOB="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"/797], 0x1, 0x27a, &(0x7f0000000540)="$eJzs3DFrE38cx/FP0/zbNKVNhr+CgvhFF12ONj4ACdKCGFBqI+ogXO1FQ85cyYVKRGw3FwcfR3F0E9Qn0MXN3a2L4FJQjCRNTdKmitr0onm/oHff5pdP8rvkEr53kNu6+fxBqRA6BbeqWMIUk9a1LaUbVctIax1r1mPqtK7zk5/en7p+6/aVbC43t2A2n128kDGz6dOvHz5+ceZtdfLGy+lX49pM39n6mPmweXzzxNbXxfvF0IqhlYOqubYUBFV3yfdsuRiWHLNrvueGnhXLoVfpGi/4wcpKzdzy8lRypeKFobnlmpW8mlUDq1Zq5t5zi2VzHMemksLP5DcWFtxs1LNA38Qbi0ol645Kmtg3nN+IYlIAACBanf2/Bq7/b3QtP+7/1+n//wD9/zBo9P/J1ue3G/0/AAAAAAAAAAAAAAAAAAAAAAB/g+16PVWv11O7692/cUkJSbv/Rz1P9Afv/3Dr+OFeQvKfruZX85I/0lg2ZAsqypenGaX0pbk/tOzU85dzczPWlNYbf62VX1vNj3bnZ5VSund+didv3fn/lOzMZ5TS/73zmZ75MZ0725F3lNK7uwrka7m5X7fzT2bNLl3N7clPNO8HAAAAAMC/wLHveh6/O85B4zv5Xzg/sOf4Oq6T8Wi3HQAAAACAYRHWHpVc3/cq0RSfWycLIp7GgBfHJP1W/GLHVV/bQ/F9txx28SwYlJduAIuEpEN9wAn1Y6oRfikBAAAA6It20x/1TAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGF5HccGzA546dsSbCgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAETuWwAAAP//AmwlzQ==") r7 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0x105042, 0x189) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x17fffff, 0x4012011, r7, 0x1000) open(&(0x7f00000002c0)='./file2\x00', 0x189242, 0x0) r8 = socket(0x200000100000011, 0x803, 0x0) setsockopt$packet_int(r8, 0x107, 0x17, &(0x7f00000000c0)=0x7f, 0x4) r9 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r9, 0x401c5820, &(0x7f0000000600)={0x23e3, 0x0, 0xd, 0x2}) sendmsg$key(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="020900000700000000000000000000000500", @ANYRES32], 0x38}}, 0x0) 5m26.412321141s ago: executing program 0 (id=141): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, &(0x7f0000000600)}) r1 = syz_io_uring_setup(0x74d, &(0x7f0000000100)={0x0, 0x59c4, 0x8, 0x1000, 0x5cc}, &(0x7f0000000300)=0x0, &(0x7f0000000080)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) readv(0xffffffffffffffff, &(0x7f0000000600)=[{0x0}, {&(0x7f0000000240)=""/108, 0x6c}], 0x2) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x30, 0x4, 0x0, 0x2}]}, 0xffffffffffffff0e) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_ACCEPT={0xd, 0x4, 0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x81800, 0x1}) io_uring_enter(r1, 0x749f, 0x4, 0x0, 0x0, 0xfffffffffffffef5) 5m24.63617138s ago: executing program 0 (id=167): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x2000009e, &(0x7f00000005c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socket$nl_netfilter(0x10, 0x3, 0xc) prlimit64(0x0, 0xe, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101301) ioctl$USBDEVFS_CLEAR_HALT(r0, 0xc0105502, 0x0) ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, &(0x7f0000000080)=0x14) unshare(0x62040200) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='kfree\x00', r2, 0x0, 0xfffffffffffffffd}, 0x18) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000c80)={'ip6gre0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000001240)=@newqdisc={0x45c, 0x24, 0x4ee4e6a52ff56541, 0x70bd28, 0x4000000, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_RTAB={0x404, 0x2, [0x1, 0x0, 0x1fc, 0x0, 0xfffffc80, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3f, 0x0, 0x0, 0x2, 0xffffffff, 0x2, 0xc00, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1000, 0xfffffffc, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xbab, 0x0, 0x272, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffc, 0x3, 0x0, 0x0, 0x0, 0xb97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5e, 0xfffffffc, 0x8, 0x0, 0x0, 0x400000, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xd79, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x100, 0x0, 0x8, 0xfffffffd, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, @TCA_TBF_PARMS={0x28, 0x1, {{0x1, 0x0, 0x0, 0x0, 0xfffc, 0x6}, {0xff}, 0x0, 0x7f}}]}}]}, 0x45c}}, 0x0) close(0xffffffffffffffff) r5 = io_uring_setup(0x192, &(0x7f0000000300)={0x0, 0x4178, 0x400, 0x8000002, 0x3d7}) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010600000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff1b000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}}, 0x0) close_range(r5, 0xffffffffffffffff, 0x0) 5m24.63573669s ago: executing program 32 (id=167): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x2000009e, &(0x7f00000005c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socket$nl_netfilter(0x10, 0x3, 0xc) prlimit64(0x0, 0xe, 0x0, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101301) ioctl$USBDEVFS_CLEAR_HALT(r0, 0xc0105502, 0x0) ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, &(0x7f0000000080)=0x14) unshare(0x62040200) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='kfree\x00', r2, 0x0, 0xfffffffffffffffd}, 0x18) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000c80)={'ip6gre0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000001240)=@newqdisc={0x45c, 0x24, 0x4ee4e6a52ff56541, 0x70bd28, 0x4000000, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_RTAB={0x404, 0x2, [0x1, 0x0, 0x1fc, 0x0, 0xfffffc80, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3f, 0x0, 0x0, 0x2, 0xffffffff, 0x2, 0xc00, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1000, 0xfffffffc, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xbab, 0x0, 0x272, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffc, 0x3, 0x0, 0x0, 0x0, 0xb97, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5e, 0xfffffffc, 0x8, 0x0, 0x0, 0x400000, 0x7, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xb3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0xd79, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x100, 0x0, 0x8, 0xfffffffd, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, @TCA_TBF_PARMS={0x28, 0x1, {{0x1, 0x0, 0x0, 0x0, 0xfffc, 0x6}, {0xff}, 0x0, 0x7f}}]}}]}, 0x45c}}, 0x0) close(0xffffffffffffffff) r5 = io_uring_setup(0x192, &(0x7f0000000300)={0x0, 0x4178, 0x400, 0x8000002, 0x3d7}) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010600000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff1b000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}}, 0x0) close_range(r5, 0xffffffffffffffff, 0x0) 2m48.522450898s ago: executing program 4 (id=3341): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000006c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000400)='io_uring_create\x00', r2}, 0x18) io_uring_setup(0x1de0, &(0x7f0000001e00)={0x0, 0x8ec5}) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f00000000c0)='%pI4 \x00'}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='rxrpc_recvmsg\x00', r4}, 0x18) r5 = socket$kcm(0x21, 0x2, 0x2) recvmsg$kcm(r5, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000080000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000a3850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r6}, 0x10) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='setgroups\x00') close_range(r7, 0xffffffffffffffff, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r8, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2d}}, 0x10) connect$pppoe(r3, &(0x7f0000000080)={0x18, 0x0, {0x1, @random="40d06fb3f396", 'pimreg0\x00'}}, 0x1e) sendmmsg$inet(r8, &(0x7f0000000600)=[{{&(0x7f0000000040)={0x2, 0x4e22, @multicast1}, 0x10, 0x0}}], 0x1, 0x240080a0) sendmmsg$inet(r8, &(0x7f0000003500)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=ANY=[], 0x98}}], 0x1, 0x40012) 2m48.477285198s ago: executing program 4 (id=3343): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fa540000850000008200000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000200), 0x261540) creat(&(0x7f00000000c0)='./file0\x00', 0x48) umount2(&(0x7f0000000140)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r6 = dup(r5) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000000)=0xc) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000004380), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, r8}}], [], 0x6b}}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r3, 0x40a85321, &(0x7f0000000680)={{0x27}, 'port1\x00', 0x90, 0x10, 0x0, 0x1, 0x8, 0x709e, 0x101, 0x0, 0x1, 0x3}) r9 = socket$inet6_sctp(0xa, 0x1, 0x84) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r10}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r10, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000180)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) setsockopt(r9, 0x84, 0x81, &(0x7f0000000280)="1a00000002000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x401, @loopback}], 0x1c) sendto$inet6(r9, &(0x7f0000000100)="b8", 0xffe0, 0x2000c851, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback, 0xffffffff}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r9, 0x84, 0x17, &(0x7f0000000440)=ANY=[], 0x9) 2m48.363107991s ago: executing program 4 (id=3348): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000008c0)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@empty, @in=@loopback, 0x10, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x5e}, {@in6=@loopback, 0x4d4, 0x32}, @in=@dev={0xac, 0x14, 0x14, 0x3a}, {0xfffffffffffffffd, 0x400000000000000, 0x0, 0x0, 0x20000000080ff}, {0x0, 0x200000000, 0x0, 0x100000}, {}, 0x1, 0x0, 0x2, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}, 0x1, 0x0, 0x0, 0x20000011}, 0x0) 2m48.309061652s ago: executing program 4 (id=3349): r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req={0x3fc, 0x2, 0x0, 0x5}, 0x10) r1 = socket(0x1e, 0x4, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, @fallback=0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="06517dc2e6ea"}) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000400)={'gretap0\x00', &(0x7f00000003c0)={'gre0\x00', 0x0, 0x80, 0x7800, 0x3ff, 0x8, {{0x6, 0x4, 0x0, 0x13, 0x18, 0x68, 0x0, 0x5, 0x2f, 0x0, @local, @multicast1, {[@noop]}}}}}) r6 = creat(&(0x7f00000000c0)='./file0\x00', 0x1f4) r7 = dup2(r6, r6) ioctl$BLKTRACESETUP(r7, 0x1276, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x7, &(0x7f0000000280)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', r5, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r8}, 0x10) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$nl_route(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 2m48.305312822s ago: executing program 4 (id=3360): r0 = getegid() syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000140)='./file1\x00', 0x200000, &(0x7f0000000180)={[{@noblock_validity}, {@dioread_nolock}, {@sysvgroups}, {@norecovery}, {@resgid={'resgid', 0x3d, r0}}, {@noblock_validity}, {@nogrpid}, {@mb_optimize_scan}, {@nomblk_io_submit}]}, 0x3, 0x576, &(0x7f0000000400)="$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") r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) r3 = syz_open_dev$usbfs(&(0x7f0000000180), 0x205, 0x2581) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$USBDEVFS_SUBMITURB(r4, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0x80, 0x0, 0x0, 0x0, 0x7995}, 0xfff7, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x0}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000002c0)=0x20) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) rename(&(0x7f0000000340)='./file0/file0\x00', &(0x7f00000003c0)='./file1\x00') 2m47.983142657s ago: executing program 4 (id=3353): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='writeback_bdi_register\x00', r3}, 0x10) r4 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB="0000de050a49fcaa740425a4de1b08b743ca24"]) 2m32.976712781s ago: executing program 33 (id=3353): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='writeback_bdi_register\x00', r3}, 0x10) r4 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB="0000de050a49fcaa740425a4de1b08b743ca24"]) 1m53.845809458s ago: executing program 5 (id=4388): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000400)='kfree\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket(0x400000000010, 0x3, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2d, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000bc0)=@newtfilter={0x34, 0x2c, 0xd27, 0x70bd24, 0x25dfdbfc, {0x0, 0x0, 0x0, r4, {0x11, 0xd}, {}, {0x7, 0xf}}, [@filter_kind_options=@f_flower={{0xb}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x8848}, 0x20004804) 1m53.72439477s ago: executing program 5 (id=4390): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000040000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={0x0, 0x8}, 0x2, 0xffffffff, 0x6, 0x2, 0x4, 0x5, 0xfff9, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0xb) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000e8ff0000000000ff000044850000000e0000003f0000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_usb_connect(0x5, 0x24, &(0x7f0000000200)={{0x12, 0x1, 0x310, 0xd4, 0xcd, 0x21, 0x20, 0x2040, 0x721f, 0x626a, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x49, 0x40, 0x20, 0xc4, [{{0x9, 0x4, 0x65, 0x4e, 0x0, 0xb, 0x6c, 0x2, 0x6}}]}}]}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x600a, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r4}, 0x10) open_tree(0xffffffffffffff9c, &(0x7f0000000600)='./file0\x00', 0x81801) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000340)='kfree\x00', r0}, 0x18) inotify_init1(0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x48) sendmsg$ETHTOOL_MSG_COALESCE_SET(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="010000000ba6000000001400000008000f00fc00000018000180140002006e657464657673696d300000000000000800060000fcffff08000900fc000000080011000700000008000e00800000000800", @ANYRES64=r7], 0x5c}, 0x1, 0x0, 0x0, 0x4000800}, 0x88010) 1m52.892420273s ago: executing program 5 (id=4398): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='rxrpc_recvmsg\x00', r1}, 0x18) r2 = socket$kcm(0x21, 0x2, 0x2) recvmsg$kcm(r2, &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) 1m52.788882435s ago: executing program 5 (id=4400): r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000240)='./file2\x00', 0x0, &(0x7f0000000140), 0xc1, 0x7c1, &(0x7f0000000f80)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file2\x00', 0x143042, 0x0) sendfile(r1, r1, 0x0, 0x7a680000) ioctl$EXT4_IOC_MOVE_EXT(r1, 0x40305829, &(0x7f0000000100)={0x17c04, r0, 0x10000, 0x2200003, 0x3, 0x2000003}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x8000, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x6, @perf_config_ext={0x3, 0x9}, 0x1100, 0x5, 0x3a65, 0x5, 0x0, 0x5, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f0000000000)={0x6, 'veth1_to_bridge\x00', {0x2}, 0x101}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r2, 0x8982, &(0x7f00000023c0)={0x0, 'ip6tnl0\x00', {0x4}, 0x2b1}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000001000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x6, 0x8, 0xae, 0x0, 0x1, 0x20727ff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0d00000002000000040000000640000005000000", @ANYRES32=r3, @ANYBLOB="00005b9002be00"/31, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="030000000000000800"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x10000000, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r4) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) ptrace(0x10, r4) rt_tgsigqueueinfo(r4, r4, 0x15, &(0x7f0000000240)={0x29, 0x7, 0xffffffd2}) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2000006, 0x31, 0xffffffffffffffff, 0xd0fb6000) r5 = openat$sysfs(0xffffff9c, &(0x7f00000037c0)='/sys/kernel/notes', 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r5, 0x0, &(0x7f0000000600)=[{&(0x7f0000001800)=""/216, 0xd8}], 0x1}) io_uring_enter(0xffffffffffffffff, 0x847ba, 0x2000, 0xe, 0x0, 0x0) ptrace$peeksig(0x4209, r4, &(0x7f0000000140)={0x1, 0x0, 0x3}, &(0x7f00000004c0)=[{}, {}, {}]) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x68, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r6, 0x0, 0x8}, 0x18) r7 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_msfilter(r7, 0x0, 0x29, 0x0, 0x1c) r8 = socket$kcm(0x10, 0x2, 0x0) recvmsg(r8, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) 1m51.304260599s ago: executing program 5 (id=4415): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010007000000000000000000000a20000000020a03000000000000000000010000000900010073797a30000000003c000000090a010400000000000000000100000008000a40000000020900020073797a32000000000900010073797a3000000000080005400000001f5c0000000e0a01020000000000000000010000000900020073797a32000000000900010073797a3000000000300003802c00008028000180230001"], 0xe0}}, 0x0) 1m48.011451373s ago: executing program 5 (id=4483): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x503, 0x70bd29, 0xf0, {0x0, 0x0, 0x0, 0x0, 0x115, 0x2081}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_PACKETS_PER_SLAVE={0x8, 0x14, 0x9}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) 1m47.952610544s ago: executing program 34 (id=4483): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x503, 0x70bd29, 0xf0, {0x0, 0x0, 0x0, 0x0, 0x115, 0x2081}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_PACKETS_PER_SLAVE={0x8, 0x14, 0x9}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) 1m40.583511874s ago: executing program 1 (id=4576): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000740)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x2}}, [@NFT_MSG_DELOBJ={0x28c, 0x14, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x7}, [@NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x5}, @NFTA_OBJ_USERDATA={0xfa, 0x8, "a4d5119423dfdf6e25cff2b9e9fec88e5e2000b670d93c7adfaa6e4c9e131462df1791dac342b3d1172b44d7575734286b46d759df2257cc3c92c2d0e20ac70a40a8ef56ed92d227afab2b7e16d64fa9e7ececaa1fd2f9e44091f23099020ef935db9fd48abac21e41a745a7a4b532138b614ddabf715c1c5a1462e2f27072c24b93c29fccb823f27bd90b1ff1ba642b765238f5cfc23cbda4fce6c64794059ba325842befa52ed7abb2c6fb29c749a9b08f292c10686bc9ae9cbe81c7ab3127fc762b22c20de2403483aa03d7803dd3206e2ad0ae779b3d4e83a4eb40101b2263dca77e83fe51da1c06e11014eb5df525e14266f627"}, @NFTA_OBJ_USERDATA={0x67, 0x8, "11d1b4a69ba8ba5960207ed87a29f14a489a3958d24a6fcf5c646e46f6603285297376bb284d89d8fa8ff82db856d15ef93d24ae0f97d53a0fea211e6043d259b4d8cdb028760e63f21ac528eeca2492235d6f4f011b7b9cd36195dc9e48b08b801937"}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x3}, @NFTA_OBJ_USERDATA={0xfc, 0x8, "3a840d79d6a0c313eec0d4b3abb7629d89e93ce128958a6a76a5d62a6574d8e0ebbd14c556a8dd1922835d13b174c94483fbf8db6b8cee8053446e05add7469916f17a5784f55093bedaf15218ac3409f069f928e290fbc2916169fd05efeb802498d3c56de43fa1773bc38a15d277f0426cde8cd2a34afb30e66087716b298bb74907e5596c39b26bb781b636e8755cc10b82a9ed137b32ff0630db53c65be3bc8b5ec9d965434ab30f7ea8d81e4bad0b28ef8c7f9dad9255947a7c73d594285353ce142267329d49f8b6c3907bee1ba43b4f188a18d365cf8680b2d6e1666bf774c5f7c8308b74d4ca77a0024560963f5b7c428664ce57"}]}, @NFT_MSG_NEWSET={0x50, 0x9, 0xa, 0x301, 0x0, 0x0, {0x2, 0x0, 0x7}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x17}, @NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x3}, @NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x3}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x3}, @NFTA_SET_NAME={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_DELSET={0x2c4, 0xb, 0xa, 0x201, 0x0, 0x0, {0xa, 0x0, 0x1}, [@NFTA_SET_KEY_TYPE={0x8}, @NFTA_SET_GC_INTERVAL={0x8, 0xc, 0x1, 0x0, 0x3b3d2cb6}, @NFTA_SET_USERDATA={0x57, 0xd, 0x1, 0x0, "bcc54047ef5f9231a0ee01670b6dc004a99c31cf891143c4ecfc2b96f0557b5d78de900c3234db32012a67c612a16c29764c5789d2fdfaaa3857d7caf17ea6c96e9ffd5c0f4722344d51c847491c5c82c42cdb"}, @NFTA_SET_DESC={0x184, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_DESC_CONCAT={0x16c, 0x2, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_SET_FIELD_LEN={0x8}]}, {0x2c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x83}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x40}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4b}]}, {0x24, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1000}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xa20}]}, {0x24, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x80}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6000000}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x76f}]}, {0x1c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xffffffff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x47}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x400}]}, {0xc, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}]}, {0x54, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xffffffff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x80}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x200}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x81}]}, {0x1c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2e}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7fff}]}, {0x14, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}]}, {0x24, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}]}]}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_SET_DESC_CONCAT={0x4}]}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x10}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}, @NFTA_SET_USERDATA={0xa5, 0xd, 0x1, 0x0, "d89d16134179900ab5f73ff0c33e10e55d96fc11a63f6832a91904214b8c54d7fc8e4e290fd9d7651bd36394d1aa9764d27bd54ecf2f0167338ff1d6f84e97f3d33ece23739c90b823d3c0ca2fadf89031d74065593742366b2f18b8f75f5691d492c70a489fb6e6fb5d5353a7013ba9d5e0ccdf4f2c37356dc29375ed33fb0e1ac21fcab85baf42da8e8d851861de1fbd820243cacde28046f4b8e61c707449f7"}, @NFTA_SET_DESC={0xc, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_SIZE={0x8}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x5c8}, 0x1, 0x0, 0x0, 0x20044881}, 0xf4388b288636b05) socket$inet6(0x10, 0x3, 0x0) mlockall(0x7) r1 = syz_open_procfs(0x0, &(0x7f00000005c0)='smaps_rollup\x00') lseek(r1, 0x2000, 0x0) socket$packet(0x11, 0x2, 0x300) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00'}, 0x10) r4 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e21, 0xb, @empty}, 0x1c) setsockopt$inet6_IPV6_HOPOPTS(r4, 0x29, 0x36, &(0x7f0000000180)=ANY=[@ANYBLOB="0002"], 0x20) statfs(&(0x7f0000001000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000002000)=""/238) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x39}}}, 0x1c) lsetxattr$security_selinux(&(0x7f0000000000)='./cgroup.cpu/cgroup.procs\x00', &(0x7f0000000940), &(0x7f00000000c0)='system_u:object_r:logrotate_var_lib_t:s0\x00', 0x29, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f0000000080), 0x62, 0x50a, &(0x7f0000000200)="$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") 1m39.736504127s ago: executing program 1 (id=4582): bpf$TOKEN_CREATE(0x24, &(0x7f0000000040), 0x6) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1d, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="4800000010004b0400000000000000007a000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800b0001006272696467650000180002800a0014"], 0x48}}, 0x0) r4 = fsopen(&(0x7f0000000640)='cgroup2\x00', 0x3fda2f4913705c1b) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) r5 = fsmount(r4, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r5, &(0x7f0000000140)='./file0\x00') setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000540), 0x3c) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380), 0x80042, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000080)=0xe) ioctl$TIOCGSOFTCAR(r6, 0x5419, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000040)=@ccm_128={{0x304}, "c858892ff9ec727e", "86f3ecf68cbc0e40e50d4043a58a068d", "6ba2de7d", "09e4a163bb9316f9"}, 0x3b) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYRESDEC=r6, @ANYRESHEX=r0], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffb, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r8}, 0x9) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7, 0x0, 0x2}, 0x18) r9 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$PIO_UNIMAPCLR(r9, 0x4b68, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3af, 0x4}, 0x100000, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000400)='mm_vmscan_wakeup_kswapd\x00', r8, 0x0, 0xffffffffffffffbf}, 0x18) 1m39.124385378s ago: executing program 1 (id=4588): r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xfffff9, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x70, 0x0, 0x90, [0x0, 0x0, 0x0, 0x0, 0x200000001300, 0x200000001330], 0x0, 0x0, &(0x7f0000001300)=[{0x0, '\x00', 0xfffff9, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffc}]}, 0x108) 1m39.120342508s ago: executing program 1 (id=4591): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0, 0x0, 0x4}, 0x18) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f00000000c0)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) recvmmsg(r1, &(0x7f0000005200)=[{{0x0, 0x0, 0x0}, 0x88b1}], 0x1, 0x40000120, 0x0) write$bt_hci(r1, &(0x7f0000000200)=ANY=[], 0x6) 1m39.044616949s ago: executing program 1 (id=4592): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000054850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000240)='xen_cpu_load_idt\x00', r0, 0x0, 0xc}, 0xfffffffffffffd15) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000100)=@broute={'broute\x00', 0x20, 0x2, 0x3ac, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000300], 0x0, &(0x7f0000000000), &(0x7f0000000d00)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff0100000005000000e9ff0000000064766d727031000000000000000000006d6163766c616e30000000000000000076657468305f746f5f7465616d00000076657468315f746f5f62617461647600bbbbbbbbbbbbffffff00ffff0180c2000000ffffff00ff006e000000be000000ee0000006c6f670000000000000000000000000000000000000000000000000000000000280000000000000010fbcd3efbcce758acbbb52550149f540add266b2e891dc25f00604b53886800090000000000000072656469726563740000000000000000000000000000000000000000000000000800000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000fcffffff0000000000000000000000000900000000000000000000000000000000000000000000000000000001000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000001000000ffffffff01000000090000000800000060036361696630000000000000000000000076657468310000000000000000000000767863616e3100000000000000000000776c616e310000000000000000000000bbbbbbbbbbbbff00ff00000096c959c9393800ff00ffff000e01000086010000fe01000073746174650000000000000000000000000000000000000000000000000000000800000000000000ff010000000000007374700000000000000000000000000000000000000000000000000000000000480000000000000007000000030005000010aaaaaaaaaa0affffff00ffff0000060000000100000000000010c493a5590004ff00ff00ff004e234e23000008000800080005001808e6000500800000044e46515545554500000000000000000000000000000000000000000000000000080000000000000003000000000000004552524f5200000000000000000000000000000000000000000000000000000020000000000000005b9980d6ca8179a7ac9541d4b5d194d6441626ca7af449dbbf04416ad9be00006e666c6f670000000000000000000000000000000000000000000000000000005000000000000000090000000500050000000000a775eedd0dbba9e944fbade7afe14de7489e7ae07cc6d4262e96bc339fb42745c2f4b0891ea5d4e8c12608f12e998d2f8759d25a560287c106e5d04efa5150ac000000006e0c9a55c9ff1867a8c3d088f0b4f178e023dc1612dedf81ea5fc653ca385ade6977f7da0c1c1f71757e3bddaaeb9ddaf50b304db3c9b947eff823efa3572f2bd981c60352b5a2ccf3331803d365d10dbbad7291e8cbb0512017b45a709a4bf9ec16b99f504ddde5adba67680b1e183e4a12f2ede5ceab074ae82b8b164eab63991a317cd04bf38f158dc82e0a508a5e8fae0ad234e5775c0428f1cd0e6b819051897a5f5352f6b2febebd53c0f5f58b10aad31c3ecf1921d0cae7916405e9b7e4d0dc5ea5579a96ff9f8676faa46935"]}, 0x4f4) r2 = io_uring_setup(0x3eae, &(0x7f0000000080)={0x0, 0x0, 0x1}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYRES8=0x0, @ANYRES32=r0, @ANYRESDEC=r1, @ANYRESDEC=r2, @ANYRESOCT=r1], 0x7c}, 0x1, 0x0, 0x0, 0x20004004}, 0x0) sendmsg$NFT_MSG_GETOBJ(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000005900)=ANY=[@ANYBLOB="1c000000150a01"], 0x1c}}, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x70}, 0x1, 0x0, 0x0, 0x4081}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014fa0000b7030000000008008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008506000084000000b70000000020000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r5, &(0x7f0000000080)=[{&(0x7f0000000400)="580000001400192340834b80040d8c560a067fbc45ff620500000000070058000b480400945f640094272d7061d328b92d0000000000008000f0fffeffe809000000ffd9dd00000010000100030808004149004006040800", 0x58}], 0x1) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000006c0), 0x5114c1, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000cc0)={r0, 0x0, 0x25, 0x1, @val=@tcx={@void, @value=r7}}, 0x1c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) mount(0x0, &(0x7f0000000100)='./file0/../file0/../file0\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x143862, 0x0) mount(&(0x7f0000000500)=@filename='./file0/../file0/../file0\x00', &(0x7f0000000280)='./bus\x00', &(0x7f00000003c0)='virtiofs\x00', 0x30000, &(0x7f0000000300)='trans=rdma,') r9 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000000c0)={'tunl0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000010001fff0000000000ff000000060000", @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000400028008000a00", @ANYRES32=r10, @ANYBLOB], 0x40}}, 0x0) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r11}, 0x10) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x0, @ANYBLOB="08001b0000000000a40867e13ef554766babe947d2d38f841ea28152c8"], 0x30}}, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) 1m38.929438951s ago: executing program 1 (id=4593): prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x4000074, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000004b40)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x8100}, @IFLA_VLAN_ID={0x6, 0x1, 0x3}]}}}]}, 0x44}}, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0xe2b, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x10182, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x3, 0x800000000001}, 0x1180, 0x5dd8, 0x0, 0x8, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xffffffff}, 0x1320, 0x1, 0x3, 0x5, 0x0, 0x800001, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000001000010000400000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0xc048) r5 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$KDFONTOP_SET(r5, 0x4b72, &(0x7f0000000080)={0x0, 0x3000000, 0x8, 0x1b, 0x100, &(0x7f00000000c0)="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"}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000003940)=ANY=[@ANYBLOB="210000000000000000000000000010000004"], 0x48) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x1000000, 0x10, r6, 0x4e06b000) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000005"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r7}, 0x10) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f0000000300)={[{@grpquota}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x800}}, {@quota}, {@stripe={'stripe', 0x3d, 0x2}}, {@jqfmt_vfsold}]}, 0x1, 0x4fa, &(0x7f00000005c0)="$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") r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r8, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000300)='rcu_utilization\x00', r9}, 0x10) msgget$private(0x0, 0x1c0) 1m38.862350742s ago: executing program 35 (id=4593): prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x4000074, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000004b40)=@newlink={0x44, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x8100}, @IFLA_VLAN_ID={0x6, 0x1, 0x3}]}}}]}, 0x44}}, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0xe2b, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x10182, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x3, 0x800000000001}, 0x1180, 0x5dd8, 0x0, 0x8, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0xffffffff}, 0x1320, 0x1, 0x3, 0x5, 0x0, 0x800001, 0x9, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000001000010000400000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0xc048) r5 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$KDFONTOP_SET(r5, 0x4b72, &(0x7f0000000080)={0x0, 0x3000000, 0x8, 0x1b, 0x100, &(0x7f00000000c0)="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"}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000003940)=ANY=[@ANYBLOB="210000000000000000000000000010000004"], 0x48) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x1000000, 0x10, r6, 0x4e06b000) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000005"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r7}, 0x10) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f0000000300)={[{@grpquota}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x800}}, {@quota}, {@stripe={'stripe', 0x3d, 0x2}}, {@jqfmt_vfsold}]}, 0x1, 0x4fa, &(0x7f00000005c0)="$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") r8 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r8, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000300)='rcu_utilization\x00', r9}, 0x10) msgget$private(0x0, 0x1c0) 1m5.967970047s ago: executing program 7 (id=5278): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x275a, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) syz_clone(0x40200, 0x0, 0x49, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) syz_clone(0x48411, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000540), 0x84) perf_event_open(&(0x7f00000004c0)={0x8, 0x80, 0x0, 0xf, 0x0, 0x0, 0x82, 0x200000000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080), 0x9}, 0x18204, 0x7000, 0x3, 0x0, 0x0, 0x5338c7af, 0x0, 0x0, 0x1, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 1m5.78191764s ago: executing program 7 (id=5285): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000005"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='itimer_state\x00', r1}, 0x10) setitimer(0x0, &(0x7f0000000000)={{0x0, 0xea60}, {0x0, 0xea60}}, 0x0) 1m5.731095781s ago: executing program 7 (id=5289): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$bt_hci_HCI_FILTER(r1, 0x0, 0x2, &(0x7f0000000080)={0x8, [0x8, 0xfb0], 0xfac1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000280)={@mcast2, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_int(r2, 0x29, 0x1000000000021, &(0x7f0000000040)=0x5, 0x4) epoll_create(0x4) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000015c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4, 0x0, 0xfffffffffffffffd}, 0x18) r5 = syz_io_uring_setup(0x3b52, &(0x7f0000000140)={0x0, 0x5883, 0x1000, 0x2, 0x1c2}, &(0x7f0000000040)=0x0, &(0x7f0000000680)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r6, r7, &(0x7f00000002c0)=@IORING_OP_RENAMEAT={0x23, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1}) io_uring_enter(r5, 0x10007b0f, 0x96f0, 0x20, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x10) 1m5.526075424s ago: executing program 7 (id=5293): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) r2 = memfd_create(0x0, 0x0) write$binfmt_misc(r2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000bc0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x0, &(0x7f00000000c0), 0x2, 0xbd1, &(0x7f0000002380)="$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") bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$inet6(0xa, 0x3, 0x8000000003c) ioctl$BTRFS_IOC_QGROUP_LIMIT(r0, 0x8030942b, &(0x7f0000000280)={0x1, {0x9, 0x9, 0xbad, 0xb, 0x100000001}}) r3 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r3, &(0x7f00000039c0)=[{{&(0x7f0000000080)={0x2, 0x4e20, @local}, 0x10, 0x0}}], 0x1, 0x2000c044) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000380)='./binderfs/custom1\x00', 0x800, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r5, 0xc018620b, &(0x7f00000003c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0b00000005000000050000000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000331b317aec6d325d6a4d8ddc3ed8c4c29bc93a6258aec03fbcf113abed91dbf46267e7f9264bec88e4cd627f789f9db300a4cdbcf0dbbacf07305516fae6fe95dae545"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) read$char_usb(0xffffffffffffffff, &(0x7f0000000300)=""/77, 0x4d) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(r9, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={&(0x7f0000000080)={0x1c, r10, 0x1, 0x70bd2d, 0x25dfdbff, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8}]}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000500)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_UPDATE_FT_IES(r8, &(0x7f00000009c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000980)={&(0x7f0000000f00)=ANY=[@ANYBLOB="3c040000c035aa49bcb6d5521510aee741fc24c25f4451dc70ce18de6f", @ANYRES16=r10, @ANYBLOB="20002cbd7000fbdbdf256000000008000300", @ANYRES32=r11, @ANYBLOB="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"], 0x43c}, 0x1, 0x0, 0x0, 0x4000}, 0x4040) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r7}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="3000000010000100"/20, @ANYRES32=0x0, @ANYBLOB="8000000002000200080004000000000008001b"], 0x30}}, 0x0) sendto$inet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1e0000000000040566c3524aab36225b00000fd612f88b3775d48c0056c19718bc654fc36161fc4eb4f0b1ccc88dc754fc862be554d765f54771c158bf5faba0e9323f007f048bc117d0c168444b2f56a217c9687f13053f05e2279f63ef49e1cdd81152507add7e655af968b761bdbbf2d20d24", @ANYRES32=r0, @ANYBLOB='\r\x00'/20, @ANYRES32=0x0, @ANYRES32=r8, @ANYBLOB="0200000004000000020000000700000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x50) 1m5.17227865s ago: executing program 7 (id=5300): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a00000004000000e27f00000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000009c0000f3ffffffffffffff0000000000"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000100007b8af8ff00000000bfa20000000000000732ea569e982a0f9cffab1cbb7437020000f8ffffffb703000008000000b704000000000000850000000300000095000000000000007f0e8e99320a938afa87d364d5"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) (async) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) (async) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000000ef04639af1000010000000000000000000000000a20000000080a05000000000000000000020000060900010073797a30000000011400aa326d57010000000000000000000a00000a0ed1dff846"], 0x48}}, 0x0) (async, rerun: 64) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) (async, rerun: 64) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000680), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_GET(r6, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000001940)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r7, @ANYBLOB="01dfffffff9a26000000210000000c00018008000100", @ANYRES32=r5], 0x20}}, 0x0) 1m4.51558048s ago: executing program 7 (id=5309): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$igmp(0x2, 0x3, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x70, 0x0, 0x90, [0x0, 0x0, 0x0, 0xfeffff07, 0x200000001300, 0x200000001330], 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000000000f0ffffff00000000000000000000000000ffffffff0000000000000000000000002000000000000000000000000000000000000000000000000000000000000000fcffffff00000000"]}, 0x108) 1m4.490699271s ago: executing program 36 (id=5309): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$igmp(0x2, 0x3, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x70, 0x0, 0x90, [0x0, 0x0, 0x0, 0xfeffff07, 0x200000001300, 0x200000001330], 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000000000f0ffffff00000000000000000000000000ffffffff0000000000000000000000002000000000000000000000000000000000000000000000000000000000000000fcffffff00000000"]}, 0x108) 2.051042767s ago: executing program 9 (id=6469): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1, 0x0, 0x2}, 0x18) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL802154_CMD_GET_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x2c, 0x0, 0x310, 0x70bd2c, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4040}, 0x20000040) syz_emit_ethernet(0x4e, &(0x7f0000000800)={@link_local, @random="6481bf928700", @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "ecff80", 0x18, 0x11, 0x0, @private0={0xfc, 0x0, '\x00', 0x2}, @mcast2, {[], {0x0, 0x4e22, 0x18, 0x0, @wg=@data={0x3, 0xffff0000}}}}}}}, 0x0) 2.009398228s ago: executing program 8 (id=6470): bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x1}, 0x1c) listen(r1, 0x0) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) r3 = accept(r1, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[], 0xfffffdef}}, 0x1) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/13], 0x48) r4 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000280)=ANY=[@ANYBLOB="0600000004000000be7000005c00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000002000200000674b38227369ee4acacddf9cade1926000000001a0000000000000000002000000000"], 0x50) socket$inet6_sctp(0xa, 0x1, 0x84) bpf$PROG_BIND_MAP(0x23, &(0x7f00000001c0)={0xffffffffffffffff, r4}, 0xc) shutdown(r2, 0x1) 2.008203488s ago: executing program 9 (id=6472): r0 = socket$inet6(0xa, 0x3, 0x3b) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, 0x0, 0x18) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, r2}, 0x18) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x101002) io_submit(0x0, 0x0, 0x0) preadv(r1, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0xffffffe4, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000000380)={[{@delalloc}, {@data_err_abort}, {@barrier_val={'barrier', 0x3d, 0x2}}, {@dioread_lock}, {@data_err_ignore}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x4007b1}}, {@data_err_ignore}, {@grpquota}, {@nobh}, {@user_xattr}, {@bh}, {@dioread_nolock}]}, 0x1, 0x553, &(0x7f0000000a40)="$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") r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x441, 0x20) r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) truncate(&(0x7f0000000900)='./file1\x00', 0x3000000) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27ffff7, 0x4012011, r4, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r5}, &(0x7f00000002c0), &(0x7f0000000400)=r6}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) fallocate(r3, 0x8, 0x4000, 0x4000) 1.212332901s ago: executing program 8 (id=6488): mbind(&(0x7f00004fa000/0x4000)=nil, 0x4000, 0x2, &(0x7f0000000040)=0x1ff, 0x6, 0x0) syz_clone3(&(0x7f00000007c0)={0x20040100, 0x0, 0x0, 0x0, {0x1a}, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0x0], 0x1}, 0x58) 1.127413202s ago: executing program 8 (id=6490): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100"/14, @ANYRES32=r0], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) 1.126696842s ago: executing program 8 (id=6492): r0 = syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='mnt\x00', 0x4, &(0x7f0000000000), 0x0, 0x236, &(0x7f0000000300)="$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") syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000580)='./file1\x00', 0x800040, &(0x7f0000000340), 0x1, 0x597, &(0x7f0000000b80)="$eJzs3U1sG2UaAOB3xvH2L9t0pV1pd9VDtYtUpKpO0h8onNorolKlHpC4lMhxoyhOHMUONFEO6b1C9IAA9VJucOAI4sABcUHiwpULiDNSRSOQmh7AyH9pm9jBKXWdxs8jjT3ffON5v2/G73hmNCMHMLCO1V7SiP9ExKUkYuShuqFoVh5rzLe+tpK/v7aST6JavfxzEklE3FtbybfmT5rvhyJiNSL+HRFfZSNOpFvjlpeWZyaKxcJCszxamZ0fLS8tn5yenZgqTBXmTr/40tlzZ86Onxrv3Pjszvp644ebb9/49pXbNz/+5Ohq/t2JJM7HcLPu4X48SY11ko3zm6af6UWwPkr63QAeS6aZ57VU+leMRKaZ9e1UR55q04Aeq+6LqO5Esrqj2YHdLNlZ/gN7Rus4oHb+2xoeOUDI9Pb4486FxglILe56c2jUDDWuTcT++rnJwV+SR85MauebR3rbNAbA6vWIGBsa2vr9T5rfv8c39iQaSE99eaGxobZu/3Rj/xNt9j/DrWunf1Fr/7e+Zf/3IH6mw/7vUpcxfnv9xw86xr8e8d+28ZON+Emb+GlEvNFl/FuvfX6uU131w4jj0T5+S7L99eHRq9PFwljjtW2ML44ffXm7/h/sEL9xzXZ//Wem3fqf77L/n3396f9Wt4n//P+33/7t1v+BiHiny/j/uPfRq53q7lxP7taOAna6/WvTbncZ/4Xzx77vUHWgy0UAAAAAAAAAAABtpPV72ZI0tzGeprlc4xnef8bBtFgqV05cLS3OTTbueTsS2bR1p9VIo5zUyuPN+3Fb5VObyqdb9xFnDtTLuXypONnnvgMAAAAAAAAAAAAAAAAAAMBucWjT8/+/ZurP/2/+u2pgr+r8l9/AXif/YXA9mv9JxL6+NQV4yvz+w8Cqyn8YXPIfBpf8h8El/2FwyX8YXPIfBpf8BwAAAAAAAAAAAAAAAAAAAAAAAACAnrh08WJtqN5fW8nXypNDS4szpTdPThbKM7nZxXwuX1qYz02VSlPFQi5fmv2z5RVLpfmxmFu8NloplCuj5aXlK7OlxbnKlenZianClUL2qfQKAAAAAAAAAAAAAAAAAAAAni3D9SFJcxGR1sfTNJeL+HtEHIlscnW6WBiLiMMR8V0mu69WHu93owEAAAAAAAAAAAAAAAAAAGCPKS8tz0wUi4WFARkZ2jLlm84zR8Tqk21GbYk7/lS2ua12yzp81kYObz9PJvrewt040ucdEwAAAAAAAAAAAAAAAAAADKAHD/12+4nfe9sgAAAAAAAAAAAAAAAAAAAAGEjpT0lE1IbjI88Nb679W7Keqb9HxFu3Lr93baJSWRivTb+7Mb3yfnP6qX60H+hWK09beQwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8UF5anpkoFgsLPRzpdx8BAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHscfAQAA//+aXtbd") r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f0000000140)='Q', 0x1, 0x200980) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0xfff, 0x8, 0x100, 0x1, 0x102, 0x5}) 1.126167022s ago: executing program 9 (id=6493): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x4, &(0x7f0000000300)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) setresgid(0xee00, 0xee01, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(r0, &(0x7f00000000c0)='.\x00', 0x515401, 0x408) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) 1.052066073s ago: executing program 8 (id=6494): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000201000085000000430000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = syz_io_uring_setup(0x3b52, &(0x7f0000000140)={0x0, 0x5883, 0x1000, 0x2, 0x1c2}, &(0x7f0000000040)=0x0, &(0x7f0000000680)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000002c0)=@IORING_OP_RENAMEAT={0x23, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1}) io_uring_enter(r1, 0x10007b0f, 0x96f0, 0x20, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) 1.051232734s ago: executing program 9 (id=6495): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x8000}, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000000)=0x9, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'ip6_vti0\x00'}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x106263, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f0000000140)='\\\\@[*#)\x00', 0xfffffffffffffffe) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000200)={@dev}, 0x14) setsockopt$inet6_mreq(r4, 0x29, 0x1c, &(0x7f0000000280)={@remote}, 0x14) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x38, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16, 0x2, @perf_bp={0x0, 0xd}, 0x7000, 0x10000, 0x1, 0x1, 0x8, 0x20005, 0x2b, 0x0, 0x0, 0x0, 0xa}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000000040)=0x5, 0x4) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1b0000000000000000000000c83c278b7ebbb4000004000000000069f4454b94229a0b3a0097bca779a410e8b6b932924f3e8781406827825e08554d3fcf7a3aeec313a3b5", @ANYRES32=0x0, @ANYBLOB="0400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) r8 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r8, 0x10f, 0x87, &(0x7f0000000140)=@req3={0x7813, 0x3, 0x0, 0x81, 0x1ff, 0x1, 0x1}, 0x1c) recvmmsg$unix(r8, &(0x7f0000004400)=[{{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000300)=""/41, 0x29}], 0x1}}], 0x1, 0x0, 0x0) 1.004333524s ago: executing program 3 (id=6497): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00', r1}, 0x9) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000a80)=@newtaction={0x68, 0x30, 0x1, 0x0, 0x0, {}, [{0x54, 0x1, [@m_ife={0x50, 0x1, 0x0, 0x0, {{0x8}, {0x28, 0x2, 0x0, 0x1, [@TCA_IFE_TYPE={0x6, 0x5, 0x9}, @TCA_IFE_PARMS={0x1c, 0x1, {{0x7, 0x4, 0x10000000, 0x9cfa, 0x5}, 0x1}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x68}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2010008, &(0x7f00000001c0), 0xff, 0x52e, &(0x7f0000000640)="$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") sendmsg$key(r3, &(0x7f0000000400)={0x10000000, 0x0, &(0x7f0000000040)={&(0x7f0000000840)=ANY=[@ANYBLOB="020e0080150000000000000000000000030005000000000002004e24ac1e00010000000000000000030006003c000000020000fc34000000000000000000000001001800000000000800120000000200fcffffff000000000600330000000000000000000000eafffd8000000000000000000000000000aa000000000000000000000000000000000400"], 0xa8}}, 0x2) 944.122975ms ago: executing program 2 (id=6498): socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFC_CMD_DEP_LINK_UP(r0, 0x0, 0x40) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000700)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x8052, &(0x7f00000000c0)={[{@noauto_da_alloc}, {@init_itable_val={'init_itable', 0x3d, 0x6}}, {@dioread_nolock}, {@grpquota}]}, 0x5, 0x4dd, &(0x7f0000000c40)="$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") (fail_nth: 17) 905.332986ms ago: executing program 8 (id=6499): bind$bt_hci(0xffffffffffffffff, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x1}, 0x1c) listen(r1, 0x0) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) r3 = accept(r1, 0x0, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[], 0xfffffdef}}, 0x1) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(&(0x7f0000000740), 0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x48) r4 = bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000280)=ANY=[@ANYBLOB="0600000004000000be7000005c00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000002000200000674b38227369ee4acacddf9cade1926000000001a0000000000000000002000000000"], 0x50) socket$inet6_sctp(0xa, 0x1, 0x84) bpf$PROG_BIND_MAP(0x23, &(0x7f00000001c0)={0xffffffffffffffff, r4}, 0xc) shutdown(r2, 0x1) 741.868979ms ago: executing program 3 (id=6500): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b7000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000480)='kfree\x00', r1, 0x0, 0x7}, 0x18) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_buf(r2, 0x29, 0x39, &(0x7f0000000040)="ff0204000000000000000000000000000000007208000000", 0x18) 715.336319ms ago: executing program 2 (id=6501): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1, 0x0, 0x2}, 0x18) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL802154_CMD_GET_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={0x0}, 0x1, 0x0, 0x0, 0x4040}, 0x20000040) syz_emit_ethernet(0x4e, &(0x7f0000000800)={@link_local, @random="6481bf928700", @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "ecff80", 0x18, 0x11, 0x0, @private0={0xfc, 0x0, '\x00', 0x2}, @mcast2, {[], {0x0, 0x4e22, 0x18, 0x0, @wg=@data={0x3, 0xffff0000}}}}}}}, 0x0) 714.946019ms ago: executing program 3 (id=6502): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{}, &(0x7f0000000000), &(0x7f0000000080)=r0}, 0x20) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'geneve0\x00'}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='mm_page_alloc\x00'}, 0x10) syz_clone(0x45326000, 0x0, 0x0, 0x0, 0x0, 0x0) 711.606519ms ago: executing program 2 (id=6503): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100"/14, @ANYRES32=r0], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) 667.91202ms ago: executing program 2 (id=6504): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1, 0x0, 0x2}, 0x18) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL802154_CMD_GET_INTERFACE(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4040}, 0x20000040) syz_emit_ethernet(0x4e, &(0x7f0000000800)={@link_local, @random="6481bf928700", @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "ecff80", 0x18, 0x11, 0x0, @private0={0xfc, 0x0, '\x00', 0x2}, @mcast2, {[], {0x0, 0x4e22, 0x18, 0x0, @wg=@data={0x3, 0xffff0000}}}}}}}, 0x0) 667.4489ms ago: executing program 2 (id=6505): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x4, &(0x7f0000000300)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) setresgid(0xee00, 0xee01, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(r0, &(0x7f00000000c0)='.\x00', 0x515401, 0x408) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_buf(r1, 0x29, 0x39, 0x0, 0x0) 594.305511ms ago: executing program 6 (id=6506): socketpair$unix(0x1, 0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\x00'/19, @ANYRES32=0x0], 0x50) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@getchain={0x24, 0x11, 0x1, 0x2000000, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xfff3}}}, 0x24}, 0x1, 0xffffffffffffffa1}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) signalfd(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0, r4}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0xc, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x20, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001280)={&(0x7f0000000500)='percpu_free_percpu\x00', r5}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=@base={0x6, 0x4, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) dup(r6) 593.537031ms ago: executing program 2 (id=6507): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000900)={&(0x7f0000000400)=ANY=[@ANYBLOB="54020000170001000000000000000000200100000000000000040000000000010000000000000000ac1414000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="1242ffff040000000000000000000037660b6aff00000000000000000000000000000000000000000200002000000000", @ANYRES32, @ANYRES32, @ANYBLOB="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"], 0x254}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x100000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = socket$netlink(0x10, 0x3, 0x10) r3 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r3, &(0x7f0000514ff4)={0x10, 0x0, 0x25dfdbff, 0x2ffffffff}, 0xc) r4 = syz_genetlink_get_family_id$team(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000240)='kfree\x00', r6}, 0x18) r7 = syz_open_dev$usbfs(&(0x7f0000000180), 0x205, 0x2581) r8 = fcntl$dupfd(r7, 0x0, r7) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r9, &(0x7f0000001740)=[{&(0x7f0000001800)="c0b3f641e93358db730fa114ef6fd9c6705352e1b8dfb95390d3ebb8cd73712ed6131a236b661abbe3038b46fa6f7c0f1e5c157cc3b5089582c0ef2a0fb81c4b6d478f7be370faea02f562a6fdead5a874b85495136d707a1cef985f3a56aeab38fa694e94d9e726bc11b61f00000000000000ed469d85cbf48688f6f8b4cd643a32a94ab6ec8efc569356a30a982aeae44ce595e461a425b08c032a84b79b477b410627d19c42cbb08d", 0xaa}, {&(0x7f0000000100)="8323000000001d39afc62ceefc8936f299eecf", 0x1a}, {&(0x7f0000000180), 0x13}, {&(0x7f00000001c0)="55c1ac6a33bcabcbf05b5674529841f58350038a066a02a6bc9d8c5eecfdbde63fe0ae2f71fe751ba7f269ebe88062259a37084b213e218b5a144b53a81e7cc49a22a19158853dbfabb1be2c6ab892f6083dc94e6a6710e73b7f4d1e2c52f8fe322e59d8020f1b81ca806ad1d02ffb2e82e69cf0a80a05a65dead7c62f7974b805c23351c9b7c340b4b064e60b5a4efdc0833b928d4530831c03a39c7727a1a29aec7354d1c5e9a5aa8af60670eee565ae446b989f81ea74a578a387aec81be9a2fdc25f94c171a3874be3e051956f638cf1f01811ddb63de509efb4008cdeb5cb0644c7cb2c", 0xfd82}, {&(0x7f0000000700)="820566a0e5038adaeacf19e7470234a058fa1a347381c790661dde230dc4150ae23ec76b77396270f45644f86e8d09edab75a26acb1e6209b5be5b40d09ba299b5c626c28448e5f04342e71e03d98aab89bf23721c77e3d1d2553eef61a61dc700000000000010bc27d1586457875f2878644dc8f4c8d47c9edc1bdb46392e3b52895de73f4d8808e1bd71ed7a571dc4f41465e8ad35c2ed5a79d701f8a8e492", 0xa0}, {&(0x7f0000000380)="c77d467908bfdef41403f806aa8abd7163a810e03642f3dea6321a7b21b738ed132db614140e7dc513a4f44adab6b69a9208bc55cf77e018bf5821baa9521cedb29a6d43c72b87ca91a291", 0x4b}, {&(0x7f0000000400)="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", 0x1de}], 0x7, 0x0) ioctl$USBDEVFS_SUBMITURB(r8, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0x80, 0x0, 0x0, 0x0, 0x7995}, 0xfff7, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d0000000", @ANYRES16=r4, @ANYBLOB="01002abd7000fcdbdf250100000008000100", @ANYRES32=r5, @ANYBLOB="b400028038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000050003000300000008000400"], 0xd0}, 0x1, 0x0, 0x0, 0x24004000}, 0x24044880) syz_emit_ethernet(0x72, &(0x7f0000000a40)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaabb86dd60004000003c3c0020010000000000000000000000000000ff0200000000000000000000000000010004000000000000c910fe"], 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000002c0)='rpm_return_int\x00', r10}, 0x10) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xf4f3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000f00)='kfree\x00', r11}, 0x18) syz_usbip_server_init(0x4) syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000500)='./file0\x00', 0x200001, &(0x7f0000000300)={[{@usrquota}, {@barrier}, {@nogrpid}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1000}}]}, 0x1, 0x511, &(0x7f0000000f80)="$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") r12 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) fsync(r12) r13 = socket$nl_generic(0x10, 0x3, 0x10) r14 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_CREATE(r13, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r14, @ANYBLOB="2309fefffffffcffffff0100000005000700000000000800090000000000060002000100000008000a0004000100080017"], 0x3c}}, 0x0) 467.323033ms ago: executing program 3 (id=6508): r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r1 = dup2(r0, r0) recvfrom$inet_nvme(r1, 0x0, 0x0, 0x40, 0x0, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) r2 = timerfd_create(0x0, 0x800) timerfd_settime(r2, 0x3, &(0x7f0000000440)={{0x0, 0x989680}}, 0x0) read(r2, &(0x7f0000000240)=""/123, 0x7b) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000300000000000000000000030000000003000000020000000000000000000000000000010500000010000000010000000000000800000000005f"], 0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) 449.266403ms ago: executing program 3 (id=6509): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020100008500000043000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = syz_io_uring_setup(0x3b52, &(0x7f0000000140)={0x0, 0x5883, 0x1000, 0x2, 0x1c2}, &(0x7f0000000040)=0x0, &(0x7f0000000680)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000002c0)=@IORING_OP_RENAMEAT={0x23, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x1}) io_uring_enter(r1, 0x10007b0f, 0x96f0, 0x20, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) 405.667784ms ago: executing program 6 (id=6510): bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000003c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r0 = syz_io_uring_setup(0x832, &(0x7f0000000580)={0x0, 0x4cd1c, 0x10100, 0x3}, &(0x7f0000000000)=0x0, &(0x7f00000000c0)=0x0) io_uring_register$IORING_REGISTER_PBUF_RING(r0, 0x16, &(0x7f0000000380)={&(0x7f0000001000)={[{0x0}, {0x0}, {0x0}, {0x0}]}, 0x4}, 0x1) syz_io_uring_submit(r1, r2, &(0x7f00000003c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x20, 0x0, @fd_index=0x5, 0x0, &(0x7f00000001c0)=[{0x0}], 0x1}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x40, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00', 0x10}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f0, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a0000008400000000010000010000", @ANYRES32, @ANYRESHEX=0x0], 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b702000014fa0000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b700000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00'}, 0x10) mq_open(&(0x7f00000002c0)='//2,\x00', 0x80, 0x146, &(0x7f00000003c0)={0x100000001, 0x7, 0x9, 0x9}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) io_uring_enter(r0, 0x26c3, 0xdffffffb, 0x4c, 0x0, 0x0) 405.142094ms ago: executing program 6 (id=6511): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000440)={@val, @void, @eth={@broadcast, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x452c, 0x0, 0x0, 0x0, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, {0x0, 0x6558, 0x18, 0x0, @wg=@data={0x4, 0x0, 0xbe88}}}}}}}, 0xfdef) 332.207595ms ago: executing program 3 (id=6512): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x127c46, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r0}, &(0x7f0000000000), 0x0}, 0x20) (async) socket$packet(0x11, 0x3, 0x300) prlimit64(0x0, 0x8, &(0x7f0000000140)={0x8, 0x8b}, 0x0) (async, rerun: 64) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) (rerun: 64) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) (async, rerun: 64) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x5) (async, rerun: 64) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) (async, rerun: 32) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) (async) recvmmsg(r3, &(0x7f0000000480), 0x400034f, 0x2, 0x0) (async) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000000c0)={'caif0\x00', &(0x7f0000000000)=@ethtool_cmd={0x27, 0xa7d4, 0x5e5, 0x75f, 0x7, 0x5, 0x3, 0x6, 0x7, 0x8, 0x2, 0x4, 0x4, 0x5, 0xe, 0x8, [0x7, 0x7]}}) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r4, 0x8008f512, &(0x7f0000000040)) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000180)='./bus\x00', 0xe, &(0x7f0000000300)={[{@noauto_da_alloc}, {@errors_remount}]}, 0x3, 0x445, &(0x7f0000000b00)="$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") (async) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 213.452457ms ago: executing program 6 (id=6513): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2276, &(0x7f0000001e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000000)="76389e147583ddd0569ba56a888e", 0x0, 0xff, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000240)={'veth0_virt_wifi\x00', 0x0}) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440), r4) sendmsg$ETHTOOL_MSG_STRSET_GET(r4, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={&(0x7f00000004c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r6, @ANYBLOB="01002bbd7000ffdbdf25010000000c00018008000100", @ANYRES32=r5], 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x20000) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000004c0)={'ip6_vti0\x00', &(0x7f00000003c0)={'syztnl0\x00', 0x0, 0xd0ad98122dfde1db, 0x70, 0x8, 0xffff, 0x77, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private2, 0x40, 0x8000, 0x8, 0x4ee}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000500)={'batadv0\x00', 0x0}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000580)=0x14) r10 = socket$igmp6(0xa, 0x3, 0x2) r11 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r14 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r15 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r14, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r13, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000040)={r15}, 0xc) ioctl$sock_inet6_SIOCADDRT(r10, 0x890b, &(0x7f00000005c0)={@dev={0xfe, 0x80, '\x00', 0x40}, @remote, @remote, 0x3, 0x2, 0x5, 0x400, 0xb7, 0xc20022, r12}) sendmsg$ETHTOOL_MSG_COALESCE_GET(r3, &(0x7f0000000600)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000005c0)={&(0x7f00000028c0)=ANY=[@ANYBLOB="98010000", @ANYRES16=r6, @ANYBLOB="200028bd7000fbdbdf25130000003400018014000200626f6e6430000000000000000000000008000100", @ANYRES32=r7, @ANYBLOB="140002007767320000000000000000000000000054000180140002006261746164765f736c6176655f300000140002007465616d30000000000000000000000014000200626f6e64300000000000000000000000140002006e72300000000000000000000000000020000180140002006c6f000000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="34000180140002006e65747063693000000000000000000008000100", @ANYRES32=r8, @ANYBLOB="1400020070696d367265670000000000000000006c0001800800030001000000140002006e65747063693000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="0800030012000000140002007369743000000000000000000000000014000200626f6e64300000000000000000000000140002006e657470636930000000000000000080240001800800030035523e7708000100834d0d535157df8217aeec0c9fc3e23f9a33727c6e53ce65a0f035c1a1cddea20f7531767eafa3b4d69ed9c48d03eab2f8f5454e7d06c878459376b4a9d3510a9bb0be561607b938409099ed7a42f59a3de03e58cd4c6e3cc25536aaa7", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=r12, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="180001801400020076657468305f766c616e000000000000"], 0x198}, 0x1, 0x0, 0x0, 0x10}, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000008c0)={0xffffffffffffffff, 0x20, &(0x7f0000000880)={&(0x7f0000000640)=""/28, 0x1c, 0x0, &(0x7f0000000d00)=""/4096, 0x1000}}, 0x10) r17 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x14, 0xc, &(0x7f0000000980)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x30, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r16, 0x0, 0xfffffca7, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='block_bio_remap\x00', r17}, 0x10) r18 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r19 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32=r18, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x41, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r19}, 0x10) 211.408087ms ago: executing program 6 (id=6514): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r2}, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=ANY=[@ANYBLOB="1400000010000400000000000000fffffff5000a20000000000a05000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021940000000c0a01030000000000000000070000000900020073797a31000000000900010073797a3000000000680003806400dec6080003400000000258000b80200001800a0001"], 0x118}}, 0x0) 161.091947ms ago: executing program 9 (id=6515): bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(0x0, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x200000, &(0x7f0000000040)={[{@grpquota}]}, 0x1, 0xbac, &(0x7f00000017c0)="$eJzs3M1rXOUaAPDnnEy+c5v0crn3tggGpCqK07QpFbpqXYsKunDZmExKyPTDJIIJXaR1ry5EXBSkf4Lg3m5cCS7qQutfUMQiRTdtFyNnPtKxk5nGdGaOSX8/eHPe97wn8zxPTmfOe2BOA3hqTWc/0ohDEXE2iZis708jYqjaG4nYrB13/+7l+awlUam8/VsSSUTcu3t5vvFaSX07Xh+MRMTN15L490etcVfXN5bnyuXSSn18dO38paOr6xuvLJ2fO1c6V7pwYvbVE7MnZ2e7WOvtS+998cwPbzx/9frHM29+fuC7JE7HRH2uuY5umY7prb9Js0JEzHU7WE4G6vU015kUckwIAICO0qY13H9jMgbi4eJtMr79MdfkAAAAgK6oDERUAAAAgH0ucf8PAAAA+1zjewD37l6eb7R8v5HQX3fORMRUrf7G8821mUJsVrcjMRgRY78n0fxYa1L7tSc2nUX6+vtS1qJHzyF3snklIv6/3flPqvVPVZ/ibq0/jYiZLsSffmS8l+o/3YX4edcPwNPpxpnahaz1+pdurX9im+tfYZtr127kff1rrP/ut6z/HtY/0Gb999YOYxx+8NLNdnPN6793P/l5IYufbZ+oqL/hzpWIw4Xt6k+26k/a1H92hzHG529fazeX1Z/V22j9rr9yPeJIdTXXWn9D0un/Jzq6uFQuzdR+bvP66yc7x28+/1nL4jfuBfohO/9jsbvzf2mHMab+9+uhdnOPrz/9ZSh5p9obqu/5cG5tbeVYxFDyeuv+451zaRzTeI2s/hef6/z+367+7DNhs/53yP71XKlvs/HVR2KOHzn+1e7r762s/oVdnv9Pdxjjy2+uvd9uLu/6AQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANgb0oiYiCQtbvXTtFiMGI+I/8RYWr64uvby4sUPLixkcxFTMZguLpVLMxExWRsn2fhYtf9wfPyR8WxEHIyIzyZHq+Pi/MXyQt7FAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAsGU8IiYiSYsRkUbEH5NpWizmnRUAAADQdVN5JwAAAAD0nPt/AAAA2P9a7v8LfxmN9DMXAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA9qWDz964lUTE5qnRassM1ecGc80M6LV0Z4eN9ToPoP8G8k4AyE2hqV+pVCo5pgL0mXt8IHnM/EjbmeGu5wIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAP9cLh27cSiJi89RotWWG6nODuWYG9FqadwJAbgY6TSaP3QHsYYW8EwBy4x4fqK3sH1RqWudH2v7m8BNHBQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGDvmKi2JC1GRFrtp2mxGPGviJiKwWRxqVyaiYgDEfHT5OBwNj6Wd9IAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB03er6xvJcuVxa0dHR6WJnNPoWa7T+Zm5zzHD7qQ6dnD+YAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADIxer6xvJcuVxaWc07EwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACBvq+sby3Plcmmlh528awQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAID9/BgAA///GyAmy") r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x2d) creat(0x0, 0x0) mount(&(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f00000003c0)=@base={0x6, 0x4, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0x30, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x8001000000000000, @void, @value, @void, @value}, 0x50) 76.319379ms ago: executing program 9 (id=6516): r0 = socket$packet(0x11, 0x2, 0x300) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) r1 = getpid() sched_setscheduler(r1, 0x6, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000bc0)='ext4\x00', &(0x7f0000000140)='./file1\x00', 0x0, &(0x7f00000000c0), 0x2, 0xbd1, &(0x7f0000002380)="$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") r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x18) unshare(0x40020200) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x38000, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000080)=@req={0x7, 0x5, 0x5, 0x3}, 0x10) socket$netlink(0x10, 0x3, 0x4) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000580)='./file1\x00', 0x0, &(0x7f0000000100), 0x1, 0x593, &(0x7f0000000b80)="$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") r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143441, 0x98) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xa, 0xb, &(0x7f0000000140)=@raw=[@ldst={0x0, 0x1, 0x6, 0x0, 0x7, 0x0, 0x4}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x4}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}, @map_fd={0x18, 0x1, 0x1, 0x0, r6}, @generic={0x8, 0x7, 0x9, 0x7, 0xffe}], &(0x7f00000001c0)='syzkaller\x00', 0x15b41415, 0x41, &(0x7f0000000200)=""/65, 0x40f00, 0x33, '\x00', 0x0, @fallback=0x19, r6, 0x8, &(0x7f0000000280)={0x7, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000300)=[{0x4, 0x3, 0x7, 0x9}, {0x3, 0x1, 0xa, 0xa}], 0x10, 0x800, @void, @value}, 0x94) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143441, 0x98) ioctl$EXT4_IOC_SWAP_BOOT(r6, 0x6611) 0s ago: executing program 6 (id=6517): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=@base={0xa, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) (async, rerun: 64) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280), &(0x7f0000000280), 0xfd, r1}, 0x38) (rerun: 64) sendmsg$NFT_BATCH(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a90000000030a0300000000000000000002e000000c00020000000000000000010900010073797a30"], 0xb8}}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x848000, &(0x7f00000014c0), 0x1, 0x793, &(0x7f0000001700)="$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") (async) write$binfmt_script(0xffffffffffffffff, 0x0, 0x4e) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r3, &(0x7f0000000000), 0x2a979d) (async) r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/rt_acct\x00') (async, rerun: 32) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r5}, 0x18) (async) r6 = socket(0x18, 0x4, 0x0) connect$pppoe(r6, &(0x7f0000000100)={0x18, 0x0, {0x2, @broadcast, 'veth1_to_bridge\x00'}}, 0x1e) (async) sendfile(r6, r4, 0x0, 0x8) (async) r7 = openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0xa0000, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r7, 0x8004587d, &(0x7f0000000080)={@desc={0x1, 0x0, @desc2}}) (async) ioctl$SIOCSIFHWADDR(r3, 0x401c5820, &(0x7f0000000080)={'macvlan1\x00', @broadcast}) kernel console output (not intermixed with test programs): l=41 compat=0 ip=0x7fb09064e929 code=0x7ffc0000 [ 304.670804][ T29] audit: type=1326 audit(1749533854.063:13902): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19268 comm="syz.9.5341" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb09064e929 code=0x7ffc0000 [ 304.805459][T19287] __nla_validate_parse: 15 callbacks suppressed [ 304.805479][T19287] netlink: 20 bytes leftover after parsing attributes in process `syz.9.5348'. [ 304.844950][T19287] netlink: 76 bytes leftover after parsing attributes in process `syz.9.5348'. [ 304.856674][T19291] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5350'. [ 304.884138][T19293] netlink: 52 bytes leftover after parsing attributes in process `syz.2.5351'. [ 304.980404][T19305] netlink: 'syz.9.5355': attribute type 7 has an invalid length. [ 304.988458][T19305] netlink: 8 bytes leftover after parsing attributes in process `syz.9.5355'. [ 305.282407][T19330] netlink: 52 bytes leftover after parsing attributes in process `syz.9.5365'. [ 305.349325][T19334] netlink: 'syz.8.5367': attribute type 5 has an invalid length. [ 305.354900][T19336] FAULT_INJECTION: forcing a failure. [ 305.354900][T19336] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 305.370904][T19336] CPU: 1 UID: 0 PID: 19336 Comm: syz.6.5368 Tainted: G W 6.16.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 305.370940][T19336] Tainted: [W]=WARN [ 305.370947][T19336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 305.370963][T19336] Call Trace: [ 305.370971][T19336] [ 305.371011][T19336] __dump_stack+0x1d/0x30 [ 305.371038][T19336] dump_stack_lvl+0xe8/0x140 [ 305.371060][T19336] dump_stack+0x15/0x1b [ 305.371077][T19336] should_fail_ex+0x265/0x280 [ 305.371176][T19336] should_fail_alloc_page+0xf2/0x100 [ 305.371204][T19336] __alloc_frozen_pages_noprof+0xff/0x360 [ 305.371256][T19336] alloc_pages_mpol+0xb3/0x250 [ 305.371291][T19336] folio_alloc_mpol_noprof+0x39/0x80 [ 305.371326][T19336] shmem_get_folio_gfp+0x3cf/0xd60 [ 305.371380][T19336] shmem_write_begin+0xa8/0x190 [ 305.371439][T19336] generic_perform_write+0x184/0x490 [ 305.371470][T19336] shmem_file_write_iter+0xc5/0xf0 [ 305.371494][T19336] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 305.371517][T19336] vfs_write+0x49d/0x8e0 [ 305.371566][T19336] ksys_write+0xda/0x1a0 [ 305.371656][T19336] __x64_sys_write+0x40/0x50 [ 305.371725][T19336] x64_sys_call+0x2cdd/0x2fb0 [ 305.371749][T19336] do_syscall_64+0xd2/0x200 [ 305.371772][T19336] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 305.371923][T19336] ? clear_bhb_loop+0x40/0x90 [ 305.371946][T19336] ? clear_bhb_loop+0x40/0x90 [ 305.372029][T19336] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 305.372063][T19336] RIP: 0033:0x7fc1f47ad3df [ 305.372078][T19336] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 305.372097][T19336] RSP: 002b:00007fc1f2e16df0 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 305.372116][T19336] RAX: ffffffffffffffda RBX: 0000000000080000 RCX: 00007fc1f47ad3df [ 305.372129][T19336] RDX: 0000000000080000 RSI: 00007fc1ea9f7000 RDI: 0000000000000007 [ 305.372142][T19336] RBP: 0000000000000000 R08: 0000000000000000 R09: 00000000000005f8 [ 305.372227][T19336] R10: 00000000000003d0 R11: 0000000000000293 R12: 0000000000000007 [ 305.372239][T19336] R13: 00007fc1f2e16ef0 R14: 00007fc1f2e16eb0 R15: 00007fc1ea9f7000 [ 305.372261][T19336] [ 305.624958][T19339] netlink: 'syz.9.5369': attribute type 7 has an invalid length. [ 305.633434][T19339] netlink: 8 bytes leftover after parsing attributes in process `syz.9.5369'. [ 305.717990][T19347] netlink: 'syz.9.5372': attribute type 4 has an invalid length. [ 305.844849][T19357] netlink: 24 bytes leftover after parsing attributes in process `syz.9.5376'. [ 305.922454][T19367] netlink: 'syz.6.5379': attribute type 7 has an invalid length. [ 305.930278][T19367] netlink: 8 bytes leftover after parsing attributes in process `syz.6.5379'. [ 305.955544][T19371] netlink: 8 bytes leftover after parsing attributes in process `syz.8.5382'. [ 306.244925][T19407] No such timeout policy "syz0" [ 306.381417][T19418] hub 6-0:1.0: USB hub found [ 306.395746][T19418] hub 6-0:1.0: 8 ports detected [ 306.723892][T19445] netlink: 'syz.2.5410': attribute type 7 has an invalid length. [ 306.749886][T19447] netlink: 'syz.8.5411': attribute type 7 has an invalid length. [ 306.999326][T19461] FAULT_INJECTION: forcing a failure. [ 306.999326][T19461] name failslab, interval 1, probability 0, space 0, times 0 [ 307.012147][T19461] CPU: 0 UID: 0 PID: 19461 Comm: +}[@ Tainted: G W 6.16.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 307.012284][T19461] Tainted: [W]=WARN [ 307.012294][T19461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 307.012311][T19461] Call Trace: [ 307.012320][T19461] [ 307.012330][T19461] __dump_stack+0x1d/0x30 [ 307.012359][T19461] dump_stack_lvl+0xe8/0x140 [ 307.012399][T19461] dump_stack+0x15/0x1b [ 307.012422][T19461] should_fail_ex+0x265/0x280 [ 307.012532][T19461] ? __hw_addr_add_ex+0x162/0x440 [ 307.012575][T19461] should_failslab+0x8c/0xb0 [ 307.012684][T19461] __kmalloc_cache_noprof+0x4c/0x320 [ 307.012727][T19461] __hw_addr_add_ex+0x162/0x440 [ 307.012779][T19461] dev_addr_init+0xb1/0x120 [ 307.012825][T19461] alloc_netdev_mqs+0x212/0xab0 [ 307.012865][T19461] ? __pfx_vlan_setup+0x10/0x10 [ 307.012912][T19461] rtnl_create_link+0x239/0x710 [ 307.012985][T19461] rtnl_newlink_create+0x14c/0x620 [ 307.013028][T19461] ? security_capable+0x83/0x90 [ 307.013071][T19461] ? netlink_ns_capable+0x86/0xa0 [ 307.013118][T19461] rtnl_newlink+0xf29/0x12d0 [ 307.013283][T19461] ? __bpf_ringbuf_reserve+0x45a/0x530 [ 307.013330][T19461] ? copy_from_kernel_nofault_allowed+0x9c/0xc0 [ 307.013373][T19461] ? rt2800_config_channel_rf55xx+0x69a0/0x97f0 [ 307.013448][T19461] ? __bpf_ringbuf_reserve+0x45a/0x530 [ 307.013488][T19461] ? copy_from_kernel_nofault_allowed+0x9c/0xc0 [ 307.013529][T19461] ? rt2800_config_channel_rf55xx+0x69a0/0x97f0 [ 307.013580][T19461] ? __rcu_read_unlock+0x4f/0x70 [ 307.013613][T19461] ? avc_has_perm_noaudit+0x1b1/0x200 [ 307.013735][T19461] ? selinux_capable+0x1f9/0x270 [ 307.013870][T19461] ? security_capable+0x83/0x90 [ 307.013941][T19461] ? ns_capable+0x7d/0xb0 [ 307.013966][T19461] ? __pfx_rtnl_newlink+0x10/0x10 [ 307.014002][T19461] rtnetlink_rcv_msg+0x5fe/0x6d0 [ 307.014038][T19461] ? avc_has_perm_noaudit+0x1b1/0x200 [ 307.014085][T19461] netlink_rcv_skb+0x120/0x220 [ 307.014240][T19461] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 307.014287][T19461] rtnetlink_rcv+0x1c/0x30 [ 307.014319][T19461] netlink_unicast+0x5a1/0x670 [ 307.014371][T19461] netlink_sendmsg+0x58b/0x6b0 [ 307.014406][T19461] ? __pfx_netlink_sendmsg+0x10/0x10 [ 307.014437][T19461] __sock_sendmsg+0x142/0x180 [ 307.014516][T19461] ____sys_sendmsg+0x345/0x4e0 [ 307.014612][T19461] ___sys_sendmsg+0x17b/0x1d0 [ 307.014667][T19461] __sys_sendmmsg+0x178/0x300 [ 307.014715][T19461] __x64_sys_sendmmsg+0x57/0x70 [ 307.014746][T19461] x64_sys_call+0x2f2f/0x2fb0 [ 307.014795][T19461] do_syscall_64+0xd2/0x200 [ 307.014823][T19461] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 307.014914][T19461] ? clear_bhb_loop+0x40/0x90 [ 307.014936][T19461] ? clear_bhb_loop+0x40/0x90 [ 307.014959][T19461] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 307.014982][T19461] RIP: 0033:0x7ff1bd41e929 [ 307.015039][T19461] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 307.015064][T19461] RSP: 002b:00007ff1bba87038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 307.015089][T19461] RAX: ffffffffffffffda RBX: 00007ff1bd645fa0 RCX: 00007ff1bd41e929 [ 307.015106][T19461] RDX: 040000000000009f RSI: 00002000000002c0 RDI: 0000000000000006 [ 307.015124][T19461] RBP: 00007ff1bba87090 R08: 0000000000000000 R09: 0000000000000000 [ 307.015140][T19461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 307.015194][T19461] R13: 0000000000000000 R14: 00007ff1bd645fa0 R15: 00007ffc12610598 [ 307.015251][T19461] [ 307.393760][T19463] IPVS: set_ctl: invalid protocol: 0 172.30.1.4:20004 [ 307.508909][T19472] netlink: 'syz.2.5421': attribute type 10 has an invalid length. [ 307.542293][T19472] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 307.550888][T19472] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 307.559288][T19472] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 307.567550][T19472] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 307.577711][T19472] geneve1: entered promiscuous mode [ 307.583040][T19472] geneve1: entered allmulticast mode [ 307.604674][T19472] team0: Port device geneve1 added [ 307.849707][T19517] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 309.120888][T19589] netlink: 'syz.2.5466': attribute type 7 has an invalid length. [ 309.194904][T19597] netlink: 'syz.8.5467': attribute type 21 has an invalid length. [ 309.345664][T19602] Falling back ldisc for ttyS3. [ 309.360568][T19611] IPv6: NLM_F_CREATE should be specified when creating new route [ 309.377914][T19606] netdevsim netdevsim3 eth3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 309.390450][T19611] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 309.400634][T19611] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 309.416878][T19606] netdevsim netdevsim3 eth2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 309.439389][ T29] kauditd_printk_skb: 226 callbacks suppressed [ 309.439405][ T29] audit: type=1400 audit(1749533859.073:14129): avc: denied { read write } for pid=19617 comm="syz.6.5478" name="uhid" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 309.469326][ T29] audit: type=1400 audit(1749533859.073:14130): avc: denied { open } for pid=19617 comm="syz.6.5478" path="/dev/uhid" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 309.500322][ T29] audit: type=1400 audit(1749533859.133:14131): avc: denied { read write } for pid=19619 comm="syz.2.5479" name="nvram" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 [ 309.524192][ T29] audit: type=1400 audit(1749533859.133:14132): avc: denied { open } for pid=19619 comm="syz.2.5479" path="/dev/nvram" dev="devtmpfs" ino=98 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nvram_device_t tclass=chr_file permissive=1 [ 309.559755][T19606] netdevsim netdevsim3 eth1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 309.582985][T19628] 9pnet_fd: Insufficient options for proto=fd [ 309.636398][T19606] netdevsim netdevsim3 eth0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 309.692463][T19606] netdevsim netdevsim3 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 309.704392][T19606] netdevsim netdevsim3 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 309.719650][T19606] netdevsim netdevsim3 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 309.734403][T19606] netdevsim netdevsim3 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 309.819421][T19638] bond0: entered promiscuous mode [ 309.824519][T19638] bond0: entered allmulticast mode [ 309.829895][T19638] 8021q: adding VLAN 0 to HW filter on device bond0 [ 309.843572][T19637] bond1: entered promiscuous mode [ 309.848799][T19637] bond1: entered allmulticast mode [ 309.854145][T19637] 8021q: adding VLAN 0 to HW filter on device bond1 [ 309.963520][T19649] FAULT_INJECTION: forcing a failure. [ 309.963520][T19649] name failslab, interval 1, probability 0, space 0, times 0 [ 309.976312][T19649] CPU: 0 UID: 0 PID: 19649 Comm: syz.6.5489 Tainted: G W 6.16.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 309.976352][T19649] Tainted: [W]=WARN [ 309.976359][T19649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 309.976435][T19649] Call Trace: [ 309.976444][T19649] [ 309.976454][T19649] __dump_stack+0x1d/0x30 [ 309.976482][T19649] dump_stack_lvl+0xe8/0x140 [ 309.976557][T19649] dump_stack+0x15/0x1b [ 309.976576][T19649] should_fail_ex+0x265/0x280 [ 309.976622][T19649] should_failslab+0x8c/0xb0 [ 309.976654][T19649] kmem_cache_alloc_node_noprof+0x57/0x320 [ 309.976708][T19649] ? __alloc_skb+0x101/0x320 [ 309.976747][T19649] __alloc_skb+0x101/0x320 [ 309.976783][T19649] rtmsg_ifinfo_build_skb+0x5f/0x1b0 [ 309.976805][T19649] ? rtmsg_ifinfo_build_skb+0x11c/0x1b0 [ 309.976895][T19649] rtmsg_ifinfo+0x6d/0x110 [ 309.976935][T19649] __dev_notify_flags+0x76/0x1a0 [ 309.976971][T19649] ? rtmsg_ifinfo+0xef/0x110 [ 309.976993][T19649] netif_change_flags+0xac/0xd0 [ 309.977088][T19649] do_setlink+0x9d2/0x2810 [ 309.977126][T19649] ? selinux_capable+0x1f9/0x270 [ 309.977175][T19649] ? security_capable+0x83/0x90 [ 309.977213][T19649] ? ns_capable+0x7d/0xb0 [ 309.977280][T19649] ? netlink_ns_capable+0x86/0xa0 [ 309.977360][T19649] rtnl_newlink+0xd8b/0x12d0 [ 309.977403][T19649] ? bcmp+0x5e/0x90 [ 309.977436][T19649] ? __rcu_read_unlock+0x34/0x70 [ 309.977482][T19649] ? bpf_trace_run3+0x12c/0x1d0 [ 309.977515][T19649] ? strlen+0x19/0x40 [ 309.977541][T19649] ? __kfree_skb+0x109/0x150 [ 309.977559][T19649] ? __memcg_slab_free_hook+0x135/0x230 [ 309.977687][T19649] ? __kfree_skb+0x109/0x150 [ 309.977706][T19649] ? __rcu_read_unlock+0x4f/0x70 [ 309.977808][T19649] ? avc_has_perm_noaudit+0x1b1/0x200 [ 309.977861][T19649] ? selinux_capable+0x1f9/0x270 [ 309.977912][T19649] ? security_capable+0x83/0x90 [ 309.978010][T19649] ? ns_capable+0x7d/0xb0 [ 309.978035][T19649] ? __pfx_rtnl_newlink+0x10/0x10 [ 309.978061][T19649] rtnetlink_rcv_msg+0x5fe/0x6d0 [ 309.978094][T19649] netlink_rcv_skb+0x120/0x220 [ 309.978144][T19649] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 309.978207][T19649] rtnetlink_rcv+0x1c/0x30 [ 309.978230][T19649] netlink_unicast+0x5a1/0x670 [ 309.978270][T19649] netlink_sendmsg+0x58b/0x6b0 [ 309.978299][T19649] ? __pfx_netlink_sendmsg+0x10/0x10 [ 309.978329][T19649] __sock_sendmsg+0x142/0x180 [ 309.978375][T19649] ____sys_sendmsg+0x31e/0x4e0 [ 309.978407][T19649] ___sys_sendmsg+0x17b/0x1d0 [ 309.978504][T19649] __x64_sys_sendmsg+0xd4/0x160 [ 309.978573][T19649] x64_sys_call+0x2999/0x2fb0 [ 309.978595][T19649] do_syscall_64+0xd2/0x200 [ 309.978616][T19649] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 309.978663][T19649] ? clear_bhb_loop+0x40/0x90 [ 309.978687][T19649] ? clear_bhb_loop+0x40/0x90 [ 309.978717][T19649] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 309.978752][T19649] RIP: 0033:0x7fc1f47ae929 [ 309.978802][T19649] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 309.978823][T19649] RSP: 002b:00007fc1f2e17038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 309.978899][T19649] RAX: ffffffffffffffda RBX: 00007fc1f49d5fa0 RCX: 00007fc1f47ae929 [ 309.978916][T19649] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 0000000000000006 [ 309.978932][T19649] RBP: 00007fc1f2e17090 R08: 0000000000000000 R09: 0000000000000000 [ 309.978949][T19649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 309.979036][T19649] R13: 0000000000000000 R14: 00007fc1f49d5fa0 R15: 00007ffc81929b18 [ 309.979064][T19649] [ 310.037024][ T29] audit: type=1400 audit(1749533859.673:14133): avc: denied { block_suspend } for pid=19650 comm="syz.8.5490" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 310.070864][T19649] $H: left promiscuous mode [ 310.190721][T19655] __nla_validate_parse: 14 callbacks suppressed [ 310.190741][T19655] netlink: 12 bytes leftover after parsing attributes in process `syz.9.5491'. [ 310.195059][T19649] bond_slave_0: left promiscuous mode [ 310.195160][T19649] bond_slave_1: left promiscuous mode [ 310.390305][T19649] 8021q: adding VLAN 0 to HW filter on device $H [ 310.432519][T19649] 8021q: adding VLAN 0 to HW filter on device team0 [ 310.458994][T19649] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 310.607334][T19677] netlink: 52 bytes leftover after parsing attributes in process `syz.9.5501'. [ 310.627962][T19680] netlink: 104 bytes leftover after parsing attributes in process `syz.2.5502'. [ 310.720964][T19686] FAULT_INJECTION: forcing a failure. [ 310.720964][T19686] name failslab, interval 1, probability 0, space 0, times 0 [ 310.733780][T19686] CPU: 0 UID: 0 PID: 19686 Comm: syz.9.5505 Tainted: G W 6.16.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 310.733820][T19686] Tainted: [W]=WARN [ 310.733903][T19686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 310.733917][T19686] Call Trace: [ 310.733924][T19686] [ 310.733933][T19686] __dump_stack+0x1d/0x30 [ 310.733957][T19686] dump_stack_lvl+0xe8/0x140 [ 310.733980][T19686] dump_stack+0x15/0x1b [ 310.734048][T19686] should_fail_ex+0x265/0x280 [ 310.734089][T19686] should_failslab+0x8c/0xb0 [ 310.734123][T19686] __kmalloc_noprof+0xa5/0x3e0 [ 310.734151][T19686] ? bpf_test_init+0xa9/0x160 [ 310.734175][T19686] bpf_test_init+0xa9/0x160 [ 310.734210][T19686] bpf_prog_test_run_xdp+0x274/0x910 [ 310.734234][T19686] ? kstrtouint+0x76/0xc0 [ 310.734269][T19686] ? __rcu_read_unlock+0x4f/0x70 [ 310.734301][T19686] ? __pfx_bpf_prog_test_run_xdp+0x10/0x10 [ 310.734343][T19686] bpf_prog_test_run+0x227/0x390 [ 310.734384][T19686] __sys_bpf+0x3dc/0x790 [ 310.734468][T19686] __x64_sys_bpf+0x41/0x50 [ 310.734500][T19686] x64_sys_call+0x2478/0x2fb0 [ 310.734523][T19686] do_syscall_64+0xd2/0x200 [ 310.734610][T19686] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 310.734639][T19686] ? clear_bhb_loop+0x40/0x90 [ 310.734663][T19686] ? clear_bhb_loop+0x40/0x90 [ 310.734688][T19686] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 310.734711][T19686] RIP: 0033:0x7fb09064e929 [ 310.734798][T19686] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 310.734819][T19686] RSP: 002b:00007fb08ecb7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 310.734840][T19686] RAX: ffffffffffffffda RBX: 00007fb090875fa0 RCX: 00007fb09064e929 [ 310.734855][T19686] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 310.734869][T19686] RBP: 00007fb08ecb7090 R08: 0000000000000000 R09: 0000000000000000 [ 310.734882][T19686] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 310.734896][T19686] R13: 0000000000000000 R14: 00007fb090875fa0 R15: 00007ffebfc71fd8 [ 310.734963][T19686] [ 310.991303][ T29] audit: type=1400 audit(1749533860.613:14134): avc: denied { connect } for pid=19672 comm="syz.6.5500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 311.100080][T19715] x_tables: duplicate underflow at hook 1 [ 311.148613][T19719] netlink: 52 bytes leftover after parsing attributes in process `syz.2.5516'. [ 311.227967][T19708] IPVS: sed: UDP 224.0.0.2:0 - no destination available [ 311.236205][ T6698] IPVS: starting estimator thread 0... [ 311.355880][T19724] IPVS: using max 2448 ests per chain, 122400 per kthread [ 311.366804][ T29] audit: type=1400 audit(1749533861.003:14135): avc: denied { map } for pid=19728 comm="syz.9.5519" path="/dev/usbmon0" dev="devtmpfs" ino=141 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 311.400959][T19727] netlink: 8 bytes leftover after parsing attributes in process `syz.6.5518'. [ 311.479340][T19737] netlink: 56 bytes leftover after parsing attributes in process `syz.8.5523'. [ 311.612418][T19752] workqueue: Failed to create a rescuer kthread for wq "wg-crypt-wireguard%d": -EINTR [ 311.766669][T19778] netlink: 12 bytes leftover after parsing attributes in process `syz.8.5539'. [ 311.788594][T19778] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=41664 sclass=netlink_route_socket pid=19778 comm=syz.8.5539 [ 311.793616][T19780] ip6erspan0: entered promiscuous mode [ 311.807001][T19780] ip6erspan0: entered allmulticast mode [ 311.841814][T19778] netdevsim netdevsim8 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 311.887368][T19788] netlink: 332 bytes leftover after parsing attributes in process `syz.9.5544'. [ 311.919579][T19792] lo speed is unknown, defaulting to 1000 [ 311.954200][T19788] validate_nla: 3 callbacks suppressed [ 311.954225][T19788] netlink: 'syz.9.5544': attribute type 9 has an invalid length. [ 311.967625][T19788] netlink: 108 bytes leftover after parsing attributes in process `syz.9.5544'. [ 311.976778][T19788] netlink: 32 bytes leftover after parsing attributes in process `syz.9.5544'. [ 311.989341][T19778] netdevsim netdevsim8 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 312.059120][T19792] lo speed is unknown, defaulting to 1000 [ 312.098869][T19778] netdevsim netdevsim8 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 312.124579][ T29] audit: type=1326 audit(1749533861.753:14136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19805 comm="syz.3.5550" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9bde02e929 code=0x7ffc0000 [ 312.158882][ T29] audit: type=1326 audit(1749533861.793:14137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19805 comm="syz.3.5550" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9bde02e929 code=0x7ffc0000 [ 312.182688][ T29] audit: type=1326 audit(1749533861.793:14138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19805 comm="syz.3.5550" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9bde02e929 code=0x7ffc0000 [ 312.209002][T19807] siw: device registration error -23 [ 312.217829][T19778] netdevsim netdevsim8 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 312.301441][T19778] netdevsim netdevsim8 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 312.344388][T19778] netdevsim netdevsim8 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 312.378095][T19778] netdevsim netdevsim8 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 312.438433][T19778] netdevsim netdevsim8 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 312.477642][T19785] geneve2: entered promiscuous mode [ 312.482928][T19785] geneve2: entered allmulticast mode [ 312.706486][T19819] lo speed is unknown, defaulting to 1000 [ 312.784561][T19819] lo speed is unknown, defaulting to 1000 [ 312.886879][T19819] chnl_net:caif_netlink_parms(): no params data found [ 312.905918][T19875] netlink: 'syz.6.5567': attribute type 7 has an invalid length. [ 313.006516][T19819] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.013879][T19819] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.021388][T19819] bridge_slave_0: entered allmulticast mode [ 313.029653][T19819] bridge_slave_0: entered promiscuous mode [ 313.036805][T19819] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.043952][T19819] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.051445][T19819] bridge_slave_1: entered allmulticast mode [ 313.058384][T19819] bridge_slave_1: entered promiscuous mode [ 313.078350][T19819] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 313.096712][T19819] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 313.211392][T19819] team0: Port device team_slave_0 added [ 313.229526][T19819] team0: Port device team_slave_1 added [ 313.252941][T19819] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 313.260072][T19819] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 313.286232][T19819] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 313.304567][T19819] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 313.311758][T19819] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 313.337859][T19819] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 313.430755][T19819] hsr_slave_0: entered promiscuous mode [ 313.437107][T19819] hsr_slave_1: entered promiscuous mode [ 313.443471][T19819] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 313.451320][T19819] Cannot create hsr debugfs directory [ 313.610110][T19908] netdevsim netdevsim9 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 313.628324][T19819] netdevsim netdevsim3 eth3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 313.639777][T19910] netlink: 'syz.8.5578': attribute type 7 has an invalid length. [ 313.731258][T19908] netdevsim netdevsim9 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 313.766810][T19819] netdevsim netdevsim3 eth2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 313.828198][T19908] netdevsim netdevsim9 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 313.858433][T19819] netdevsim netdevsim3 eth1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 313.909188][T19908] netdevsim netdevsim9 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 313.947180][T19819] netdevsim netdevsim3 eth0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 313.995676][T19908] netdevsim netdevsim9 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 314.008385][T19908] netdevsim netdevsim9 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 314.021124][T19908] netdevsim netdevsim9 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 314.037133][T19908] netdevsim netdevsim9 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 314.074353][T19819] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 314.087889][T19819] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 314.105622][T19819] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 314.118152][T19819] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 314.193600][T19819] 8021q: adding VLAN 0 to HW filter on device bond0 [ 314.207693][T19819] 8021q: adding VLAN 0 to HW filter on device team0 [ 314.221621][ T5498] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.228750][ T5498] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.258527][ T5498] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.265669][ T5498] bridge0: port 2(bridge_slave_1) entered forwarding state [ 314.314900][T19819] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 314.448779][T19819] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 314.711763][T19819] veth0_vlan: entered promiscuous mode [ 314.755624][T19819] veth1_vlan: entered promiscuous mode [ 314.816832][T19819] veth0_macvtap: entered promiscuous mode [ 314.852501][T19819] veth1_macvtap: entered promiscuous mode [ 314.911252][T19819] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 314.945238][T19819] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 314.977819][T19819] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 314.986751][T19819] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 314.995693][T19819] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 315.004403][T19819] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 315.362727][ T29] kauditd_printk_skb: 79 callbacks suppressed [ 315.362834][ T29] audit: type=1326 audit(1749533864.993:14218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19987 comm="syz.2.5599" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff1bd41e929 code=0x7ffc0000 [ 315.407049][ T29] audit: type=1326 audit(1749533865.013:14219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19987 comm="syz.2.5599" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff1bd41e929 code=0x7ffc0000 [ 315.431042][ T29] audit: type=1326 audit(1749533865.013:14220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19987 comm="syz.2.5599" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff1bd41e929 code=0x7ffc0000 [ 315.454804][ T29] audit: type=1326 audit(1749533865.013:14221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19987 comm="syz.2.5599" exe="/root/syz-executor" sig=0 arch=c000003e syscall=165 compat=0 ip=0x7ff1bd41e929 code=0x7ffc0000 [ 315.478555][ T29] audit: type=1326 audit(1749533865.013:14222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19987 comm="syz.2.5599" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff1bd41e929 code=0x7ffc0000 [ 316.190868][T20015] __nla_validate_parse: 10 callbacks suppressed [ 316.190887][T20015] netlink: 64 bytes leftover after parsing attributes in process `syz.9.5611'. [ 316.219205][T20017] xt_CT: You must specify a L4 protocol and not use inversions on it [ 316.220740][T20015] geneve2: entered promiscuous mode [ 316.232771][T20015] geneve2: entered allmulticast mode [ 316.247768][T20023] netlink: 52 bytes leftover after parsing attributes in process `syz.8.5614'. [ 316.370565][T20041] netlink: 16 bytes leftover after parsing attributes in process `syz.8.5620'. [ 316.379910][T20041] netlink: 16 bytes leftover after parsing attributes in process `syz.8.5620'. [ 316.391230][ T29] audit: type=1326 audit(1749533866.003:14223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20038 comm="syz.9.5619" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb09064e929 code=0x7ffc0000 [ 316.415220][ T29] audit: type=1326 audit(1749533866.003:14224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20038 comm="syz.9.5619" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb09064e929 code=0x7ffc0000 [ 316.438961][ T29] audit: type=1326 audit(1749533866.003:14225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20038 comm="syz.9.5619" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb09064e929 code=0x7ffc0000 [ 316.462685][ T29] audit: type=1326 audit(1749533866.003:14226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20038 comm="syz.9.5619" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb09064e929 code=0x7ffc0000 [ 316.486481][ T29] audit: type=1326 audit(1749533866.003:14227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20038 comm="syz.9.5619" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb09064e929 code=0x7ffc0000 [ 316.705463][T20066] xt_TPROXY: Can be used only with -p tcp or -p udp [ 316.801661][T20073] FAULT_INJECTION: forcing a failure. [ 316.801661][T20073] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 316.814968][T20073] CPU: 1 UID: 0 PID: 20073 Comm: syz.3.5629 Tainted: G W 6.16.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 316.815006][T20073] Tainted: [W]=WARN [ 316.815013][T20073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 316.815029][T20073] Call Trace: [ 316.815035][T20073] [ 316.815115][T20073] __dump_stack+0x1d/0x30 [ 316.815215][T20073] dump_stack_lvl+0xe8/0x140 [ 316.815260][T20073] dump_stack+0x15/0x1b [ 316.815282][T20073] should_fail_ex+0x265/0x280 [ 316.815325][T20073] should_fail+0xb/0x20 [ 316.815407][T20073] should_fail_usercopy+0x1a/0x20 [ 316.815438][T20073] copy_folio_from_iter_atomic+0x278/0x1170 [ 316.815522][T20073] ? shmem_write_begin+0xa8/0x190 [ 316.815564][T20073] ? shmem_write_begin+0xe1/0x190 [ 316.815607][T20073] generic_perform_write+0x2c2/0x490 [ 316.815677][T20073] shmem_file_write_iter+0xc5/0xf0 [ 316.815705][T20073] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 316.815731][T20073] vfs_write+0x49d/0x8e0 [ 316.815788][T20073] ksys_write+0xda/0x1a0 [ 316.815814][T20073] __x64_sys_write+0x40/0x50 [ 316.815838][T20073] x64_sys_call+0x2cdd/0x2fb0 [ 316.815863][T20073] do_syscall_64+0xd2/0x200 [ 316.815967][T20073] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 316.816002][T20073] ? clear_bhb_loop+0x40/0x90 [ 316.816029][T20073] ? clear_bhb_loop+0x40/0x90 [ 316.816062][T20073] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 316.816086][T20073] RIP: 0033:0x7fc67a40e929 [ 316.816128][T20073] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 316.816147][T20073] RSP: 002b:00007fc678a77038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 316.816214][T20073] RAX: ffffffffffffffda RBX: 00007fc67a635fa0 RCX: 00007fc67a40e929 [ 316.816230][T20073] RDX: 00000000ffffffd7 RSI: 0000200000000000 RDI: 0000000000000005 [ 316.816265][T20073] RBP: 00007fc678a77090 R08: 0000000000000000 R09: 0000000000000000 [ 316.816277][T20073] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 316.816360][T20073] R13: 0000000000000000 R14: 00007fc67a635fa0 R15: 00007ffc726d7628 [ 316.816388][T20073] [ 317.125378][T20066] wireguard0: entered promiscuous mode [ 317.318815][T20070] netlink: 40 bytes leftover after parsing attributes in process `syz.8.5628'. [ 317.340419][T20070] netlink: 40 bytes leftover after parsing attributes in process `syz.8.5628'. [ 317.397267][T20070] netlink: 40 bytes leftover after parsing attributes in process `syz.8.5628'. [ 317.427840][T20090] netlink: 'syz.9.5632': attribute type 1 has an invalid length. [ 317.457592][T20090] 8021q: adding VLAN 0 to HW filter on device bond1 [ 317.518097][T20093] bond1: (slave gretap1): making interface the new active one [ 317.556188][T20093] bond1: (slave gretap1): Enslaving as an active interface with an up link [ 318.867360][T20140] FAULT_INJECTION: forcing a failure. [ 318.867360][T20140] name failslab, interval 1, probability 0, space 0, times 0 [ 318.880165][T20140] CPU: 1 UID: 0 PID: 20140 Comm: syz.3.5647 Tainted: G W 6.16.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 318.880252][T20140] Tainted: [W]=WARN [ 318.880259][T20140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 318.880271][T20140] Call Trace: [ 318.880278][T20140] [ 318.880287][T20140] __dump_stack+0x1d/0x30 [ 318.880328][T20140] dump_stack_lvl+0xe8/0x140 [ 318.880362][T20140] dump_stack+0x15/0x1b [ 318.880382][T20140] should_fail_ex+0x265/0x280 [ 318.880500][T20140] should_failslab+0x8c/0xb0 [ 318.880522][T20140] kmem_cache_alloc_noprof+0x50/0x310 [ 318.880629][T20140] ? skb_clone+0x151/0x1f0 [ 318.880664][T20140] skb_clone+0x151/0x1f0 [ 318.880688][T20140] ip_mc_output+0x10d/0x340 [ 318.880737][T20140] ? __pfx_dst_output+0x10/0x10 [ 318.880772][T20140] ? __pfx_ip_mc_output+0x10/0x10 [ 318.880871][T20140] ip_send_skb+0x136/0x140 [ 318.880901][T20140] udp_send_skb+0x6e3/0xa40 [ 318.880956][T20140] udp_sendmsg+0x48d/0x13b0 [ 318.881023][T20140] ? mntput+0x4b/0x80 [ 318.881068][T20140] ? __rcu_read_unlock+0x4f/0x70 [ 318.881090][T20140] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 318.881125][T20140] ? avc_has_perm+0xd3/0x150 [ 318.881243][T20140] ? __pfx_udp_sendmsg+0x10/0x10 [ 318.881377][T20140] inet_sendmsg+0xac/0xd0 [ 318.881401][T20140] __sock_sendmsg+0x102/0x180 [ 318.881512][T20140] __sys_sendto+0x268/0x330 [ 318.881623][T20140] __x64_sys_sendto+0x76/0x90 [ 318.881658][T20140] x64_sys_call+0x2eb6/0x2fb0 [ 318.881684][T20140] do_syscall_64+0xd2/0x200 [ 318.881779][T20140] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 318.881810][T20140] ? clear_bhb_loop+0x40/0x90 [ 318.881832][T20140] ? clear_bhb_loop+0x40/0x90 [ 318.881860][T20140] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 318.881888][T20140] RIP: 0033:0x7fc67a40e929 [ 318.881908][T20140] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 318.881933][T20140] RSP: 002b:00007fc678a77038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 318.882009][T20140] RAX: ffffffffffffffda RBX: 00007fc67a635fa0 RCX: 00007fc67a40e929 [ 318.882026][T20140] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 318.882041][T20140] RBP: 00007fc678a77090 R08: 0000000000000000 R09: 0000000000000000 [ 318.882058][T20140] R10: 0000000012000000 R11: 0000000000000246 R12: 0000000000000001 [ 318.882075][T20140] R13: 0000000000000000 R14: 00007fc67a635fa0 R15: 00007ffc726d7628 [ 318.882098][T20140] [ 319.320010][T20150] 9pnet: Could not find request transport: |d?| [ 319.327732][T20153] netlink: 52 bytes leftover after parsing attributes in process `syz.9.5653'. [ 319.447705][T20160] netlink: 4 bytes leftover after parsing attributes in process `syz.9.5656'. [ 319.476379][T20160] netlink: 4 bytes leftover after parsing attributes in process `syz.9.5656'. [ 320.044941][T20170] netlink: 'syz.9.5670': attribute type 7 has an invalid length. [ 320.592429][ T29] kauditd_printk_skb: 59 callbacks suppressed [ 320.592448][ T29] audit: type=1326 audit(1749533870.223:14287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20213 comm="syz.2.5677" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7ff1bd41e929 code=0x0 [ 320.816813][ T29] audit: type=1400 audit(1749533870.423:14288): avc: denied { read } for pid=20228 comm="syz.3.5682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 321.251894][T20275] __nla_validate_parse: 5 callbacks suppressed [ 321.251913][T20275] netlink: 8 bytes leftover after parsing attributes in process `syz.3.5700'. [ 321.633802][ T29] audit: type=1401 audit(1749533871.263:14289): op=setxattr invalid_context="" [ 321.646782][T20308] FAULT_INJECTION: forcing a failure. [ 321.646782][T20308] name failslab, interval 1, probability 0, space 0, times 0 [ 321.659539][T20308] CPU: 0 UID: 0 PID: 20308 Comm: syz.3.5715 Tainted: G W 6.16.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 321.659650][T20308] Tainted: [W]=WARN [ 321.659658][T20308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 321.659673][T20308] Call Trace: [ 321.659682][T20308] [ 321.659692][T20308] __dump_stack+0x1d/0x30 [ 321.659718][T20308] dump_stack_lvl+0xe8/0x140 [ 321.659814][T20308] dump_stack+0x15/0x1b [ 321.659835][T20308] should_fail_ex+0x265/0x280 [ 321.659881][T20308] should_failslab+0x8c/0xb0 [ 321.659941][T20308] __kvmalloc_node_noprof+0x123/0x4e0 [ 321.660050][T20308] ? xt_alloc_table_info+0x3b/0x80 [ 321.660072][T20308] ? should_fail_ex+0xdb/0x280 [ 321.660109][T20308] xt_alloc_table_info+0x3b/0x80 [ 321.660205][T20308] do_ip6t_set_ctl+0x5a5/0x840 [ 321.660242][T20308] ? kstrtoull+0x111/0x140 [ 321.660274][T20308] ? __rcu_read_unlock+0x4f/0x70 [ 321.660311][T20308] nf_setsockopt+0x199/0x1b0 [ 321.660413][T20308] ipv6_setsockopt+0x11a/0x130 [ 321.660450][T20308] tcp_setsockopt+0x95/0xb0 [ 321.660477][T20308] sock_common_setsockopt+0x69/0x80 [ 321.660520][T20308] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 321.660559][T20308] __sys_setsockopt+0x184/0x200 [ 321.660582][T20308] __x64_sys_setsockopt+0x64/0x80 [ 321.660602][T20308] x64_sys_call+0x2bd5/0x2fb0 [ 321.660686][T20308] do_syscall_64+0xd2/0x200 [ 321.660714][T20308] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 321.660810][T20308] ? clear_bhb_loop+0x40/0x90 [ 321.660850][T20308] ? clear_bhb_loop+0x40/0x90 [ 321.660879][T20308] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 321.660923][T20308] RIP: 0033:0x7fc67a40e929 [ 321.660944][T20308] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 321.661044][T20308] RSP: 002b:00007fc678a77038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 321.661070][T20308] RAX: ffffffffffffffda RBX: 00007fc67a635fa0 RCX: 00007fc67a40e929 [ 321.661087][T20308] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 321.661103][T20308] RBP: 00007fc678a77090 R08: 0000000000000450 R09: 0000000000000000 [ 321.661161][T20308] R10: 00002000000010c0 R11: 0000000000000246 R12: 0000000000000001 [ 321.661177][T20308] R13: 0000000000000000 R14: 00007fc67a635fa0 R15: 00007ffc726d7628 [ 321.661202][T20308] [ 321.935312][T20305] usb usb9: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 321.942914][T20305] vhci_hcd: default hub control req: 1f03 v0017 i0001 l0 [ 322.005962][T20319] netlink: 'syz.6.5720': attribute type 7 has an invalid length. [ 322.013783][T20319] netlink: 8 bytes leftover after parsing attributes in process `syz.6.5720'. [ 322.029009][ T29] audit: type=1400 audit(1749533871.663:14290): avc: denied { mount } for pid=20314 comm="syz.3.5717" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 322.195826][ T29] audit: type=1400 audit(1749533871.833:14291): avc: denied { mount } for pid=20329 comm="syz.9.5725" name="/" dev="ramfs" ino=67218 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 322.809261][ T29] audit: type=1400 audit(1749533872.443:14292): avc: denied { setopt } for pid=20354 comm="syz.3.5730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 322.970895][ T29] audit: type=1326 audit(1749533872.603:14293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20360 comm="syz.3.5733" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc67a40e929 code=0x7ffc0000 [ 322.976083][T20361] netlink: 8 bytes leftover after parsing attributes in process `+}[@'. [ 323.002715][ T29] audit: type=1326 audit(1749533872.603:14294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20360 comm="syz.3.5733" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc67a40e929 code=0x7ffc0000 [ 323.026665][ T29] audit: type=1326 audit(1749533872.603:14295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20360 comm="syz.3.5733" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc67a40e929 code=0x7ffc0000 [ 323.050518][ T29] audit: type=1326 audit(1749533872.603:14296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20360 comm="syz.3.5733" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc67a40e929 code=0x7ffc0000 [ 323.076381][T20365] hub 1-0:1.0: USB hub found [ 323.110855][T20365] hub 1-0:1.0: 8 ports detected [ 323.113091][ T6676] hid-generic 0003:0004:0000.0015: unknown main item tag 0x0 [ 323.123330][ T6676] hid-generic 0003:0004:0000.0015: unknown main item tag 0x0 [ 323.131005][ T6676] hid-generic 0003:0004:0000.0015: unknown main item tag 0x0 [ 323.139717][ T6676] hid-generic 0003:0004:0000.0015: hidraw0: USB HID v0.00 Device [syz0] on syz1 [ 323.484891][T20380] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 323.649817][T20396] netlink: 340 bytes leftover after parsing attributes in process `syz.6.5746'. [ 323.662344][T20396] netlink: 12 bytes leftover after parsing attributes in process `syz.6.5746'. [ 323.724341][T20399] netlink: 268 bytes leftover after parsing attributes in process `syz.6.5748'. [ 323.960899][T20418] syzkaller1: entered promiscuous mode [ 323.966632][T20418] syzkaller1: entered allmulticast mode [ 324.040085][T20427] pim6reg1: entered promiscuous mode [ 324.045581][T20427] pim6reg1: entered allmulticast mode [ 324.053686][T20427] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 324.062637][T20427] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 324.465557][T20444] Falling back ldisc for ttyS3. [ 324.602188][T20449] syzkaller0: entered promiscuous mode [ 324.608059][T20449] syzkaller0: entered allmulticast mode [ 324.664209][T20455] netlink: 268 bytes leftover after parsing attributes in process `syz.2.5769'. [ 324.707972][T20462] netlink: 128 bytes leftover after parsing attributes in process `syz.3.5772'. [ 324.717480][T20462] netlink: 8 bytes leftover after parsing attributes in process `syz.3.5772'. [ 324.821628][T20473] bridge2: entered allmulticast mode [ 324.852753][T20477] syz.9.5778 (20477): /proc/20476/oom_adj is deprecated, please use /proc/20476/oom_score_adj instead. [ 324.867436][ T6718] kernel write not supported for file bpf-prog (pid: 6718 comm: kworker/1:16) [ 324.903069][T20483] netlink: 48 bytes leftover after parsing attributes in process `syz.9.5781'. [ 325.075930][T20504] vlan0: entered promiscuous mode [ 325.083055][T20504] A link change request failed with some changes committed already. Interface vlan0 may have been left with an inconsistent configuration, please check. [ 325.139486][T20492] lo speed is unknown, defaulting to 1000 [ 325.184256][T20492] lo speed is unknown, defaulting to 1000 [ 325.245680][T20518] bond2: entered promiscuous mode [ 325.250741][T20518] bond2: entered allmulticast mode [ 325.256241][T20518] 8021q: adding VLAN 0 to HW filter on device bond2 [ 325.284692][T20492] chnl_net:caif_netlink_parms(): no params data found [ 325.340074][T20492] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.347447][T20492] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.354657][T20492] bridge_slave_0: entered allmulticast mode [ 325.361542][T20492] bridge_slave_0: entered promiscuous mode [ 325.368637][T20492] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.375734][T20492] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.382995][T20492] bridge_slave_1: entered allmulticast mode [ 325.389559][T20492] bridge_slave_1: entered promiscuous mode [ 325.411007][T20492] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 325.422120][T20492] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 325.448984][T20492] team0: Port device team_slave_0 added [ 325.458208][T20492] team0: Port device team_slave_1 added [ 325.481429][T20492] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 325.488554][T20492] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 325.514785][T20492] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 325.530049][T20492] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 325.537082][T20492] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 325.563344][T20492] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 325.602653][T20492] hsr_slave_0: entered promiscuous mode [ 325.609755][T20492] hsr_slave_1: entered promiscuous mode [ 325.615782][T20492] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 325.623368][T20492] Cannot create hsr debugfs directory [ 325.690407][T20544] netlink: 'syz.3.5800': attribute type 27 has an invalid length. [ 325.742722][ T29] kauditd_printk_skb: 130 callbacks suppressed [ 325.742741][ T29] audit: type=1400 audit(1749533875.373:14427): avc: denied { override_creds } for pid=20541 comm="syz.3.5800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 326.926410][ T29] audit: type=1326 audit(1749533876.553:14428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20554 comm="syz.8.5804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09524ee929 code=0x7ffc0000 [ 326.950102][ T29] audit: type=1326 audit(1749533876.553:14429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20554 comm="syz.8.5804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09524ee929 code=0x7ffc0000 [ 326.973851][ T29] audit: type=1326 audit(1749533876.553:14430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20554 comm="syz.8.5804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f09524ee929 code=0x7ffc0000 [ 326.997574][ T29] audit: type=1326 audit(1749533876.553:14431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20554 comm="syz.8.5804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09524ee929 code=0x7ffc0000 [ 327.036831][T20563] netlink: 'syz.9.5806': attribute type 6 has an invalid length. [ 327.042609][T20544] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.052009][T20544] bridge0: port 1(bridge_slave_0) entered disabled state [ 328.074532][T20544] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 328.178337][T20544] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 328.552678][ T29] audit: type=1400 audit(1749533878.183:14432): avc: denied { recv } for pid=6681 comm="kworker/1:5" saddr=10.128.0.163 src=37166 daddr=10.128.0.94 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 328.727791][T20544] netdevsim netdevsim3 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 328.736901][T20544] netdevsim netdevsim3 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 328.745961][T20544] netdevsim netdevsim3 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 328.754994][T20544] netdevsim netdevsim3 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 328.998936][T20585] __nla_validate_parse: 4 callbacks suppressed [ 328.999046][T20585] netlink: 8 bytes leftover after parsing attributes in process `syz.9.5813'. [ 329.014218][T20585] netlink: 'syz.9.5813': attribute type 30 has an invalid length. [ 329.050943][T20492] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 329.064981][T20589] netlink: 8 bytes leftover after parsing attributes in process `syz.9.5813'. [ 329.111187][T20585] netdevsim netdevsim9 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 329.119508][T20585] netdevsim netdevsim9 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 329.127780][T20585] netdevsim netdevsim9 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 329.136243][T20585] netdevsim netdevsim9 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 329.153817][T20589] veth2: entered promiscuous mode [ 329.167735][T20589] veth3: entered promiscuous mode [ 329.172904][T20589] veth3: entered allmulticast mode [ 329.184252][T20492] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 329.253305][T20492] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 329.326451][T20492] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 329.356672][T20587] netlink: 96 bytes leftover after parsing attributes in process `syz.8.5814'. [ 329.381578][T20602] netlink: 'syz.9.5818': attribute type 10 has an invalid length. [ 329.389576][T20602] netlink: 40 bytes leftover after parsing attributes in process `syz.9.5818'. [ 329.438804][T20602] netdevsim netdevsim9 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 329.447309][T20602] netdevsim netdevsim9 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 329.455781][T20602] netdevsim netdevsim9 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 329.464209][T20602] netdevsim netdevsim9 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 329.483669][T20602] netdevsim netdevsim9 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 329.492037][T20602] netdevsim netdevsim9 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 329.500329][T20602] netdevsim netdevsim9 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 329.508588][T20602] netdevsim netdevsim9 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 329.521655][T20602] team0: Port device geneve1 added [ 329.549681][T20590] lo speed is unknown, defaulting to 1000 [ 329.554610][T20492] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 329.567230][T20492] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 329.576829][T20492] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 329.586030][T20492] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 329.696016][T20492] 8021q: adding VLAN 0 to HW filter on device bond0 [ 329.736486][T20492] 8021q: adding VLAN 0 to HW filter on device team0 [ 329.760617][ T5554] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.767806][ T5554] bridge0: port 1(bridge_slave_0) entered forwarding state [ 329.811593][ T5554] bridge0: port 2(bridge_slave_1) entered blocking state [ 329.818889][ T5554] bridge0: port 2(bridge_slave_1) entered forwarding state [ 329.837476][T20492] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 329.927327][T20492] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 330.050317][T20590] lo speed is unknown, defaulting to 1000 [ 330.163530][T20492] veth0_vlan: entered promiscuous mode [ 330.180191][T20492] veth1_vlan: entered promiscuous mode [ 330.202823][T20492] veth0_macvtap: entered promiscuous mode [ 330.211380][T20492] veth1_macvtap: entered promiscuous mode [ 330.225826][T20492] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 330.236687][T20492] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 330.254156][T20645] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 330.290757][T20492] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 330.299640][T20492] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 330.308432][T20492] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 330.317277][T20492] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 330.625927][ T29] audit: type=1400 audit(1749533880.263:14433): avc: denied { bind } for pid=20652 comm="syz.9.5830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 331.550085][ T29] audit: type=1400 audit(1749533881.183:14434): avc: denied { name_bind } for pid=20679 comm="syz.6.5838" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 331.714348][ T29] audit: type=1326 audit(1749533881.343:14435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20689 comm="syz.2.5841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f07e40ae929 code=0x7ffc0000 [ 331.752607][ T29] audit: type=1326 audit(1749533881.343:14436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20689 comm="syz.2.5841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f07e40ae929 code=0x7ffc0000 [ 331.776324][ T29] audit: type=1326 audit(1749533881.343:14437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20689 comm="syz.2.5841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f07e40ae929 code=0x7ffc0000 [ 331.800000][ T29] audit: type=1326 audit(1749533881.343:14438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20689 comm="syz.2.5841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f07e40ae929 code=0x7ffc0000 [ 331.823882][ T29] audit: type=1326 audit(1749533881.343:14439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20689 comm="syz.2.5841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f07e40ae929 code=0x7ffc0000 [ 331.847549][ T29] audit: type=1326 audit(1749533881.343:14440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20689 comm="syz.2.5841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f07e40ae929 code=0x7ffc0000 [ 331.872164][ T29] audit: type=1326 audit(1749533881.343:14441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20689 comm="syz.2.5841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f07e40ae929 code=0x7ffc0000 [ 331.895861][ T29] audit: type=1326 audit(1749533881.343:14442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20689 comm="syz.2.5841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f07e40ae929 code=0x7ffc0000 [ 331.919517][ T29] audit: type=1326 audit(1749533881.343:14443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20689 comm="syz.2.5841" exe="/root/syz-executor" sig=0 arch=c000003e syscall=302 compat=0 ip=0x7f07e40ae929 code=0x7ffc0000 [ 332.045773][T20699] xt_CT: You must specify a L4 protocol and not use inversions on it [ 332.070170][T20699] vhci_hcd: invalid port number 15 [ 332.075498][T20699] vhci_hcd: invalid port number 15 [ 332.214557][T20714] netlink: 12 bytes leftover after parsing attributes in process `syz.2.5849'. [ 332.236000][T20714] vlan2: entered promiscuous mode [ 332.241414][T20714] batadv0: entered promiscuous mode [ 332.416335][T20728] netlink: 'syz.8.5855': attribute type 15 has an invalid length. [ 332.428910][T20728] netlink: 'syz.8.5855': attribute type 13 has an invalid length. [ 332.618525][T20728] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 332.640404][T20728] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 332.686644][T20728] veth0_macvtap: left allmulticast mode [ 332.699742][T20728] netdevsim netdevsim8 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 332.708346][T20728] netdevsim netdevsim8 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 332.716847][T20728] netdevsim netdevsim8 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 332.725340][T20728] netdevsim netdevsim8 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 333.023781][T20762] siw: device registration error -23 [ 333.099056][T20766] netem: change failed [ 333.161330][T20747] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 333.172631][T20747] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 333.240558][T20777] tmpfs: Unknown parameter 'nosap' [ 333.623568][T20789] netlink: 9 bytes leftover after parsing attributes in process `syz.2.5878'. [ 333.676422][T20787] bridge_slave_0: left allmulticast mode [ 333.682142][T20787] bridge_slave_0: left promiscuous mode [ 333.688129][T20787] bridge0: port 1(bridge_slave_0) entered disabled state [ 333.798049][T20787] bridge_slave_1: left allmulticast mode [ 333.803782][T20787] bridge_slave_1: left promiscuous mode [ 333.809676][T20787] bridge0: port 2(bridge_slave_1) entered disabled state [ 333.899753][T20787] bond0: (slave bond_slave_0): Releasing backup interface [ 333.909880][T20787] bond0: (slave bond_slave_1): Releasing backup interface [ 333.920905][T20787] team0: Port device team_slave_0 removed [ 333.929730][T20787] team0: Port device team_slave_1 removed [ 333.937715][T20787] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 333.951476][T20787] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 333.961597][T20789] 0: renamed from hsr0 (while UP) [ 333.970544][T20789] 0: entered allmulticast mode [ 333.975495][T20789] hsr_slave_0: entered allmulticast mode [ 333.981236][T20789] hsr_slave_1: entered allmulticast mode [ 333.990010][T20789] A link change request failed with some changes committed already. Interface 70 may have been left with an inconsistent configuration, please check. [ 334.398094][T20819] usb usb1: usbfs: interface 0 claimed by hub while 'syz.8.5888' sets config #1 [ 334.667864][T20855] netlink: 8 bytes leftover after parsing attributes in process `syz.3.5901'. [ 334.779281][T20866] FAULT_INJECTION: forcing a failure. [ 334.779281][T20866] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 334.792630][T20866] CPU: 1 UID: 0 PID: 20866 Comm: syz.9.5905 Tainted: G W 6.16.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 334.792673][T20866] Tainted: [W]=WARN [ 334.792682][T20866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 334.792698][T20866] Call Trace: [ 334.792707][T20866] [ 334.792718][T20866] __dump_stack+0x1d/0x30 [ 334.792745][T20866] dump_stack_lvl+0xe8/0x140 [ 334.792837][T20866] dump_stack+0x15/0x1b [ 334.792890][T20866] should_fail_ex+0x265/0x280 [ 334.792937][T20866] should_fail_alloc_page+0xf2/0x100 [ 334.793008][T20866] __alloc_frozen_pages_noprof+0xff/0x360 [ 334.793059][T20866] alloc_pages_mpol+0xb3/0x250 [ 334.793101][T20866] folio_alloc_mpol_noprof+0x39/0x80 [ 334.793197][T20866] shmem_get_folio_gfp+0x3cf/0xd60 [ 334.793299][T20866] shmem_write_begin+0xa8/0x190 [ 334.793366][T20866] generic_perform_write+0x184/0x490 [ 334.793476][T20866] shmem_file_write_iter+0xc5/0xf0 [ 334.793506][T20866] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 334.793535][T20866] vfs_write+0x49d/0x8e0 [ 334.793569][T20866] ksys_write+0xda/0x1a0 [ 334.793598][T20866] __x64_sys_write+0x40/0x50 [ 334.793660][T20866] x64_sys_call+0x2cdd/0x2fb0 [ 334.793760][T20866] do_syscall_64+0xd2/0x200 [ 334.793782][T20866] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 334.793848][T20866] ? clear_bhb_loop+0x40/0x90 [ 334.793872][T20866] ? clear_bhb_loop+0x40/0x90 [ 334.793900][T20866] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 334.793923][T20866] RIP: 0033:0x7fb09064d3df [ 334.793943][T20866] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 334.793969][T20866] RSP: 002b:00007fb08ecb6df0 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 334.794052][T20866] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007fb09064d3df [ 334.794065][T20866] RDX: 0000000000040000 RSI: 00007fb086897000 RDI: 0000000000000005 [ 334.794077][T20866] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000045e [ 334.794091][T20866] R10: 00000000000003ba R11: 0000000000000293 R12: 0000000000000005 [ 334.794108][T20866] R13: 00007fb08ecb6ef0 R14: 00007fb08ecb6eb0 R15: 00007fb086897000 [ 334.794136][T20866] [ 336.097937][T20888] netlink: 'syz.3.5913': attribute type 10 has an invalid length. [ 336.105848][T20888] netlink: 40 bytes leftover after parsing attributes in process `syz.3.5913'. [ 336.114856][T20886] tipc: Enabled bearer , priority 0 [ 336.122071][T20885] tipc: Resetting bearer [ 336.142082][T20885] tipc: Disabling bearer [ 336.189819][T20888] geneve1: entered promiscuous mode [ 336.195277][T20888] geneve1: entered allmulticast mode [ 336.275478][T20888] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 336.284312][T20888] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 336.293166][T20888] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 336.302047][T20888] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 336.337014][T20888] team0: Port device geneve1 added [ 336.449881][T20898] FAULT_INJECTION: forcing a failure. [ 336.449881][T20898] name failslab, interval 1, probability 0, space 0, times 0 [ 336.459685][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 336.462585][T20898] CPU: 1 UID: 0 PID: 20898 Comm: syz.8.5918 Tainted: G W 6.16.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 336.462634][T20898] Tainted: [W]=WARN [ 336.462644][T20898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 336.462664][T20898] Call Trace: [ 336.462673][T20898] [ 336.462715][T20898] __dump_stack+0x1d/0x30 [ 336.462745][T20898] dump_stack_lvl+0xe8/0x140 [ 336.462774][T20898] dump_stack+0x15/0x1b [ 336.462798][T20898] should_fail_ex+0x265/0x280 [ 336.462942][T20898] ? sctp_auth_asoc_copy_shkeys+0xfa/0x330 [ 336.462981][T20898] should_failslab+0x8c/0xb0 [ 336.463016][T20898] __kmalloc_cache_noprof+0x4c/0x320 [ 336.463083][T20898] sctp_auth_asoc_copy_shkeys+0xfa/0x330 [ 336.463169][T20898] sctp_association_new+0xde5/0x1200 [ 336.463226][T20898] sctp_connect_new_asoc+0x1a8/0x3a0 [ 336.463342][T20898] sctp_sendmsg+0xf10/0x18d0 [ 336.463391][T20898] ? selinux_socket_sendmsg+0x91/0x1b0 [ 336.463448][T20898] ? __pfx_sctp_sendmsg+0x10/0x10 [ 336.463571][T20898] inet_sendmsg+0xc5/0xd0 [ 336.463604][T20898] __sock_sendmsg+0x102/0x180 [ 336.463647][T20898] __sys_sendto+0x268/0x330 [ 336.463757][T20898] __x64_sys_sendto+0x76/0x90 [ 336.463807][T20898] x64_sys_call+0x2eb6/0x2fb0 [ 336.463840][T20898] do_syscall_64+0xd2/0x200 [ 336.463871][T20898] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 336.463950][T20898] ? clear_bhb_loop+0x40/0x90 [ 336.463982][T20898] ? clear_bhb_loop+0x40/0x90 [ 336.464104][T20898] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 336.464137][T20898] RIP: 0033:0x7f09524ee929 [ 336.464171][T20898] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 336.464199][T20898] RSP: 002b:00007f0950b57038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 336.464227][T20898] RAX: ffffffffffffffda RBX: 00007f0952715fa0 RCX: 00007f09524ee929 [ 336.464246][T20898] RDX: 0000000000000002 RSI: 0000200000000140 RDI: 0000000000000007 [ 336.464285][T20898] RBP: 00007f0950b57090 R08: 0000200000000380 R09: 0000000000000010 [ 336.464303][T20898] R10: 0000000004000082 R11: 0000000000000246 R12: 0000000000000001 [ 336.464322][T20898] R13: 0000000000000000 R14: 00007f0952715fa0 R15: 00007ffe5730dcd8 [ 336.464353][T20898] [ 336.667091][T20900] FAULT_INJECTION: forcing a failure. [ 336.667091][T20900] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 336.674814][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 336.682883][T20900] CPU: 1 UID: 0 PID: 20900 Comm: syz.3.5917 Tainted: G W 6.16.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 336.682932][T20900] Tainted: [W]=WARN [ 336.682942][T20900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 336.682963][T20900] Call Trace: [ 336.683035][T20900] [ 336.683048][T20900] __dump_stack+0x1d/0x30 [ 336.683077][T20900] dump_stack_lvl+0xe8/0x140 [ 336.683121][T20900] dump_stack+0x15/0x1b [ 336.683145][T20900] should_fail_ex+0x265/0x280 [ 336.683228][T20900] should_fail_alloc_page+0xf2/0x100 [ 336.683266][T20900] __alloc_frozen_pages_noprof+0xff/0x360 [ 336.683321][T20900] alloc_pages_mpol+0xb3/0x250 [ 336.683444][T20900] alloc_pages_noprof+0x90/0x130 [ 336.683546][T20900] kimage_alloc_control_pages+0x2ec/0x7d0 [ 336.683606][T20900] do_kexec_load+0x2c6/0x510 [ 336.683676][T20900] __se_sys_kexec_load+0x134/0x160 [ 336.683706][T20900] __x64_sys_kexec_load+0x55/0x70 [ 336.683790][T20900] x64_sys_call+0xa36/0x2fb0 [ 336.683823][T20900] do_syscall_64+0xd2/0x200 [ 336.683855][T20900] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 336.683894][T20900] ? clear_bhb_loop+0x40/0x90 [ 336.683926][T20900] ? clear_bhb_loop+0x40/0x90 [ 336.684011][T20900] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 336.684116][T20900] RIP: 0033:0x7fc67a40e929 [ 336.684142][T20900] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 336.684169][T20900] RSP: 002b:00007fc678a77038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f6 [ 336.684196][T20900] RAX: ffffffffffffffda RBX: 00007fc67a635fa0 RCX: 00007fc67a40e929 [ 336.684215][T20900] RDX: 0000200000000140 RSI: 0000000000000001 RDI: 0000000000000000 [ 336.684234][T20900] RBP: 00007fc678a77090 R08: 0000000000000000 R09: 0000000000000000 [ 336.684316][T20900] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 336.684336][T20900] R13: 0000000000000000 R14: 00007fc67a635fa0 R15: 00007ffc726d7628 [ 336.684367][T20900] [ 336.684392][T20900] kexec: Could not allocate control_code_buffer [ 336.690915][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 336.927561][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 336.934997][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 336.942613][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 336.950072][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 336.957664][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 336.965111][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 336.972733][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 336.980211][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 336.987838][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 336.995458][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 337.002905][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 337.010380][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 337.017849][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 337.025270][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 337.032696][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 337.040232][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 337.047745][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 337.055181][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 337.062596][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 337.070208][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 337.077742][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 337.085215][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 337.092660][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 337.100352][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 337.108117][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 337.115579][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 337.123204][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 337.130674][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 337.138205][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 337.145678][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 337.153271][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 337.160773][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 337.168234][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 337.175743][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 337.183158][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 337.190656][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 337.198239][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 337.205684][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 337.213125][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 337.220652][ T6693] hid-generic 0000:0000:0000.0016: unknown main item tag 0x0 [ 337.272407][ T6693] hid-generic 0000:0000:0000.0016: hidraw0: HID v0.00 Device [syz0] on syz0 [ 337.324264][ T29] kauditd_printk_skb: 358 callbacks suppressed [ 337.324282][ T29] audit: type=1107 audit(1749533886.953:14802): pid=20918 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 337.358668][T20920] xt_CT: You must specify a L4 protocol and not use inversions on it [ 337.367674][T20920] vhci_hcd: invalid port number 15 [ 337.372919][T20920] vhci_hcd: invalid port number 15 [ 337.479788][T20937] netlink: 20 bytes leftover after parsing attributes in process `syz.8.5931'. [ 337.479852][T20935] netlink: 48 bytes leftover after parsing attributes in process `syz.2.5930'. [ 337.506061][T20939] syzkaller1: entered promiscuous mode [ 337.511685][T20939] syzkaller1: entered allmulticast mode [ 337.520979][T20935] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5930'. [ 337.538062][T20935] hsr_slave_1 (unregistering): left promiscuous mode [ 337.628283][T20947] netlink: 48 bytes leftover after parsing attributes in process `syz.2.5936'. [ 337.637745][T20947] netlink: 44 bytes leftover after parsing attributes in process `syz.2.5936'. [ 337.719448][T20957] netlink: 8 bytes leftover after parsing attributes in process `syz.8.5939'. [ 337.957126][T20974] sctp: [Deprecated]: syz.2.5946 (pid 20974) Use of int in max_burst socket option deprecated. [ 337.957126][T20974] Use struct sctp_assoc_value instead [ 337.983524][T20975] netlink: 8 bytes leftover after parsing attributes in process `syz.8.5944'. [ 338.142585][ T29] audit: type=1400 audit(1749533887.773:14803): avc: denied { setcurrent } for pid=20966 comm="syz.9.5943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 338.162418][ T29] audit: type=1401 audit(1749533887.773:14804): op=security_bounded_transition seresult=denied oldcontext=root:sysadm_r:sysadm_t newcontext=system_u:object_r:hugetlbfs_t [ 338.335684][T20991] netlink: 4436 bytes leftover after parsing attributes in process `syz.8.5951'. [ 338.357327][T20991] x_tables: ip_tables: osf.0 match: invalid size 48 (kernel) != (user) 4096 [ 338.421061][T20998] tmpfs: Unknown parameter 'nosap' [ 338.490287][ T29] audit: type=1400 audit(1749534656.134:14805): avc: denied { create } for pid=20999 comm="syz.2.5954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 338.838901][T21009] FAULT_INJECTION: forcing a failure. [ 338.838901][T21009] name failslab, interval 1, probability 0, space 0, times 0 [ 338.851688][T21009] CPU: 1 UID: 0 PID: 21009 Comm: syz.2.5957 Tainted: G W 6.16.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 338.851723][T21009] Tainted: [W]=WARN [ 338.851732][T21009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 338.851800][T21009] Call Trace: [ 338.851808][T21009] [ 338.851818][T21009] __dump_stack+0x1d/0x30 [ 338.851846][T21009] dump_stack_lvl+0xe8/0x140 [ 338.851930][T21009] dump_stack+0x15/0x1b [ 338.851952][T21009] should_fail_ex+0x265/0x280 [ 338.852004][T21009] should_failslab+0x8c/0xb0 [ 338.852035][T21009] kmem_cache_alloc_noprof+0x50/0x310 [ 338.852094][T21009] ? audit_log_start+0x365/0x6c0 [ 338.852134][T21009] audit_log_start+0x365/0x6c0 [ 338.852306][T21009] audit_seccomp+0x48/0x100 [ 338.852373][T21009] ? __seccomp_filter+0x68c/0x10d0 [ 338.852441][T21009] __seccomp_filter+0x69d/0x10d0 [ 338.852475][T21009] ? do_vfs_ioctl+0x9df/0x11d0 [ 338.852564][T21009] __secure_computing+0x82/0x150 [ 338.852588][T21009] syscall_trace_enter+0xcf/0x1e0 [ 338.852653][T21009] do_syscall_64+0xac/0x200 [ 338.852675][T21009] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 338.852743][T21009] ? clear_bhb_loop+0x40/0x90 [ 338.852764][T21009] ? clear_bhb_loop+0x40/0x90 [ 338.852827][T21009] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 338.852855][T21009] RIP: 0033:0x7f07e40ad33c [ 338.852956][T21009] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 338.852976][T21009] RSP: 002b:00007f07e2717030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 338.853012][T21009] RAX: ffffffffffffffda RBX: 00007f07e42d5fa0 RCX: 00007f07e40ad33c [ 338.853029][T21009] RDX: 000000000000000f RSI: 00007f07e27170a0 RDI: 0000000000000007 [ 338.853046][T21009] RBP: 00007f07e2717090 R08: 0000000000000000 R09: 0000000000000000 [ 338.853096][T21009] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 338.853109][T21009] R13: 0000000000000000 R14: 00007f07e42d5fa0 R15: 00007fff2ed22738 [ 338.853154][T21009] [ 338.853164][T21009] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 338.861404][ T29] audit: type=1326 audit(1749534656.493:14806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21008 comm="syz.2.5957" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f07e40ae929 code=0x7ffc0000 [ 338.865664][T21009] audit: out of memory in audit_log_start [ 338.869478][ T29] audit: type=1326 audit(1749534656.493:14807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21008 comm="syz.2.5957" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f07e40ae929 code=0x7ffc0000 [ 339.117561][ T29] audit: type=1326 audit(1749534656.493:14808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21008 comm="syz.2.5957" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f07e40ae929 code=0x7ffc0000 [ 339.141425][ T29] audit: type=1326 audit(1749534656.493:14809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21008 comm="syz.2.5957" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f07e40ae929 code=0x7ffc0000 [ 339.143662][T21011] lo speed is unknown, defaulting to 1000 [ 339.314720][T21016] bond0: (slave bond_slave_0): Releasing backup interface [ 339.375945][T21016] bond0: (slave bond_slave_1): Releasing backup interface [ 339.390555][T21016] team0: Port device C removed [ 339.396944][T21016] team0: Port device team_slave_1 removed [ 339.412992][T21016] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 339.433901][T21016] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 339.445310][T21016] team0: Port device geneve1 removed [ 339.453585][T21011] lo speed is unknown, defaulting to 1000 [ 339.509197][T21024] x_tables: ip6_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 339.707397][T21036] x_tables: ip_tables: osf match: only valid for protocol 6 [ 340.320019][T21070] FAULT_INJECTION: forcing a failure. [ 340.320019][T21070] name failslab, interval 1, probability 0, space 0, times 0 [ 340.332799][T21070] CPU: 1 UID: 0 PID: 21070 Comm: syz.6.5981 Tainted: G W 6.16.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 340.332833][T21070] Tainted: [W]=WARN [ 340.332840][T21070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 340.332855][T21070] Call Trace: [ 340.332864][T21070] [ 340.332874][T21070] __dump_stack+0x1d/0x30 [ 340.332900][T21070] dump_stack_lvl+0xe8/0x140 [ 340.332926][T21070] dump_stack+0x15/0x1b [ 340.332947][T21070] should_fail_ex+0x265/0x280 [ 340.332989][T21070] should_failslab+0x8c/0xb0 [ 340.333014][T21070] kmem_cache_alloc_noprof+0x50/0x310 [ 340.333047][T21070] ? vm_area_dup+0x33/0x2c0 [ 340.333086][T21070] vm_area_dup+0x33/0x2c0 [ 340.333121][T21070] dup_mmap+0x501/0xf20 [ 340.333156][T21070] copy_mm+0x11a/0x370 [ 340.333183][T21070] copy_process+0xcf1/0x1fe0 [ 340.333221][T21070] kernel_clone+0x16c/0x5b0 [ 340.333246][T21070] ? vfs_write+0x75e/0x8e0 [ 340.333268][T21070] __x64_sys_clone+0xe6/0x120 [ 340.333313][T21070] x64_sys_call+0x2c59/0x2fb0 [ 340.333341][T21070] do_syscall_64+0xd2/0x200 [ 340.333369][T21070] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 340.333398][T21070] ? clear_bhb_loop+0x40/0x90 [ 340.333419][T21070] ? clear_bhb_loop+0x40/0x90 [ 340.333441][T21070] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 340.333469][T21070] RIP: 0033:0x7fc1f47ae929 [ 340.333490][T21070] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 340.333511][T21070] RSP: 002b:00007fc1f2e16fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 340.333529][T21070] RAX: ffffffffffffffda RBX: 00007fc1f49d5fa0 RCX: 00007fc1f47ae929 [ 340.333542][T21070] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000400 [ 340.333556][T21070] RBP: 00007fc1f2e17090 R08: 0000000000000000 R09: 0000000000000000 [ 340.333572][T21070] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 340.333588][T21070] R13: 0000000000000000 R14: 00007fc1f49d5fa0 R15: 00007ffc81929b18 [ 340.333615][T21070] [ 340.735148][T21091] wg2: entered promiscuous mode [ 340.740187][T21091] wg2: entered allmulticast mode [ 340.791514][T21093] __nla_validate_parse: 4 callbacks suppressed [ 340.791650][T21093] netlink: 52 bytes leftover after parsing attributes in process `syz.8.5990'. [ 340.823203][T21075] lo speed is unknown, defaulting to 1000 [ 340.858639][T21075] lo speed is unknown, defaulting to 1000 [ 340.909799][T21097] FAULT_INJECTION: forcing a failure. [ 340.909799][T21097] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 340.923193][T21097] CPU: 1 UID: 0 PID: 21097 Comm: syz.8.5991 Tainted: G W 6.16.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 340.923232][T21097] Tainted: [W]=WARN [ 340.923239][T21097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 340.923252][T21097] Call Trace: [ 340.923259][T21097] [ 340.923267][T21097] __dump_stack+0x1d/0x30 [ 340.923343][T21097] dump_stack_lvl+0xe8/0x140 [ 340.923385][T21097] dump_stack+0x15/0x1b [ 340.923407][T21097] should_fail_ex+0x265/0x280 [ 340.923452][T21097] should_fail_alloc_page+0xf2/0x100 [ 340.923558][T21097] __alloc_frozen_pages_noprof+0xff/0x360 [ 340.923605][T21097] alloc_pages_mpol+0xb3/0x250 [ 340.923683][T21097] folio_alloc_mpol_noprof+0x39/0x80 [ 340.923785][T21097] shmem_get_folio_gfp+0x3cf/0xd60 [ 340.923839][T21097] shmem_write_begin+0xa8/0x190 [ 340.923953][T21097] generic_perform_write+0x184/0x490 [ 340.924037][T21097] shmem_file_write_iter+0xc5/0xf0 [ 340.924114][T21097] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 340.924140][T21097] vfs_write+0x49d/0x8e0 [ 340.924175][T21097] ksys_write+0xda/0x1a0 [ 340.924204][T21097] __x64_sys_write+0x40/0x50 [ 340.924233][T21097] x64_sys_call+0x2cdd/0x2fb0 [ 340.924261][T21097] do_syscall_64+0xd2/0x200 [ 340.924350][T21097] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 340.924384][T21097] ? clear_bhb_loop+0x40/0x90 [ 340.924413][T21097] ? clear_bhb_loop+0x40/0x90 [ 340.924505][T21097] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 340.924532][T21097] RIP: 0033:0x7f09524ed3df [ 340.924611][T21097] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 340.924694][T21097] RSP: 002b:00007f0950b56df0 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 340.924716][T21097] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007f09524ed3df [ 340.924729][T21097] RDX: 0000000000040000 RSI: 00007f0948737000 RDI: 0000000000000005 [ 340.924741][T21097] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000052b [ 340.924753][T21097] R10: 0000200000000642 R11: 0000000000000293 R12: 0000000000000005 [ 340.924765][T21097] R13: 00007f0950b56ef0 R14: 00007f0950b56eb0 R15: 00007f0948737000 [ 340.924787][T21097] [ 341.446143][T21123] netlink: 4768 bytes leftover after parsing attributes in process `syz.8.6002'. [ 341.497657][T21127] netlink: 12 bytes leftover after parsing attributes in process `syz.3.6004'. [ 341.506746][T21127] netlink: 36 bytes leftover after parsing attributes in process `syz.3.6004'. [ 341.519129][T21127] vlan2: entered allmulticast mode [ 341.524689][T21127] syz_tun: entered allmulticast mode [ 341.606453][T21137] FAULT_INJECTION: forcing a failure. [ 341.606453][T21137] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 341.619870][T21137] CPU: 1 UID: 0 PID: 21137 Comm: syz.3.6009 Tainted: G W 6.16.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 341.619979][T21137] Tainted: [W]=WARN [ 341.619989][T21137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 341.620006][T21137] Call Trace: [ 341.620014][T21137] [ 341.620022][T21137] __dump_stack+0x1d/0x30 [ 341.620044][T21137] dump_stack_lvl+0xe8/0x140 [ 341.620064][T21137] dump_stack+0x15/0x1b [ 341.620080][T21137] should_fail_ex+0x265/0x280 [ 341.620153][T21137] should_fail+0xb/0x20 [ 341.620235][T21137] should_fail_usercopy+0x1a/0x20 [ 341.620272][T21137] _copy_from_user+0x1c/0xb0 [ 341.620345][T21137] sctp_setsockopt+0x154/0xe30 [ 341.620388][T21137] sock_common_setsockopt+0x69/0x80 [ 341.620419][T21137] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 341.620484][T21137] __sys_setsockopt+0x184/0x200 [ 341.620567][T21137] __x64_sys_setsockopt+0x64/0x80 [ 341.620630][T21137] x64_sys_call+0x2bd5/0x2fb0 [ 341.620659][T21137] do_syscall_64+0xd2/0x200 [ 341.620680][T21137] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 341.620716][T21137] ? clear_bhb_loop+0x40/0x90 [ 341.620792][T21137] ? clear_bhb_loop+0x40/0x90 [ 341.620814][T21137] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 341.620837][T21137] RIP: 0033:0x7fc67a40e929 [ 341.620857][T21137] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 341.620914][T21137] RSP: 002b:00007fc678a77038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 341.620934][T21137] RAX: ffffffffffffffda RBX: 00007fc67a635fa0 RCX: 00007fc67a40e929 [ 341.620995][T21137] RDX: 0000000000000018 RSI: 0000000000000084 RDI: 0000000000000003 [ 341.621007][T21137] RBP: 00007fc678a77090 R08: 0000000000000008 R09: 0000000000000000 [ 341.621019][T21137] R10: 0000200000000300 R11: 0000000000000246 R12: 0000000000000001 [ 341.621032][T21137] R13: 0000000000000000 R14: 00007fc67a635fa0 R15: 00007ffc726d7628 [ 341.621054][T21137] [ 342.281122][ T29] kauditd_printk_skb: 71 callbacks suppressed [ 342.281142][ T29] audit: type=1326 audit(1749534660.141:14881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21166 comm="syz.8.6022" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09524ee929 code=0x7ffc0000 [ 342.336611][ T29] audit: type=1326 audit(1749534660.141:14882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21166 comm="syz.8.6022" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f09524ee929 code=0x7ffc0000 [ 342.360393][ T29] audit: type=1326 audit(1749534660.141:14883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21166 comm="syz.8.6022" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09524ee929 code=0x7ffc0000 [ 342.384069][ T29] audit: type=1326 audit(1749534660.141:14884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21166 comm="syz.8.6022" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f09524f0847 code=0x7ffc0000 [ 342.407692][ T29] audit: type=1326 audit(1749534660.141:14885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21166 comm="syz.8.6022" exe="/root/syz-executor" sig=0 arch=c000003e syscall=44 compat=0 ip=0x7f09524f07bc code=0x7ffc0000 [ 342.431348][ T29] audit: type=1326 audit(1749534660.141:14886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21166 comm="syz.8.6022" exe="/root/syz-executor" sig=0 arch=c000003e syscall=45 compat=0 ip=0x7f09524f06f4 code=0x7ffc0000 [ 342.455034][ T29] audit: type=1326 audit(1749534660.141:14887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21166 comm="syz.8.6022" exe="/root/syz-executor" sig=0 arch=c000003e syscall=45 compat=0 ip=0x7f09524f06f4 code=0x7ffc0000 [ 342.478676][ T29] audit: type=1326 audit(1749534660.141:14888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21166 comm="syz.8.6022" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f09524ed58a code=0x7ffc0000 [ 342.502200][ T29] audit: type=1326 audit(1749534660.141:14889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21166 comm="syz.8.6022" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09524ee929 code=0x7ffc0000 [ 342.526331][ T29] audit: type=1326 audit(1749534660.141:14890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21166 comm="syz.8.6022" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09524ee929 code=0x7ffc0000 [ 344.038464][T21210] netlink: 12 bytes leftover after parsing attributes in process `syz.6.6033'. [ 344.047522][T21210] tc_dump_action: action bad kind [ 344.273315][T21219] SELinux: policydb version -2124417984 does not match my version range 15-34 [ 344.282592][T21219] SELinux: failed to load policy [ 344.307001][T21221] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 344.325258][T21221] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 344.344153][T21221] SELinux: Context system_u:object_r:crond_var_run_t:s0 is not valid (left unmapped). [ 344.511694][T21244] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 344.614964][T21244] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 344.666561][T21244] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 344.954100][T21244] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 344.975036][T21250] FAULT_INJECTION: forcing a failure. [ 344.975036][T21250] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 344.988304][T21250] CPU: 1 UID: 0 PID: 21250 Comm: syz.9.6051 Tainted: G W 6.16.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 344.988420][T21250] Tainted: [W]=WARN [ 344.988427][T21250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 344.988444][T21250] Call Trace: [ 344.988453][T21250] [ 344.988518][T21250] __dump_stack+0x1d/0x30 [ 344.988541][T21250] dump_stack_lvl+0xe8/0x140 [ 344.988561][T21250] dump_stack+0x15/0x1b [ 344.988576][T21250] should_fail_ex+0x265/0x280 [ 344.988619][T21250] should_fail+0xb/0x20 [ 344.988699][T21250] should_fail_usercopy+0x1a/0x20 [ 344.988719][T21250] _copy_from_user+0x1c/0xb0 [ 344.988869][T21250] kstrtouint_from_user+0x69/0xf0 [ 344.988928][T21250] ? 0xffffffff81000000 [ 344.988941][T21250] ? selinux_file_permission+0x1e4/0x320 [ 344.988969][T21250] proc_fail_nth_write+0x50/0x160 [ 344.989059][T21250] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 344.989086][T21250] vfs_write+0x266/0x8e0 [ 344.989189][T21250] ? __cond_resched+0x4e/0x90 [ 344.989239][T21250] ksys_write+0xda/0x1a0 [ 344.989268][T21250] __x64_sys_write+0x40/0x50 [ 344.989292][T21250] x64_sys_call+0x2cdd/0x2fb0 [ 344.989322][T21250] do_syscall_64+0xd2/0x200 [ 344.989345][T21250] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 344.989381][T21250] ? clear_bhb_loop+0x40/0x90 [ 344.989409][T21250] ? clear_bhb_loop+0x40/0x90 [ 344.989507][T21250] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 344.989529][T21250] RIP: 0033:0x7fb09064d3df [ 344.989544][T21250] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 344.989632][T21250] RSP: 002b:00007fb08ecb7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 344.989651][T21250] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb09064d3df [ 344.989664][T21250] RDX: 0000000000000001 RSI: 00007fb08ecb70a0 RDI: 0000000000000005 [ 344.989687][T21250] RBP: 00007fb08ecb7090 R08: 0000000000000000 R09: 00000000fffff000 [ 344.989705][T21250] R10: 000000000004c831 R11: 0000000000000293 R12: 0000000000000002 [ 344.989722][T21250] R13: 0000000000000000 R14: 00007fb090875fa0 R15: 00007ffebfc71fd8 [ 344.989751][T21250] [ 345.355013][T21244] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 345.403500][T21244] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 345.448085][T21244] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 345.496492][T21261] netlink: 3 bytes leftover after parsing attributes in process `syz.8.6055'. [ 345.505706][T21244] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 345.536547][T21261] batadv1: entered promiscuous mode [ 345.541892][T21261] batadv1: entered allmulticast mode [ 345.601664][T21272] netlink: 24 bytes leftover after parsing attributes in process `syz.2.6056'. [ 345.739905][T21286] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 345.750592][T21286] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 345.989561][T21315] Cannot find set identified by id 0 to match [ 346.332494][T21363] netlink: 92 bytes leftover after parsing attributes in process `syz.9.6068'. [ 346.341563][T21363] netem: unknown loss type 0 [ 346.346352][T21363] netem: change failed [ 347.236764][ T29] kauditd_printk_skb: 99 callbacks suppressed [ 347.236781][ T29] audit: type=1400 audit(1749534665.371:14990): avc: denied { getopt } for pid=21386 comm="syz.9.6075" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 347.343407][T21396] netdevsim netdevsim9 eth3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 347.353376][T21396] netdevsim netdevsim9 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 347.402024][T21396] netdevsim netdevsim9 eth2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 347.412013][T21396] netdevsim netdevsim9 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 347.422131][T21406] netlink: 'syz.9.6079': attribute type 10 has an invalid length. [ 347.430246][T21406] netlink: 40 bytes leftover after parsing attributes in process `syz.9.6079'. [ 347.440990][T21406] netdevsim netdevsim9 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 347.449482][T21406] netdevsim netdevsim9 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 347.452326][T21406] team0: Failed to send port change of device geneve1 via netlink (err -105) [ 347.467159][ T29] audit: type=1400 audit(1749534665.625:14991): avc: denied { write } for pid=21410 comm="syz.6.6082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 347.491651][T21396] netdevsim netdevsim9 eth1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 347.526693][T21418] autofs: Unknown parameter 'no9 PG!8E8- ŖEeլ( Ir\u}ibT0;my[Gc#>QkbY&#w@/VVL~12lhOh'rK1\kU{!eܚ7 [ 347.526693][T21418] Ue[%#s' [ 347.550331][ T29] audit: type=1400 audit(1749534665.688:14992): avc: denied { mounton } for pid=21417 comm="syz.6.6083" path="/syzcgroup/unified/syz6" dev="cgroup2" ino=208 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 347.585185][T21396] netdevsim netdevsim9 eth0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 347.601897][T21418] netlink: 'syz.6.6083': attribute type 13 has an invalid length. [ 347.686566][T21418] bridge0: port 2(bridge_slave_1) entered disabled state [ 347.694002][T21418] bridge0: port 1(bridge_slave_0) entered disabled state [ 347.722381][T21440] netlink: 'syz.6.6083': attribute type 27 has an invalid length. [ 347.843930][T21418] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 347.875593][T21418] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 347.919173][T21418] netdevsim netdevsim6 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 347.927769][T21418] netdevsim netdevsim6 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 347.936374][T21418] netdevsim netdevsim6 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 347.944802][T21418] netdevsim netdevsim6 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 347.998876][T21440] bridge1: left promiscuous mode [ 348.004021][T21440] bridge1: left allmulticast mode [ 348.013829][T21440] bond0: left promiscuous mode [ 348.018724][T21440] bond0: left allmulticast mode [ 348.023734][T21440] bond1: left promiscuous mode [ 348.028642][T21440] bond1: left allmulticast mode [ 348.055925][T21446] 8021q: adding VLAN 0 to HW filter on device $H [ 348.064663][T21446] 8021q: adding VLAN 0 to HW filter on device team0 [ 348.073988][T21446] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 348.089861][ T6718] syz1: Port: 1 Link DOWN [ 348.095132][T21396] netdevsim netdevsim9 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 348.115023][T21396] netdevsim netdevsim9 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 348.132334][T21396] netdevsim netdevsim9 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 348.144776][T21396] netdevsim netdevsim9 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 348.361470][T21480] tmpfs: Unknown parameter 'nosap' [ 348.511238][ T29] audit: type=1107 audit(1749534666.723:14993): pid=21481 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 348.626885][T21488] netlink: 'syz.9.6095': attribute type 10 has an invalid length. [ 348.684131][T21488] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 349.049217][T21513] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 349.152128][T21524] lo speed is unknown, defaulting to 1000 [ 349.197014][T21524] lo speed is unknown, defaulting to 1000 [ 349.345239][T21537] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=21537 comm=syz.9.6115 [ 349.380375][T21539] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 349.392379][T21537] xt_connbytes: Forcing CT accounting to be enabled [ 349.400483][T21537] set match dimension is over the limit! [ 349.991959][ T29] audit: type=1400 audit(1749534668.287:14994): avc: denied { bind } for pid=21574 comm="syz.3.6130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 350.088291][ T29] audit: type=1400 audit(1749534668.339:14995): avc: denied { write } for pid=21574 comm="syz.3.6130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 350.272860][T21603] netlink: 'syz.3.6139': attribute type 10 has an invalid length. [ 350.312458][T21603] veth0_macvtap: left promiscuous mode [ 350.376953][T21603] team0: Device veth0_macvtap failed to register rx_handler [ 350.592065][T21629] 9pnet_fd: Insufficient options for proto=fd [ 350.610777][T21631] netlink: 4 bytes leftover after parsing attributes in process `syz.9.6149'. [ 350.628000][T21631] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 350.635658][T21631] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 350.667487][T21631] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 350.674999][T21631] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 350.687086][T21635] netlink: 12 bytes leftover after parsing attributes in process `syz.3.6150'. [ 350.696290][T21635] netlink: 12 bytes leftover after parsing attributes in process `syz.3.6150'. [ 350.742652][T21635] netlink: 12 bytes leftover after parsing attributes in process `syz.3.6150'. [ 350.751808][T21635] netlink: 12 bytes leftover after parsing attributes in process `syz.3.6150'. [ 350.797641][T21635] netlink: 12 bytes leftover after parsing attributes in process `syz.3.6150'. [ 350.806739][T21635] netlink: 12 bytes leftover after parsing attributes in process `syz.3.6150'. [ 350.822393][T21638] netdevsim netdevsim3 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 350.830951][T21638] netdevsim netdevsim3 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 350.839665][T21638] netdevsim netdevsim3 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 350.848350][T21638] netdevsim netdevsim3 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 350.881880][T21638] team0: Port device geneve1 removed [ 351.103321][T21657] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(5) [ 351.109970][T21657] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 351.117766][T21657] vhci_hcd vhci_hcd.0: Device attached [ 351.127116][T21659] vhci_hcd: connection closed [ 351.128869][ T5525] vhci_hcd: stop threads [ 351.138105][ T5525] vhci_hcd: release socket [ 351.142602][ T5525] vhci_hcd: disconnect device [ 351.174826][T21666] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 351.218635][ T29] audit: type=1400 audit(1749534669.585:14996): avc: denied { map } for pid=21674 comm="syz.8.6161" path="socket:[73037]" dev="sockfs" ino=73037 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 351.242094][ T29] audit: type=1400 audit(1749534669.585:14997): avc: denied { read accept } for pid=21674 comm="syz.8.6161" path="socket:[73037]" dev="sockfs" ino=73037 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 351.271183][ T29] audit: type=1107 audit(1749534669.638:14998): pid=21677 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 351.431777][T21706] netlink: 16 bytes leftover after parsing attributes in process `syz.6.6171'. [ 351.478371][ T29] audit: type=1326 audit(1749534669.860:14999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21711 comm="syz.6.6174" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1f47ae929 code=0x7ffc0000 [ 351.492761][T21708] syzkaller0: entered promiscuous mode [ 351.507971][T21708] syzkaller0: entered allmulticast mode [ 351.520690][T21710] netlink: 8 bytes leftover after parsing attributes in process `+}[@'. [ 351.629560][T21718] pim6reg: entered allmulticast mode [ 351.738030][T21731] vlan3: entered promiscuous mode [ 351.743320][T21731] dummy0: entered promiscuous mode [ 351.835430][T21733] SELinux: failed to load policy [ 352.097982][ T29] kauditd_printk_skb: 64 callbacks suppressed [ 352.098002][ T29] audit: type=1326 audit(1749534670.515:15064): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21744 comm="syz.2.6187" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f07e40ae929 code=0x7ffc0000 [ 352.130022][ T29] audit: type=1326 audit(1749534670.525:15065): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21744 comm="syz.2.6187" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat=0 ip=0x7f07e40ae929 code=0x7ffc0000 [ 352.153740][ T29] audit: type=1326 audit(1749534670.525:15066): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21744 comm="syz.2.6187" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f07e40ae929 code=0x7ffc0000 [ 352.177387][ T29] audit: type=1326 audit(1749534670.525:15067): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21744 comm="syz.2.6187" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f07e40ae929 code=0x7ffc0000 [ 352.201254][ T29] audit: type=1326 audit(1749534670.525:15068): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21744 comm="syz.2.6187" exe="/root/syz-executor" sig=0 arch=c000003e syscall=225 compat=0 ip=0x7f07e40ae929 code=0x7ffc0000 [ 352.224978][ T29] audit: type=1326 audit(1749534670.525:15069): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21744 comm="syz.2.6187" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f07e40ae929 code=0x7ffc0000 [ 352.248725][ T29] audit: type=1326 audit(1749534670.525:15070): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21744 comm="syz.2.6187" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f07e40ae929 code=0x7ffc0000 [ 352.744242][ T29] audit: type=1326 audit(1749534671.190:15071): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21772 comm="syz.8.6198" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09524ee929 code=0x7ffc0000 [ 352.768135][ T29] audit: type=1326 audit(1749534671.190:15072): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21772 comm="syz.8.6198" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09524ee929 code=0x7ffc0000 [ 352.832006][ T29] audit: type=1326 audit(1749534671.254:15073): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21772 comm="syz.8.6198" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f09524ee929 code=0x7ffc0000 [ 353.180701][T21785] netlink: 'syz.3.6200': attribute type 1 has an invalid length. [ 353.225640][T21785] 8021q: adding VLAN 0 to HW filter on device bond1 [ 353.252914][T21785] bond1: (slave veth3): Enslaving as an active interface with a down link [ 353.268225][T21785] bond1: (slave veth0_to_bond): Enslaving as an active interface with a down link [ 353.388753][ T6693] hid-generic 0003:0008:0000.0017: unknown main item tag 0x0 [ 353.396299][ T6693] hid-generic 0003:0008:0000.0017: unknown main item tag 0x0 [ 353.403758][ T6693] hid-generic 0003:0008:0000.0017: unknown main item tag 0x0 [ 353.417151][ T6693] hid-generic 0003:0008:0000.0017: hidraw0: USB HID v0.00 Device [syz0] on syz1 [ 353.569609][T21806] lo speed is unknown, defaulting to 1000 [ 353.675300][T21806] lo speed is unknown, defaulting to 1000 [ 354.051472][T21853] batadv_slave_1: entered promiscuous mode [ 354.058179][T21852] batadv_slave_1: left promiscuous mode [ 354.278533][T21863] x_tables: ip_tables: osf match: only valid for protocol 6 [ 354.305212][T21863] lo speed is unknown, defaulting to 1000 [ 354.376772][T21863] lo speed is unknown, defaulting to 1000 [ 355.305209][T21915] rdma_op ffff88816c051180 conn xmit_rdma 0000000000000000 [ 355.453249][T21927] No source specified [ 355.474718][T21930] Cannot find add_set index 0 as target [ 355.492823][T21927] netlink: 'syz.6.6256': attribute type 1 has an invalid length. [ 355.500780][T21927] netlink: 224 bytes leftover after parsing attributes in process `syz.6.6256'. [ 355.530433][T21921] lo speed is unknown, defaulting to 1000 [ 355.570792][T21921] lo speed is unknown, defaulting to 1000 [ 355.616351][T21942] tipc: Enabling of bearer rejected, failed to enable media [ 355.628381][T21945] netlink: 12 bytes leftover after parsing attributes in process `syz.8.6263'. [ 355.642272][T21945] netlink: 12 bytes leftover after parsing attributes in process `syz.8.6263'. [ 355.949967][T21955] netlink: zone id is out of range [ 355.955802][T21955] netlink: get zone limit has 8 unknown bytes [ 355.969910][T21975] syzkaller0: entered allmulticast mode [ 355.985404][T21975] syzkaller0: entered promiscuous mode [ 355.999344][T21975] syzkaller0 (unregistering): left allmulticast mode [ 356.006173][T21975] syzkaller0 (unregistering): left promiscuous mode [ 356.190403][T21985] vlan2: entered promiscuous mode [ 356.195502][T21985] syz_tun: entered promiscuous mode [ 356.303925][T22006] netlink: 16 bytes leftover after parsing attributes in process `syz.3.6286'. [ 356.489616][T22032] syzkaller0: refused to change device tx_queue_len [ 356.544600][T22032] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 356.788077][T22042] netlink: 24 bytes leftover after parsing attributes in process `syz.6.6299'. [ 356.849075][T22044] netlink: 256 bytes leftover after parsing attributes in process `syz.6.6300'. [ 356.885756][T22050] Cannot find add_set index 0 as target [ 356.897073][ T29] kauditd_printk_skb: 191 callbacks suppressed [ 356.897092][ T29] audit: type=1400 audit(1749534675.582:15265): avc: denied { unmount } for pid=19145 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 357.151107][T22075] netlink: 276 bytes leftover after parsing attributes in process `syz.9.6310'. [ 357.246060][T22081] netlink: 28 bytes leftover after parsing attributes in process `syz.3.6312'. [ 357.255226][T22081] netlink: 28 bytes leftover after parsing attributes in process `syz.3.6312'. [ 357.285761][ T29] audit: type=1326 audit(1749534675.983:15266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22083 comm="syz.8.6313" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09524ee929 code=0x7ffc0000 [ 357.309741][ T29] audit: type=1326 audit(1749534675.983:15267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22083 comm="syz.8.6313" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09524ee929 code=0x7ffc0000 [ 357.309940][ T29] audit: type=1326 audit(1749534675.983:15268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22083 comm="syz.8.6313" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f09524ee929 code=0x7ffc0000 [ 357.309982][ T29] audit: type=1326 audit(1749534675.983:15269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22083 comm="syz.8.6313" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09524ee929 code=0x7ffc0000 [ 357.310080][ T29] audit: type=1326 audit(1749534675.983:15270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22083 comm="syz.8.6313" exe="/root/syz-executor" sig=0 arch=c000003e syscall=216 compat=0 ip=0x7f09524ee929 code=0x7ffc0000 [ 357.310119][ T29] audit: type=1326 audit(1749534675.983:15271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22083 comm="syz.8.6313" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09524ee929 code=0x7ffc0000 [ 357.310150][ T29] audit: type=1326 audit(1749534675.983:15272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22083 comm="syz.8.6313" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f09524ee929 code=0x7ffc0000 [ 357.310213][ T29] audit: type=1326 audit(1749534675.983:15273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22083 comm="syz.8.6313" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f09524ee963 code=0x7ffc0000 [ 357.476118][ T29] audit: type=1326 audit(1749534675.983:15274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22083 comm="syz.8.6313" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f09524ed3df code=0x7ffc0000 [ 357.576314][T22098] netlink: 'syz.9.6318': attribute type 10 has an invalid length. [ 357.588159][T22098] netlink: 'syz.9.6318': attribute type 10 has an invalid length. [ 357.596173][T22098] netlink: 2 bytes leftover after parsing attributes in process `syz.9.6318'. [ 357.608231][T22098] team0: entered promiscuous mode [ 357.613957][T22098] team_slave_0: entered promiscuous mode [ 357.619779][T22098] team_slave_1: entered promiscuous mode [ 357.625572][T22098] geneve1: entered promiscuous mode [ 357.656202][T22098] bridge0: port 3(team0) entered blocking state [ 357.663159][T22098] bridge0: port 3(team0) entered disabled state [ 357.671687][T22098] team0: entered allmulticast mode [ 357.676901][T22098] team_slave_0: entered allmulticast mode [ 357.682809][T22098] team_slave_1: entered allmulticast mode [ 357.688618][T22098] geneve1: entered allmulticast mode [ 357.974365][T22127] xt_hashlimit: overflow, rate too high: 1125899906842624 [ 359.506124][T22234] netlink: 'syz.9.6366': attribute type 4 has an invalid length. [ 359.600366][T22244] lo speed is unknown, defaulting to 1000 [ 359.699797][T22244] lo speed is unknown, defaulting to 1000 [ 361.094501][T22261] tmpfs: Unknown parameter 'nosap' [ 361.287588][T22289] __nla_validate_parse: 4 callbacks suppressed [ 361.287607][T22289] netlink: 209836 bytes leftover after parsing attributes in process `syz.3.6385'. [ 361.363305][T22298] xt_hashlimit: size too large, truncated to 1048576 [ 361.466051][T22300] : renamed from vxcan1 (while UP) [ 361.626936][T22323] netlink: 196 bytes leftover after parsing attributes in process `syz.2.6395'. [ 361.643562][ T29] kauditd_printk_skb: 336 callbacks suppressed [ 361.643581][ T29] audit: type=1326 audit(1749534680.583:15611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22285 comm="syz.8.6384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f09524e58e7 code=0x7ffc0000 [ 361.673674][ T29] audit: type=1326 audit(1749534680.583:15612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22285 comm="syz.8.6384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f095248ab19 code=0x7ffc0000 [ 361.697503][T22325] netlink: 12 bytes leftover after parsing attributes in process `syz.3.6397'. [ 361.704346][ T29] audit: type=1326 audit(1749534680.583:15613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22285 comm="syz.8.6384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09524ee929 code=0x7ffc0000 [ 361.730127][ T29] audit: type=1326 audit(1749534680.625:15614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22285 comm="syz.8.6384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f09524e58e7 code=0x7ffc0000 [ 361.753939][ T29] audit: type=1326 audit(1749534680.625:15615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22285 comm="syz.8.6384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f095248ab19 code=0x7ffc0000 [ 361.759429][T22329] FAULT_INJECTION: forcing a failure. [ 361.759429][T22329] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 361.777681][ T29] audit: type=1326 audit(1749534680.625:15616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22285 comm="syz.8.6384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09524ee929 code=0x7ffc0000 [ 361.791023][T22329] CPU: 1 UID: 0 PID: 22329 Comm: syz.6.6398 Tainted: G W 6.16.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 361.791140][T22329] Tainted: [W]=WARN [ 361.791151][T22329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 361.791172][T22329] Call Trace: [ 361.791183][T22329] [ 361.791197][T22329] __dump_stack+0x1d/0x30 [ 361.791229][T22329] dump_stack_lvl+0xe8/0x140 [ 361.791374][T22329] dump_stack+0x15/0x1b [ 361.791398][T22329] should_fail_ex+0x265/0x280 [ 361.791526][T22329] should_fail_alloc_page+0xf2/0x100 [ 361.791563][T22329] __alloc_frozen_pages_noprof+0xff/0x360 [ 361.791619][T22329] alloc_pages_mpol+0xb3/0x250 [ 361.791669][T22329] folio_alloc_mpol_noprof+0x39/0x80 [ 361.791739][T22329] shmem_get_folio_gfp+0x3cf/0xd60 [ 361.791798][T22329] shmem_write_begin+0xa8/0x190 [ 361.791847][T22329] generic_perform_write+0x184/0x490 [ 361.791888][T22329] shmem_file_write_iter+0xc5/0xf0 [ 361.791949][T22329] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 361.791983][T22329] vfs_write+0x49d/0x8e0 [ 361.792020][T22329] ksys_write+0xda/0x1a0 [ 361.792051][T22329] __x64_sys_write+0x40/0x50 [ 361.792080][T22329] x64_sys_call+0x2cdd/0x2fb0 [ 361.792133][T22329] do_syscall_64+0xd2/0x200 [ 361.792194][T22329] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 361.792283][T22329] ? clear_bhb_loop+0x40/0x90 [ 361.792322][T22329] ? clear_bhb_loop+0x40/0x90 [ 361.792353][T22329] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 361.792384][T22329] RIP: 0033:0x7fc1f47ad3df [ 361.792406][T22329] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 361.792510][T22329] RSP: 002b:00007fc1f2e16df0 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 361.792536][T22329] RAX: ffffffffffffffda RBX: 0000000000040000 RCX: 00007fc1f47ad3df [ 361.792555][T22329] RDX: 0000000000040000 RSI: 00007fc1ea9f7000 RDI: 0000000000000008 [ 361.792574][T22329] RBP: 0000000000000000 R08: 0000000000000000 R09: 00000000000004d7 [ 361.792592][T22329] R10: 00000000000003c4 R11: 0000000000000293 R12: 0000000000000008 [ 361.792612][T22329] R13: 00007fc1f2e16ef0 R14: 00007fc1f2e16eb0 R15: 00007fc1ea9f7000 [ 361.792712][T22329] [ 362.037495][ T29] audit: type=1326 audit(1749534680.657:15617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22285 comm="syz.8.6384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f09524e58e7 code=0x7ffc0000 [ 362.061213][ T29] audit: type=1326 audit(1749534680.657:15618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22285 comm="syz.8.6384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f095248ab19 code=0x7ffc0000 [ 362.084909][ T29] audit: type=1326 audit(1749534680.657:15619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22285 comm="syz.8.6384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09524ee929 code=0x7ffc0000 [ 362.106876][T22342] syzkaller1: entered promiscuous mode [ 362.108818][ T29] audit: type=1326 audit(1749534680.657:15620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22285 comm="syz.8.6384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f09524e58e7 code=0x7ffc0000 [ 362.114077][T22342] syzkaller1: entered allmulticast mode [ 362.176528][T22349] netlink: 4 bytes leftover after parsing attributes in process `syz.8.6407'. [ 362.198880][T22342] ucma_write: process 1374 (syz.6.6404) changed security contexts after opening file descriptor, this is not allowed. [ 362.228423][T22349] Cannot find del_set index 3 as target [ 362.315899][T22365] netlink: 8 bytes leftover after parsing attributes in process `syz.8.6411'. [ 362.353553][T22368] xt_CT: You must specify a L4 protocol and not use inversions on it [ 362.448990][T22381] netlink: 92 bytes leftover after parsing attributes in process `syz.3.6419'. [ 362.458066][T22381] netem: unknown loss type 0 [ 362.462835][T22381] netem: change failed [ 362.659864][T22396] IPv4: Oversized IP packet from 127.202.26.0 [ 363.365533][T22421] team_slave_0: entered promiscuous mode [ 363.371268][T22421] team_slave_1: entered promiscuous mode [ 363.436056][T22421] vlan2: entered promiscuous mode [ 363.441242][T22421] team0: entered promiscuous mode [ 363.519331][T22425] vhci_hcd vhci_hcd.0: pdev(9) rhport(0) sockfd(7) [ 363.526015][T22425] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 363.533518][T22425] vhci_hcd vhci_hcd.0: Device attached [ 363.546399][T22433] vhci_hcd: connection closed [ 363.554893][ T5519] vhci_hcd: stop threads [ 363.563977][ T5519] vhci_hcd: release socket [ 363.568454][ T5519] vhci_hcd: disconnect device [ 363.734081][T22455] netlink: 80 bytes leftover after parsing attributes in process `+}[@'. [ 363.852642][T22461] sch_tbf: burst 0 is lower than device lo mtu (14) ! [ 363.861273][T22461] sch_tbf: burst 0 is lower than device lo mtu (14) ! [ 364.021664][T22468] IPv6: Can't replace route, no match found [ 364.213940][T22489] FAULT_INJECTION: forcing a failure. [ 364.213940][T22489] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 364.227208][T22489] CPU: 0 UID: 0 PID: 22489 Comm: syz.2.6458 Tainted: G W 6.16.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 364.227275][T22489] Tainted: [W]=WARN [ 364.227284][T22489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 364.227302][T22489] Call Trace: [ 364.227311][T22489] [ 364.227321][T22489] __dump_stack+0x1d/0x30 [ 364.227357][T22489] dump_stack_lvl+0xe8/0x140 [ 364.227384][T22489] dump_stack+0x15/0x1b [ 364.227408][T22489] should_fail_ex+0x265/0x280 [ 364.227510][T22489] should_fail+0xb/0x20 [ 364.227542][T22489] should_fail_usercopy+0x1a/0x20 [ 364.227631][T22489] _copy_from_user+0x1c/0xb0 [ 364.227665][T22489] __sys_bpf+0x178/0x790 [ 364.227720][T22489] __x64_sys_bpf+0x41/0x50 [ 364.227809][T22489] x64_sys_call+0x2478/0x2fb0 [ 364.227837][T22489] do_syscall_64+0xd2/0x200 [ 364.227868][T22489] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 364.227982][T22489] ? clear_bhb_loop+0x40/0x90 [ 364.228086][T22489] ? clear_bhb_loop+0x40/0x90 [ 364.228153][T22489] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 364.228178][T22489] RIP: 0033:0x7f07e40ae929 [ 364.228194][T22489] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 364.228212][T22489] RSP: 002b:00007f07e2717038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 364.228231][T22489] RAX: ffffffffffffffda RBX: 00007f07e42d5fa0 RCX: 00007f07e40ae929 [ 364.228271][T22489] RDX: 0000000000000020 RSI: 0000200000000240 RDI: 0000000000000015 [ 364.228287][T22489] RBP: 00007f07e2717090 R08: 0000000000000000 R09: 0000000000000000 [ 364.228299][T22489] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 364.228311][T22489] R13: 0000000000000000 R14: 00007f07e42d5fa0 R15: 00007fff2ed22738 [ 364.228335][T22489] [ 364.441809][T22491] netlink: 'syz.2.6459': attribute type 10 has an invalid length. [ 364.474662][T22491] batman_adv: batadv0: Adding interface: team0 [ 364.481210][T22491] batman_adv: batadv0: Not using interface team0 (retrying later): interface not active [ 364.516434][T22495] netlink: 'syz.2.6459': attribute type 10 has an invalid length. [ 364.524422][T22495] netlink: 2 bytes leftover after parsing attributes in process `syz.2.6459'. [ 364.688487][T22520] netlink: 56 bytes leftover after parsing attributes in process `syz.2.6471'. [ 364.698281][T22520] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6471'. [ 365.493745][T22573] netlink: 'syz.3.6487': attribute type 4 has an invalid length. [ 365.534478][T22577] syzkaller1: entered promiscuous mode [ 365.540019][T22577] syzkaller1: entered allmulticast mode [ 365.719758][T22597] FAULT_INJECTION: forcing a failure. [ 365.719758][T22597] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 365.733168][T22597] CPU: 1 UID: 0 PID: 22597 Comm: syz.2.6498 Tainted: G W 6.16.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 365.733210][T22597] Tainted: [W]=WARN [ 365.733218][T22597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 365.733292][T22597] Call Trace: [ 365.733300][T22597] [ 365.733310][T22597] __dump_stack+0x1d/0x30 [ 365.733337][T22597] dump_stack_lvl+0xe8/0x140 [ 365.733363][T22597] dump_stack+0x15/0x1b [ 365.733384][T22597] should_fail_ex+0x265/0x280 [ 365.733508][T22597] should_fail_alloc_page+0xf2/0x100 [ 365.733538][T22597] __alloc_frozen_pages_noprof+0xff/0x360 [ 365.733582][T22597] alloc_pages_mpol+0xb3/0x250 [ 365.733628][T22597] vma_alloc_folio_noprof+0x1aa/0x300 [ 365.733663][T22597] do_wp_page+0x673/0x2400 [ 365.733693][T22597] ? __rcu_read_lock+0x37/0x50 [ 365.733725][T22597] handle_mm_fault+0x77d/0x2be0 [ 365.733783][T22597] ? mas_walk+0xf2/0x120 [ 365.733816][T22597] do_user_addr_fault+0x636/0x1090 [ 365.733853][T22597] ? fpregs_assert_state_consistent+0xb4/0xe0 [ 365.733908][T22597] exc_page_fault+0x62/0xa0 [ 365.733995][T22597] asm_exc_page_fault+0x26/0x30 [ 365.734021][T22597] RIP: 0033:0x7f07e3f70d50 [ 365.734042][T22597] Code: 39 4f 08 72 4c 8d 4d ff 85 ed 74 33 66 0f 1f 44 00 00 48 39 f0 72 1b 4d 8b 07 49 89 c1 49 29 f1 47 0f b6 0c 08 45 84 c9 74 08 <45> 88 0c 00 49 8b 47 10 48 83 c0 01 49 89 47 10 83 e9 01 73 d3 41 [ 365.734068][T22597] RSP: 002b:00007f07e27164a0 EFLAGS: 00010202 [ 365.734150][T22597] RAX: 0000000000004005 RBX: 00007f07e2716540 RCX: 000000000000001b [ 365.734167][T22597] RDX: 00000000000029ff RSI: 0000000000000400 RDI: 00007f07e27165e0 [ 365.734184][T22597] RBP: 000000000000001c R08: 00007f07da2f7000 R09: 0000000000000004 [ 365.734200][T22597] R10: 0000200000000c42 R11: 00000000000004db R12: 0000000000000301 [ 365.734216][T22597] R13: 00007f07e414c020 R14: 0000000000000013 R15: 00007f07e27165e0 [ 365.734273][T22597] [ 365.734283][T22597] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 365.995404][T22607] lo speed is unknown, defaulting to 1000 [ 366.034676][T22607] lo speed is unknown, defaulting to 1000 [ 366.048859][T22616] netlink: 4 bytes leftover after parsing attributes in process `syz.6.6506'. [ 366.066485][T22616] bridge_slave_1: left allmulticast mode [ 366.072232][T22616] bridge_slave_1: left promiscuous mode [ 366.077978][T22616] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.079573][T22620] netlink: 248 bytes leftover after parsing attributes in process `syz.2.6507'. [ 366.095486][T22616] bridge_slave_0: left allmulticast mode [ 366.101200][T22616] bridge_slave_0: left promiscuous mode [ 366.106973][T22616] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.107028][T22620] netlink: 120 bytes leftover after parsing attributes in process `syz.2.6507'. [ 366.156554][T22622] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(11) [ 366.163186][T22622] vhci_hcd vhci_hcd.0: devid(0) speed(4) speed_str(wireless) [ 366.170960][T22622] vhci_hcd vhci_hcd.0: Device attached [ 366.191159][T22623] vhci_hcd: connection closed [ 366.191409][ T5554] vhci_hcd: stop threads [ 366.200513][ T5554] vhci_hcd: release socket [ 366.204938][ T5554] vhci_hcd: disconnect device [ 366.456895][T22642] netlink: 16 bytes leftover after parsing attributes in process `syz.6.6514'. [ 366.466013][T22642] netlink: 16 bytes leftover after parsing attributes in process `syz.6.6514'. [ 366.475322][T22642] netlink: 16 bytes leftover after parsing attributes in process `syz.6.6514'. [ 366.509960][T22642] netlink: 16 bytes leftover after parsing attributes in process `syz.6.6514'. [ 366.519041][T22642] netlink: 16 bytes leftover after parsing attributes in process `syz.6.6514'. [ 366.528239][T22642] netlink: 16 bytes leftover after parsing attributes in process `syz.6.6514'. [ 366.616530][T22642] netlink: 16 bytes leftover after parsing attributes in process `syz.6.6514'. [ 366.661939][T22637] ================================================================== [ 366.670077][T22637] BUG: KCSAN: data-race in __htab_map_lookup_elem / bpf_lru_pop_free [ 366.678195][T22637] [ 366.680540][T22637] write to 0xffff8881042a62e8 of 4 bytes by task 22653 on cpu 0: [ 366.688278][T22637] bpf_lru_pop_free+0xbd4/0xcb0 [ 366.693179][T22637] __htab_lru_percpu_map_update_elem+0xea/0x600 [ 366.699465][T22637] bpf_percpu_hash_update+0x61/0xa0 [ 366.704707][T22637] bpf_map_update_value+0x297/0x3a0 [ 366.709951][T22637] generic_map_update_batch+0x3f5/0x540 [ 366.715530][T22637] bpf_map_do_batch+0x255/0x380 [ 366.720397][T22637] __sys_bpf+0x2e0/0x790 [ 366.724675][T22637] __x64_sys_bpf+0x41/0x50 [ 366.729119][T22637] x64_sys_call+0x2478/0x2fb0 [ 366.733823][T22637] do_syscall_64+0xd2/0x200 [ 366.738342][T22637] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 366.744256][T22637] [ 366.746597][T22637] read to 0xffff8881042a62e8 of 4 bytes by task 22637 on cpu 1: [ 366.754252][T22637] __htab_map_lookup_elem+0xab/0x150 [ 366.759586][T22637] htab_lru_percpu_map_lookup_elem+0x20/0xb0 [ 366.765606][T22637] bpf_prog_1592a6279ab44e8a+0x48/0x50 [ 366.771099][T22637] bpf_trace_run2+0x107/0x1c0 [ 366.775805][T22637] __traceiter_kfree+0x2e/0x50 [ 366.780593][T22637] kfree+0x27b/0x320 [ 366.784518][T22637] ___sys_recvmsg+0x135/0x370 [ 366.789217][T22637] do_recvmmsg+0x1ef/0x540 [ 366.793651][T22637] __x64_sys_recvmmsg+0xe5/0x170 [ 366.798611][T22637] x64_sys_call+0x1c6a/0x2fb0 [ 366.803307][T22637] do_syscall_64+0xd2/0x200 [ 366.807835][T22637] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 366.813749][T22637] [ 366.816082][T22637] value changed: 0x3dd8f34f -> 0x7cc9e3a7 [ 366.821804][T22637] [ 366.824138][T22637] Reported by Kernel Concurrency Sanitizer on: [ 366.830299][T22637] CPU: 1 UID: 0 PID: 22637 Comm: syz.3.6512 Tainted: G W 6.16.0-rc1-syzkaller #0 PREEMPT(voluntary) [ 366.842651][T22637] Tainted: [W]=WARN [ 366.846469][T22637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 366.856539][T22637] ================================================================== [ 366.981150][T22654] lo speed is unknown, defaulting to 1000 [ 367.019580][T22654] lo speed is unknown, defaulting to 1000