last executing test programs: 27m27.360181726s ago: executing program 32 (id=323): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000300)='sys_enter\x00', r1, 0x0, 0xfffffffffffffffc}, 0x18) execve(0x0, 0x0, 0x0) 27m11.131007832s ago: executing program 33 (id=649): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000500)='w\xde\xa3\x05\xa3\x91\x00\x00\x00\x00\x00\x00\x8f\xc0\x9b\x86\xef\\\xc0\x89\av\x9f\xaek\xbd\x87W\x1d\x1b(\x8e\xf8\\2\x98\xf7P\x1b8\xcf\xf5\xdc0x0}) r4 = socket$packet(0x11, 0x2, 0x300) bind$packet(r4, &(0x7f00000001c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @link_local}, 0x14) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000), 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000007c0)={{r1}, &(0x7f0000000400), &(0x7f00000004c0)}, 0x20) r5 = syz_io_uring_setup(0x3b51, &(0x7f00000006c0)={0x0, 0x7758, 0x1000, 0x8007, 0x1bf}, &(0x7f0000000300)=0x0, &(0x7f0000000680)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) io_uring_enter(r5, 0x10007b0f, 0x96f0, 0x20, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x9, 0x0, 0x7ffc0002}]}) syslog(0x2, &(0x7f0000000040)=""/19, 0xe2) 26m38.239285848s ago: executing program 34 (id=1279): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffe}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000008000000000000000000910095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r2, 0x2f, 0x0, @void}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000140)=r3, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0xfff, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRESOCT=r0], &(0x7f0000000040)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r4, 0x0, 0xfffffffffffffffc}, 0x18) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r5) sendmsg$TIPC_CMD_ENABLE_BEARER(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="010000000d0000000000010000000000000001410000001c0017"], 0x38}, 0x1, 0x0, 0x0, 0x44081}, 0x0) 26m28.857544244s ago: executing program 35 (id=1460): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002078316e00000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000000600000085000000050000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0a000000040000"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r1}, &(0x7f0000000200), &(0x7f0000000280)}, 0x20) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r2) r4 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @private1, 0x9}]}, &(0x7f00000002c0)=0x10) getsockopt$inet_sctp6_SCTP_MAX_BURST(r7, 0x84, 0x83, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r6, 0x84, 0x7c, &(0x7f00000000c0)={r8, 0x3, 0x1ff}, &(0x7f0000000100)=0x8) sendmsg$ETHTOOL_MSG_WOL_GET(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01002abd7000000000001b0000000c00018008000100", @ANYRES32=r5], 0x20}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='mm_page_free\x00', r0, 0x0, 0x3}, 0x18) r9 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000480), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0xffffffffffffffff, &(0x7f0000000380)={0xffffffffffffffff}, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r9, &(0x7f0000000200)={0x3, 0x40, 0xfa00, {{0xa, 0xfffe, 0x0, @empty, 0x4}, {0xa, 0x0, 0x0, @loopback, 0xfffffffc}, r10, 0x400}}, 0x48) write$RDMA_USER_CM_CMD_JOIN_MCAST(r9, &(0x7f0000000d40)={0x16, 0x98, 0xfa00, {0x0, 0x2, r10, 0x30, 0x1, @ib={0x1b, 0x3, 0x3, {"3f0909000001007100"}, 0x500e, 0x0, 0x10}}}, 0xa0) 24m53.880730128s ago: executing program 36 (id=3193): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r0}, 0x18) add_key(0x0, 0x0, &(0x7f0000000bc0)="0100000200373a4541062000a59ea940d2cb0b36b8f5020000a00000050000000000eb000000", 0x26, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x50) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r2, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) socket$kcm(0x2d, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0xd, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40e00, 0x10, '\x00', 0x0, @sock_ops=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r1}, 0x0, &(0x7f00000003c0)}, 0x20) ioctl$EXT4_IOC_SETFSUUID(r0, 0x4008662c, &(0x7f0000000200)={0x10, 0x0, "d18a09a58c9204e218007dbf0300f95b"}) ioctl$LOOP_CONFIGURE(0xffffffffffffffff, 0x4c0a, &(0x7f00000005c0)={0xffffffffffffffff, 0x800, {0x2a00, 0x80010000, 0x0, 0x5, 0x0, 0x0, 0x0, 0x20, 0x1c, "fee8a2ab78fc179fd1f8a0e9a1af1ea09dc2b7fb0a010000000000000000030000000000000000000000000000000000000000000000001b00", "2809e8dbe108598927875397bab22d0000b42076c1ce8ef05f819e01177d3d458dac00000000000000000000003b000000000000005bd7ed960e17288800", "90be8b1c5512406c7f00", [0x4, 0x40000000000000]}}) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x143241, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x275a, 0x0) fcntl$lock(r4, 0x6, &(0x7f0000000000)={0x0, 0x0, 0x8}) fcntl$lock(r4, 0x7, &(0x7f0000000280)={0x1, 0x0, 0x2f, 0x9}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000018c0), 0x101000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 'queue0\x00', 0x1}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r5, 0x40605346, &(0x7f0000000400)={0x0, 0x0, {0x1, 0x1, 0x4000000, 0x2, 0x185}}) fcntl$lock(r4, 0x7, &(0x7f0000000300)={0x0, 0x2, 0x4, 0xa5}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r4, 0x20, &(0x7f0000000100)={&(0x7f0000000f40)=""/4096, 0x1000, 0x0, &(0x7f0000000080)=""/116, 0x74}}, 0x10) socket(0x28, 0x5, 0x0) r6 = socket(0x28, 0x5, 0x0) bind$vsock_stream(r6, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) listen(r6, 0x4) 15m31.585624038s ago: executing program 37 (id=10407): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000180)=[{0x6, 0x7, 0x0, 0x7fff0006}]}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x18) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x70, 0x103301) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000200)) 6m56.735646186s ago: executing program 38 (id=15916): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x7}}, [@NFT_MSG_NEWRULE={0x198, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x16c, 0x4, 0x0, 0x1, [{0x154, 0x1, 0x0, 0x1, @match={{0xa}, @val={0x144, 0x2, 0x0, 0x1, [@NFTA_MATCH_REV={0x8}, @NFTA_MATCH_INFO={0x138, 0x3, "ebae551382395afa4d23edfcbe6d55b57cb15e63c15c46395916e2b388abc3d6ce2316334e8278ad51f6d123a616cf3eb44b275fe6bc6bf402a3f9335458bb7a92f23fc0aa88f2495ff70157ea6b29f7fab11ec362920cab3350208c749f342b38e0df9334cea6fe1e331d76beb7094102d5d409992dcd236e3fd7a8785f97ae9d01b0822c161a491bef0501f8e81ddd66d1b676e8c9f0b2159c2cc0b069669b5af546f644c39bedd627181d27d9c185aae5d910550f08822c6fec60302779b9e812403a2ff826781b4c761bd14eb7515ae224260c9534891afdd05d18b2ffe91f4052766a0b9fe3955bfb1866142e7c1caceb88de7d6e8a5c08ce052bb461f0c7ee914ca5c98c19442d0262a6d04a8e3e29360a9b5871812e08542d54775f5843d70b15871bc247e30d66b83560c014f5000000"}]}}}, {0x14, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x4}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x11, 0x20}}, 0x1c0}, 0x1, 0x0, 0x0, 0x8010}, 0x4000800) 6m46.291689301s ago: executing program 39 (id=16084): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x4, 0x0, 0x7ffc1ffb}]}) r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, 0x0, 0x0}, 0x94) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000040)=ANY=[@ANYBLOB="4400000010000305000000090000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000002400128009000100626f6e6400000000140002800800130001000000080014"], 0x44}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x39) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket(0x400000000010, 0x2, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, {0x0, 0x1}, {0xffff, 0xffff}, {0xffff, 0x9}}, [@qdisc_kind_options=@q_sfb={{0x8}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x1, {0xe0000000, 0x5, 0xb7, 0x2, 0x1, 0x1, 0x4, 0x3, 0x1}}}}]}, 0x58}}, 0x4000) r5 = socket(0x10, 0x803, 0x0) r6 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@newtfilter={0x44, 0x2c, 0xd2b, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {0xb, 0x3}, {}, {0x1, 0x9}}, [@filter_kind_options=@f_u32={{0x8}, {0x18, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x7, 0x6, 0x0, 0x9, 0x401, 0x1000, 0x8a0, 0xd5}}]}}]}, 0x44}, 0x1, 0x0, 0x0, 0x81}, 0x800) 6m40.784549619s ago: executing program 40 (id=16151): socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x4076cbba9945d516, &(0x7f0000000340)={0x0, 0x14}}, 0x0) getsockname$packet(r0, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r1 = socket(0x10, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={0x0}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x2) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syslog(0x3, 0x0, 0x0) lseek(0xffffffffffffffff, 0x7, 0x4) read(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000000)={0xffffffffffffffff, r5, 0x25, 0x0, @void}, 0x10) socket$inet6_sctp(0xa, 0x1, 0x84) openat$hwrng(0xffffffffffffff9c, 0x0, 0x2000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000000001000001"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, 0x0, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r6, 0x0, 0x7}, 0x18) getsockname$packet(r3, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@newqdisc={0x2c, 0x24, 0x5820a61ca228651, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}, {0x0, 0xfff1}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000008c0)=@newtfilter={0x1d58, 0x28, 0x575ac7824d421509, 0x70bd2a, 0x4, {0x0, 0x0, 0x0, r7, {}, {0x1}, {0x4, 0x3d}}, [@filter_kind_options=@f_basic={{0xa}, {0x1d28, 0x2, [@TCA_BASIC_EMATCHES={0x170, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x8000}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x5}}, @TCA_EMATCH_TREE_LIST={0x5c, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x3, 0x0, 0x0, {{0x3, 0x7, 0x761}, {{0x0, 0x0, 0x1, 0x1}, {0x2, 0x1, 0x1}}}}, @TCF_EM_CMP={0x18, 0x2, 0x0, 0x0, {{0x2, 0x1, 0x400}, {0x80000000, 0x2, 0x3800, 0x3, 0x7, 0x1}}}, @TCF_EM_CMP={0x18, 0x3, 0x0, 0x0, {{0x6, 0x1, 0x2}, {0xf, 0x5c2, 0x4, 0x5, 0x2, 0x2, 0x1}}}, @TCF_EM_NBYTE={0x14, 0x1, 0x0, 0x0, {{0xb976, 0x2, 0x2}, {0xfffd, 0x4, 0x1, "3a7c19f8"}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x5e5f}}, @TCA_EMATCH_TREE_HDR={0x8}, @TCA_EMATCH_TREE_LIST={0xe8, 0x2, 0x0, 0x1, [@TCF_EM_IPSET={0x10, 0x1, 0x0, 0x0, {{0x0, 0x8, 0x2}, {0x3}}}, @TCF_EM_NBYTE={0x14, 0x3, 0x0, 0x0, {{0x1, 0x2, 0x4}, {0x0, 0x1, 0x2, "06"}}}, @TCF_EM_U32={0x1c, 0x2, 0x0, 0x0, {{0x5, 0x3, 0x354}, {0xff, 0x9, 0x3, 0x8000}}}, @TCF_EM_NBYTE={0x1c, 0x0, 0x0, 0x0, {{0x200, 0x2, 0x5f7a}, {0x8, 0xa, 0x0, "e84d76e9730c690a8217"}}}, @TCF_EM_IPSET={0x10, 0x2, 0x0, 0x0, {{0x4, 0x8, 0x9}, {0x3, 0x6, 0x2}}}, @TCF_EM_IPT={0x50, 0x3, 0x0, 0x0, {{0x100, 0x9, 0x9e22}, [@TCA_EM_IPT_HOOK={0x8}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x2}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x4}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x3}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x3}, @TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_HOOK={0x8}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x3}]}}, @TCF_EM_IPT={0x28, 0x2, 0x0, 0x0, {{0x2c0, 0x9, 0xe4}, [@TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0xa}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x3}, @TCA_EM_IPT_MATCH_NAME={0xb}]}}]}]}, @TCA_BASIC_CLASSID={0x8, 0x1, {0xd, 0xc}}, @TCA_BASIC_ACT={0x4}, @TCA_BASIC_ACT={0x17d0, 0x3, [@m_xt={0xcc, 0x5, 0x0, 0x0, {{0x7}, {0x4}, {0xa4, 0x6, "658a0b25ffef615035e198f5cf26a75c2c06d58106fb0fb5c6d7d84a6b86c57f452690494cbd1a9a53a350a9818ce1a82d93b39028c4c91c18780d0d2d6cbdbaeadd3da4bf00332f7cf4f907b997246e1a985f3e6473408dbc0544295ab97ac167c68e3553fd1c055d8040c078ba8b7eea898b65240f375e1d6df715a28db8727531fe16fe8842400d1d2665b381e331caf9e1736e1b65141dceae034b8db332"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_bpf={0x308, 0x12, 0x0, 0x0, {{0x8}, {0x29c, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS={0x44, 0x4, [{0x44, 0x5, 0x0, 0x8}, {0x88, 0x6, 0xf, 0x5}, {0x0, 0x69, 0x6, 0x6}, {0x7, 0x5, 0x5, 0x7}, {0x100, 0x40, 0xfb, 0x9}, {0x2, 0x9, 0xee, 0x400}, {0x1, 0x2, 0x7, 0x9}, {0x1, 0x6, 0x4, 0xcb}]}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x9}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x8}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x7, 0x928d, 0x4, 0x7, 0xffffff5f}}, @TCA_ACT_BPF_NAME={0x20a, 0x6, './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x2}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}]}, {0x46, 0x6, "e0bd29be7bb43a6253d17af65ca893116549b4da72c08679de3c72ed352d09d09c8511f995d6d2da919c4c6fe3c806bb6879cebd71232b5d7c062acbe7b4e3f4fb77"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x2}}}}, @m_sample={0x84, 0x5, 0x0, 0x0, {{0xb}, {0x3c, 0x2, 0x0, 0x1, [@TCA_SAMPLE_RATE={0x8, 0x3, 0x5}, @TCA_SAMPLE_RATE={0x8, 0x3, 0xffffffff}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0x6, 0x9, 0x20000000, 0x80000000, 0x3}}, @TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x4}, @TCA_SAMPLE_RATE={0x8, 0x3, 0x73a}]}, {0x1d, 0x6, "1bc17475d304f75a87fcd435b941e88a46c49e5b08f209554e"}, {0xc}, {0xc, 0x8, {0x3, 0x1}}}}, @m_connmark={0x11c, 0x4, 0x0, 0x0, {{0xd}, {0x3c, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x2, 0x6, 0x0, 0x6, 0x9}, 0x5d39}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x0, 0x8, 0x0, 0xfffffffa, 0x4}, 0x3}}]}, {0xb2, 0x6, "37e452819e1be15d3282a2808a106042c5d02537123de1660058053dac3b814b2f84f1798ec475c0087feafd1b60b8ef03f82e36914cafcd8e5b188d45bc68227e505eb8a69c1abfd9eab8094085a135d45137f79b0bf78d581f88cfde02f3a16d95bc6ee8548c40bff1f371de4ba74b93fbe39305fee04b2f48d0f8137152a5556185ef103d54360f75492224984ebd20acf81c65d8dded764bd9abced042a0e194866b514eac336681df759f45"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}, @m_xt={0x148, 0xa, 0x0, 0x0, {{0x7}, {0x48, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x3b, 0x6, {0xa, 'mangle\x00', 0x2, 0x8001, "dbe1f81b3a8434c291848440d9e00d4052"}}, @TCA_IPT_INDEX={0x8, 0x3, 0x1}]}, {0xd9, 0x6, "73fa816d08d6d6356eebecb0a1ec7a3741b09a71ae540020768b875a4c93e21087498b4381f6be60a8044ebed2f9ecd81eb711a41c06724cd6fc2b4d719e942c2474c6b4fa9a2003ee44362cc11c7d2d3068ede784cdd6813415468ee9d8d86eeea14629cbbe84e4d8dafc350efb1c8523beea4707693dfdbfd14fa6d9df04bf33220740307ab7f79dc2c1fd4f74684bfe6d07716a81d7607752383c75cdedda996d721df441eb4b1587aae870f6e409e98f8910e7cdb2e6d627c84eda709f9af4db6f824c77175701e27a3f1c3d91a0f7ffd55f3e"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x3}}}}, @m_mpls={0x128, 0x11, 0x0, 0x0, {{0x9}, {0x58, 0x2, 0x0, 0x1, [@TCA_MPLS_TC={0x5, 0x6, 0x2}, @TCA_MPLS_LABEL={0x8, 0x5, 0x23708}, @TCA_MPLS_TC={0x5, 0x6, 0x1}, @TCA_MPLS_TC={0x5}, @TCA_MPLS_TC={0x5, 0x6, 0x2}, @TCA_MPLS_TTL={0x5, 0x7, 0x4}, @TCA_MPLS_PARMS={0x1c, 0x2, {{0x80000001, 0x362, 0x4, 0x9df, 0x4}, 0x2}}, @TCA_MPLS_TTL={0x5, 0x7, 0x9}]}, {0xa8, 0x6, "5bec0f7fc4970dffb9c33d1582b2ae92a8ba4f556ffc382a0160a9deff3e4649cbdf79fb66c15fb8e514beb0f0257e511368f518b9c6dc1c5be12e654852a1f6147cfe5d4fb9c1be8d2a2da3f87034bdd9bf68b567163c6ec8417540d2a9dc018cb32e103a960d277ccd6c4f351acd532d7ee0300aea68a417085fa7cfd1b027be23c3e0ae83e4b73d57350bf7bb3ad03dd4180737ac4fde98485ab5786c488dcdbecc27"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1}}}}, @m_csum={0x98, 0x11, 0x0, 0x0, {{0x9}, {0x20, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x9, 0x3, 0x2, 0x7, 0x4}, 0x4d}}]}, {0x4e, 0x6, "1f1592db2cea2395bec5e35dc2b0433261dc85431338a49ef3cfa95ead14f0bc82c56dbed83585a0f2c9d57b6bd39d2da018e8e477b581725c8f59c851d4d5b000fe0edf7d34d5fd594d"}, {0xc}, {0xc, 0x8, {0x3, 0x1}}}}, @m_pedit={0xf50, 0x1d, 0x0, 0x0, {{0xa}, {0xf24, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0xe8, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0x3c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}, {0x24, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}]}, {0x34, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}, {0x3c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}]}]}, @TCA_PEDIT_PARMS_EX={0xe38, 0x4, {{{0x2, 0x8, 0x2, 0x8, 0x8ff}, 0x0, 0x6, [{0x6, 0x8, 0xa89, 0x101, 0x6, 0x101}]}, [{0x4, 0x4, 0x800, 0x6, 0x1, 0x80000001}, {0x0, 0x0, 0x5, 0x0, 0x53f3, 0x7fffffff}, {0x1, 0x8, 0xfffffffc, 0xd9, 0x5, 0x7fffffff}, {0x9, 0x0, 0x1, 0x10000, 0x2, 0xffff11c3}, {0x9, 0xff, 0x8, 0xe173, 0x2d8, 0xdf}, {0x9, 0xb8e9, 0xd8ff, 0x6, 0x6, 0x9}, {0x50281dcc, 0x6f, 0xffffec5a, 0x5, 0x9, 0xf53e}, {0x7, 0x2, 0x9, 0xffffffff, 0x5, 0x8}, {0x1000, 0x2, 0x0, 0x6, 0x9, 0x1}, {0x2, 0x80000000, 0xa, 0x40, 0x7, 0xc5}, {0x7, 0x1000, 0x10000, 0x2, 0x200d, 0xc98}, {0xa5d, 0xeca4, 0xffff, 0x40, 0xffff, 0xc7}, {0x4, 0xcba6, 0x1, 0x9, 0xff, 0x10}, {0x3a651edf, 0x7, 0x9, 0x7f, 0x72, 0x6a}, {0x0, 0x47, 0x6, 0x5, 0x0, 0x4}, {0x8, 0x1, 0x0, 0x82, 0x80000000, 0x1}, {0x3ff, 0x9, 0xfff, 0x4, 0xb94}, {0xffff, 0x25, 0x5, 0xb065, 0x8, 0x2}, {0x7fff, 0x2, 0xfffffff8, 0x3, 0x4, 0x1}, {0x7, 0x0, 0x0, 0x5, 0x29, 0x7}, {0xc, 0x2, 0x2, 0x4, 0x8, 0xf}, {0x78f, 0xc86e, 0x0, 0xfffffff8, 0x7ff, 0x1c}, {0x8000, 0x8723, 0x531, 0x0, 0x4, 0x401}, {0x0, 0x2, 0x5, 0x2, 0x7fffffff, 0x2b}, {0x80000000, 0x80, 0x0, 0xf6e, 0xc, 0x40}, {0x9, 0x9, 0xffff, 0x8, 0x8001, 0x6}, {0x80000000, 0x9e7e, 0x8, 0x4, 0x8, 0x2}, {0x0, 0x7, 0xef, 0xfffffffe, 0x5, 0x81}, {0x2, 0x0, 0x0, 0x0, 0x2, 0x2}, {0x8, 0x5, 0x4, 0x4ce, 0x1, 0x4}, {0x9a0, 0x2, 0x5, 0x7fffffff, 0xee, 0x6}, {0x1, 0x1, 0x9, 0x7, 0x1, 0x1}, {0xe15, 0xa, 0x3ff, 0x5, 0x10, 0x3}, {0xffffffff, 0x4, 0x2, 0x2e01, 0x7686}, {0xcef, 0x10001, 0x0, 0x200, 0xffffff00, 0x7f}, {0x9, 0x5, 0x8001, 0x5, 0xdd9, 0x10}, {0x2, 0x6, 0x1ff, 0x5, 0x80000001, 0x2}, {0x0, 0xbd, 0x3, 0xab3, 0x2, 0x41}, {0x21b6, 0x8, 0x7, 0x46fb, 0x3dd, 0x3}, {0x7fff, 0x4, 0xc, 0x3, 0x81, 0xc81}, {0xdc4d, 0x2ea16b2e, 0x2, 0x4, 0xfffffffb, 0x4}, {0x0, 0x4a9, 0x2, 0x2, 0x4, 0x10001}, {0x100, 0x8, 0x8, 0x4, 0x9, 0x1}, {0xace, 0x3, 0x6, 0x4520, 0x0, 0x1}, {0x8, 0x7ff, 0x0, 0x7ff, 0x1, 0xfffffe00}, {0x6, 0x3, 0x3, 0x84, 0xf, 0xf9f8}, {0x2, 0x8, 0x6, 0x2, 0xc, 0x200}, {0x2, 0x6, 0x5, 0xfffffffa, 0x6, 0xfffffffe}, {0xffffff80, 0x7, 0x80000001, 0x4, 0x1, 0x4}, {0x0, 0x1, 0x3ff, 0x100, 0xfffffa7f, 0x9}, {0x2, 0x9, 0x0, 0xbab0, 0x6, 0x4b12}, {0x0, 0x4, 0x8000, 0x8001, 0x6, 0x9}, {0xcd, 0x8fd, 0x9, 0x0, 0x9, 0xe9}, {0x4, 0x28, 0x6, 0x81, 0x1ff, 0x3}, {0x9, 0x7, 0x3, 0x4c000, 0x8, 0x6}, {0xc, 0x6, 0x1, 0x9, 0xbdae, 0xf6}, {0x2, 0xa372, 0xf, 0x713, 0xd, 0x9}, {0x6, 0x1, 0x10001, 0x8000, 0x1, 0x2b83}, {0x1, 0x6, 0xb, 0x1, 0xaee}, {0x6a3, 0x9, 0x89c, 0x6, 0x8, 0xe841}, {0x80000001, 0x2, 0x1e6, 0x7, 0x1, 0x32}, {0x7, 0x3, 0x2, 0x2, 0x101, 0x180}, {0x9, 0x8bb0, 0x10001, 0x6eb, 0xf, 0xa}, {0x7, 0x7, 0x14, 0x4, 0x6, 0x10000}, {0x4, 0xf6a, 0x2, 0x62, 0xff, 0x2}, {0x8, 0xaf, 0xfffffff8, 0x4, 0x87c, 0xffffffff}, {0xffffffa5, 0x5, 0x3, 0x3, 0x6, 0xffff}, {0x1, 0x5, 0x1, 0x4f, 0x6, 0x5}, {0x80, 0x5, 0x2, 0x0, 0x2, 0x1e92}, {0x7fff, 0x200, 0x2, 0x8000, 0x800, 0x8}, {0x9d4, 0xfffffff9, 0x7e, 0xf78, 0x5, 0x6}, {0x6, 0x7f, 0x1, 0x81ae, 0x4, 0x7}, {0xffff, 0x401, 0x101, 0x2, 0x6, 0x9}, {0x6, 0xa, 0x6, 0xba4, 0x6237, 0x5}, {0x9, 0x1, 0x4, 0xfffffffb, 0x7, 0x2}, {0x9, 0x6, 0x3, 0x100, 0x10, 0x1a1}, {0x8, 0x1a74c51d, 0x7, 0x1000, 0xfffffff9, 0x9}, {0x4, 0xb, 0x0, 0x2, 0xff, 0x8}, {0x1, 0x484, 0xfffffff9, 0x2, 0x1ff, 0x9}, {0x100, 0x3, 0x40, 0x81, 0x70a3, 0x3}, {0x7fffffff, 0x0, 0x8, 0x7fff, 0x9, 0x6}, {0x4, 0xa, 0x6, 0x9, 0x5, 0x2}, {0x2, 0xfb, 0x7, 0xfffff001, 0x7, 0x2}, {0x79, 0x8, 0x0, 0xf, 0xb, 0x7fff}, {0x7fffffff, 0x0, 0xd, 0x2, 0x0, 0xc411}, {0x2, 0x4, 0x2, 0x400, 0x317e, 0x4}, {0x7f, 0x40, 0x4, 0x7, 0xb61, 0x101}, {0x9, 0xed8, 0x9a6b, 0xfffffffd, 0x0, 0x8}, {0x0, 0x9, 0x6, 0xe, 0x0, 0x5}, {0x7, 0x2, 0x1000, 0x7, 0xfff, 0xcae}, {0x2, 0xa9ca, 0x8, 0x4, 0x6, 0x1}, {0x0, 0x2, 0x70, 0xfffffff6, 0x4, 0x3}, {0x8, 0xfff, 0x55, 0x5, 0x5b, 0x3}, {0x3, 0xb5, 0x0, 0x80, 0x9, 0x4}, {0xb, 0x0, 0xa5, 0x349, 0x5, 0x5}, {0x3, 0x6, 0x5, 0xe, 0x5, 0x8}, {0x9, 0x3, 0x0, 0x1, 0x3}, {0x5, 0x2, 0x1, 0x81, 0x7}, {0xbd8, 0x4, 0x10000000, 0x2, 0x100, 0x5}, {0x9, 0x7, 0x7, 0x7, 0xa, 0x24af}, {0x101, 0x2, 0x3, 0x8, 0x4, 0x7}, {0x1, 0x0, 0x4, 0x9f, 0x418e281d}, {0xf, 0x0, 0x9, 0x7, 0xd90, 0x1}, {0x1, 0x401, 0x800, 0x3, 0x6, 0x7d21}, {0x80000001, 0x8, 0x4, 0x54a, 0x8001, 0x74}, {0x2, 0x9, 0x6, 0x9c, 0x7f, 0x3}, {0x6, 0xfffffff7, 0x5, 0x80000000, 0x8, 0x3}, {0x7f, 0xfff, 0x7ff, 0x0, 0x40, 0x100}, {0x3, 0x27, 0x7, 0x200, 0x7, 0xd6b}, {0x5, 0x8, 0x2, 0x0, 0x6, 0x800}, {0x1, 0x2, 0x100, 0x400, 0xb, 0x7}, {0x1ff, 0x7ff, 0x9, 0xffff3b05, 0xc65f}, {0x1e9, 0x5, 0x4, 0x1, 0x8, 0xfffffffb}, {0x200, 0x4, 0x7, 0x81, 0x8}, {0x60, 0xe0, 0x7, 0x80000000, 0x200, 0x7}, {0x3, 0x5, 0x3, 0x8, 0x9, 0x3}, {0x2, 0x47, 0x80000000, 0x1ff, 0x2, 0x9}, {0x3, 0x5, 0x79, 0x1, 0x9, 0x8}, {0x9, 0x2, 0x3, 0x0, 0x1, 0x8}, {0x0, 0x4b, 0x3, 0x40, 0x5, 0x6}, {0x7, 0x8, 0x5, 0xffff8001, 0x2, 0x6}, {0x1, 0x81, 0x8, 0x7, 0x67, 0x1}, {0x6, 0x0, 0x3, 0x7, 0x0, 0x4}, {0xfffffffd, 0x3, 0x9, 0x7, 0x3c61, 0x9}, {0x9, 0x71, 0x5, 0xb, 0xffffff80}, {0xfffffffc, 0x4, 0xfffffffc, 0x2, 0x7ff, 0x4}, {0x3, 0x0, 0x4, 0x9, 0x8, 0x7}, {0x6f4, 0xa, 0x1, 0x5, 0x4013}], [{0x4}, {0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x2}, {0x2, 0x1}, {0x5}, {0x72b6fc66066295d4, 0x1}, {0x0, 0x1}, {0x7}, {0x1, 0x1}, {0x1}, {0x1, 0x1}, {0x7, 0x1}, {0x4}, {}, {0x2}, {0x4}, {0x4}, {0x1, 0x1}, {0x5}, {0x0, 0x1}, {0x5}, {0x5}, {0x1, 0x1}, {0x3}, {0x1, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {}, {0x2}, {0x2}, {0x5, 0x1}, {0x3}, {0x5}, {}, {0x3, 0x1}, {0x1}, {}, {0x3, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x6, 0x1}, {0x3}, {0x2, 0x1}, {0x1, 0x1}, {0x5}, {0x2, 0x1}, {}, {0x7e51ad2c646c2aa, 0x1}, {0x3}, {0x3}, {0x7, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x4}, {0x3}, {0x5}, {0x1, 0x1}, {0x1, 0x1}, {}, {0x0, 0x1}, {0x4, 0x1}, {0x4}, {0x4, 0x1}, {0x5}, {0x4}, {0x0, 0x1}, {0x5}, {0x5, 0x1}, {0x2}, {0x2, 0x1}, {0x2, 0x1}, {}, {0x3}, {}, {0x0, 0x1}, {0x1}, {0x2}, {0x4, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x2}, {0x5}, {0x5}, {0x1, 0x1}, {0x2}, {0x5, 0x1}, {0x1}, {0x5}, {0x4, 0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x5, 0x2}, {0x6}, {0x1, 0x1}, {0x1, 0x1}, {0x5}, {0x5}, {0x4, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x1, 0x1}, {}, {}, {0x5}, {0x4, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x2}, {}, {0x2}, {0x1, 0x1}, {}, {}, {0x2}, {0x5}, {0x1, 0x1}, {0x1}, {0x2, 0x1}, {0x1}, {0x3, 0x1}, {0x0, 0x1}]}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x1}}}}]}, @TCA_BASIC_ACT={0x3d0, 0x3, [@m_vlan={0x104, 0x15, 0x0, 0x0, {{0x9}, {0xc, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}]}, {0xce, 0x6, "4d317467251a1a4fdff9a0bc522294a70415a5eb766c2030af893992aac282089ed4e313bd7b07c081ae8df4be91f9b9b6ef8d504446ef595f1e5aba62ec43a5cb023f9d141960e0b630bb44e2132d01f7377df6277bc890bb4ce2232bec4dce8e1a1e6ed27e71dbfe2a623b9785fceee9e5386e8c8fdb7692f531f7822836b155b8b4ce51ef1629348ab063070cee27539c27a308bc80ecbd01b06be6f4df9c26eaad5a90529f063837187fae89b4ec78c51010d398e68db03d9cca87b89d2e4c6ed107aa9a7f5f7265"}, {0xc}, {0xc, 0x8, {0x3}}}}, @m_skbedit={0x84, 0x3, 0x0, 0x0, {{0xc}, {0x1c, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PARMS={0x18, 0x2, {0xf, 0xfffffffa, 0x3, 0xf, 0x5}}]}, {0x3d, 0x6, "27f4f1ab16e2b99bc2eda56be284eb77323b13acc3ef70ff48b94b21df411ed026c720165a9b41a5bdad63afe9df80d503d0b4f364c4fce7c5"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x3}}}}, @m_tunnel_key={0x12c, 0x1, 0x0, 0x0, {{0xf}, {0x14, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8, 0x7, 0x1}, @TCA_TUNNEL_KEY_NO_CSUM={0x5, 0xa, 0x1}]}, {0xec, 0x6, "f874bfe4bdc56cb3ecd0e731f720cb5437035ca7f9410dc0ebd4f3b6c130cba5b9d2b64d29e0ef5a469fd980f4e1a9dc5301c0e30128d01e3e34626454d126c9b34330a6ef2f10713ff30b6ba5813e28a3dadcba80489e4dde2fc3641c0781f21cfabe49c852b5d6222cea1369a9f36a246052b939c1a744dc5a6e45ccd2b2e64612af1e887c2d3d04610674a6ad64ab93ce005641a1eef164359d4130d99922d51f70a4aa85feafd5c2e4795640a2226c3dbe43fc4b2235441b197fde4cc6bf16e891818c81dc3d117057f0b30abd147e25940eee5b1c660ad95ad59124ee999d77715d023e39b8"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_connmark={0x118, 0x18, 0x0, 0x0, {{0xd}, {0x3c, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xc, 0x7, 0x7, 0x9, 0x100}, 0x1}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x2, 0x1, 0x4, 0x0, 0x5}}}]}, {0xaf, 0x6, "ba75412389666f6cc0645dee025c4baab8bf8ee78177e7f79f23a82ad68593c81c588cc171104dfa44acf2429c78b9f1086d80b95de8fb83ac8f1483c0313a6b4ad77bdf8e38c87e7398b33115d9a1472a6a535a16e071ed827684858a26faad8bada05cd5806bdc716db23023295cd2b898a7f11a75bbb476cde92853118b75f7638061aa7f8521972f13cdc8cbd4d9dd3abb7db88f2d28065aceb18739f47e2f4fe44b89766c4b5264fa"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x3}}}}]}, @TCA_BASIC_CLASSID={0x8, 0x1, {0xf, 0x8}}]}}]}, 0x1d58}}, 0x40) 5m56.82186904s ago: executing program 41 (id=16800): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x2e, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbf7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r0}, 0x10) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 5m51.404194298s ago: executing program 1 (id=16881): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x8}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000a00)=ANY=[@ANYRESOCT=r2, @ANYBLOB="ac11d4409af104a374ae0d042f151fda1b725e5684c341503c60c4e0bf8ab56fd3478761dd30bc7dc6b9f1322c32b109a40ac268cfd88dc02d9b9e4ebb01fcdd2c7a7f922ac0a36ea1e6a84e915cad39b7f682c07724fd115ef3e4dc34a906a72e5eb0e734f82983a20f719a5bb69681fbf9be0d62be44df443d3fcc1b9b5deed037f323bccf6b266815ddc87839e930cf0587b3337b63856d5e943afacd54a082a0ccfe1fef1a4ea422f2cc3f331b2f91015d2e48ec74fc71c03f211a30b1cb174f70d7a526eb2b807b6d87f17f4c4afc8335a7183145fb679e85c646d02ce72e560536972b6f14542734d036daf8", @ANYRES8=0x0, @ANYRESOCT=r1, @ANYRES16=r1, @ANYRES64], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYRES32=r4], &(0x7f0000000240)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000004c0)='mm_page_free\x00', r5, 0x0, 0x178}, 0x18) r6 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) r7 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r7, 0x0) write$selinux_load(r6, &(0x7f0000000000)=ANY=[], 0x44f0) r8 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$incfs_metadata(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0), &(0x7f0000000780)="15ca05765ad86218d433e26ab10546a47a5f373a23f3f24950a62be4ac050b0c319e89190ed2ebb19c45de272ceefd7a0eeb175f0d4df74768578f3e0ebba8544b78eb071febd82fd22006f5e8f1f46dcb6dc56a4e3978fec095c2e9b2ddc8cfea8c52625996167f93e8c31655886bdf8592ccdcac2cc957b991f0bc029c470d9b86c0039b18bbda986f86029435ee0e7fb13c50b86c062e722a1510d7d7c5207e07d2e7d4d1cf5b41268b6199df60a4c25978d29bfff9997246756b34e3a7c7b8ec2b34ebe8ea813d695878c2354ae38a6d62c380af3b8a3a69cc391d2b", 0xde, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@private=0xa010101, @in6=@loopback, 0x4e24, 0x0, 0x0, 0x0, 0xa}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa417}, {0x0, 0x0, 0xa}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4002, 0x23}, 0x0, @in=@multicast2, 0x0, 0x3, 0x0, 0xfd}}, 0xe8) process_vm_writev(r8, &(0x7f0000001c80)=[{&(0x7f0000001bc0)=""/156, 0x9c}], 0x1, &(0x7f0000001d80)=[{&(0x7f0000001cc0)=""/116, 0x20001c34}], 0x1, 0x0) r9 = socket(0x10, 0x803, 0x0) getsockname$packet(r9, 0x0, &(0x7f00000001c0)) r10 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) fcntl$setlease(r10, 0x400, 0x0) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r11, 0x0, &(0x7f0000001700)=""/53}, 0x20) r12 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x2c, r12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r13}, 0x18) r14 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r14, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000000)=ANY=[@ANYBLOB="380000000314010000000000000000000900020073797a2f000000000800410072786500140033007465616d5f736c6176655f30"], 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x8844) fsetxattr$trusted_overlay_redirect(r10, &(0x7f0000000040), 0x0, 0x0, 0x0) fremovexattr(r10, &(0x7f00000000c0)=@known='trusted.overlay.metacopy\x00') 5m50.458560313s ago: executing program 1 (id=16889): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000400)=ANY=[@ANYBLOB="020300030f0000002cbd7040fcdbdf2503000900800000001cdc0dca1d9f68846960e56de42944af030006000000000002004e22ac1414bb000000000000000002000100000000000000070c00000080030005000000000002004e22ac14140a00000000000000000200130002"], 0x78}, 0x1, 0x7}, 0x0) 5m49.870509766s ago: executing program 1 (id=16892): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x5, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x80000, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0xffffffffffffff34, &(0x7f0000000080)={0x0, 0xb8}}, 0x0) getsockname$packet(r3, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="34000000100081eee80000040000000010000000", @ANYRES32=r5, @ANYBLOB="ddfffffdff000000140012000c000100627269646765"], 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000140)=@ipv4_newaddr={0x20, 0x14, 0x1, 0x3, 0x0, {0x2, 0x20, 0xa, 0xff, r5}, [@IFA_LOCAL={0x8, 0x2, @local}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x480d0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)=@delchain={0x24, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {}, {0x9}}}, 0x24}}, 0x0) bind$can_j1939(r1, &(0x7f0000000100)={0x1d, r5, 0x2, {0x2, 0x1}, 0xfd}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000f00)='kfree\x00', r0}, 0x18) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x3c, 0x0, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write(r6, &(0x7f0000000440)="18f19098f408303302a3fff74cb933b7f2b837f01f67eb89cb9376a99fea1bcd0586b47974fac0be599de805effd5abd1f08159057d05da54532a8a0a1a7964a39971764b4d442fd824261d11c602746a5b54e901385053e74d62f71b69709f592783cb2cc4986121fd52443cefff788f1666cc8908d9807098d649e09bfc9255b8bc95cc55c4a2bbc02d64bbe4fad39e5df40de948ed814533a9a599b594f185e9b42574fc17b", 0xa7) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r7, &(0x7f0000000340)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7fe, @empty, 0x1}, {0xa, 0x4e20, 0x1ff, @remote, 0x2}, r8, 0xb}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r7, &(0x7f0000000f80)={0x1, 0xe, 0xfa00, {&(0x7f0000000300), r8}}, 0x18) socket$packet(0x11, 0x3, 0x300) 5m48.740870332s ago: executing program 1 (id=16907): bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x7, 0x4, 0x8, 0xd9}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001480)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x2000c16, &(0x7f0000000040)={[{@nobh}, {@usrjquota}]}, 0xff, 0x240, &(0x7f00000002c0)="$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") open(&(0x7f0000000040)='./bus\x00', 0x400141042, 0x0) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x5000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0x7fff}, 0x18) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x44, 0x0, 0x8, 0x801, 0x0, 0x0, {0x3, 0x0, 0xa}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x16}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @sctp=[@CTA_TIMEOUT_SCTP_ESTABLISHED={0x8, 0x4, 0x1, 0x0, 0xf}, @CTA_TIMEOUT_SCTP_SHUTDOWN_SENT={0x8, 0x5, 0x1, 0x0, 0x6}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0xc0f5}, 0x20000040) 5m48.547013933s ago: executing program 1 (id=16910): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, 0x0, 0x0) write(r1, &(0x7f0000000080)="240000001a007f0214f9f407000904080a000000000000050002000008000f40a600000e", 0x24) 5m47.324812889s ago: executing program 1 (id=16922): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x204, 0x2) ioctl$USBDEVFS_SUBMITURB(r2, 0x8038550a, &(0x7f0000000140)=@urb_type_control={0x2, {}, 0x2000000b, 0x80, &(0x7f0000000240)={0x3, 0x0, 0xfffa, 0x4360}, 0x8, 0x6, 0x7d, 0x0, 0x1, 0x101, 0x0}) 5m47.324619629s ago: executing program 42 (id=16922): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x204, 0x2) ioctl$USBDEVFS_SUBMITURB(r2, 0x8038550a, &(0x7f0000000140)=@urb_type_control={0x2, {}, 0x2000000b, 0x80, &(0x7f0000000240)={0x3, 0x0, 0xfffa, 0x4360}, 0x8, 0x6, 0x7d, 0x0, 0x1, 0x101, 0x0}) 5m28.695991927s ago: executing program 7 (id=17177): socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x1000410, &(0x7f0000000100)={[{@grpid}, {@grpquota}]}, 0x4, 0x4eb, &(0x7f0000000540)="$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") prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000ff0f00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x3d) unshare(0x62040200) umount2(&(0x7f0000000280)='./file0\x00', 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000500)=ANY=[], 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r6, @ANYBLOB="010000000000000000000100000005000400010000004ddc053dc102a55a"], 0x1c}}, 0x0) 5m27.803975852s ago: executing program 7 (id=17196): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x58, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffff}]}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}]}, 0x58}}, 0x0) (fail_nth: 4) 5m27.546351103s ago: executing program 7 (id=17199): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r1}, 0x10) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2001000012001307"], 0x120}}, 0x0) (fail_nth: 6) 5m27.222707605s ago: executing program 9 (id=17201): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0b00000008000000010001000900000001"], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x3c, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) socket(0x10, 0x3, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000180)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) syz_clone(0x40042700, 0x0, 0x0, 0x0, 0x0, 0x0) 5m27.176863335s ago: executing program 7 (id=17202): bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x7, 0x4, 0x8, 0xd9}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001480)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x2000c16, &(0x7f0000000040)={[{@nobh}, {@usrjquota}]}, 0xff, 0x240, &(0x7f00000002c0)="$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") open(&(0x7f0000000040)='./bus\x00', 0x400141042, 0x0) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x5000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0x7fff}, 0x18) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x44, 0x0, 0x8, 0x801, 0x0, 0x0, {0x3, 0x0, 0xa}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x16}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @sctp=[@CTA_TIMEOUT_SCTP_ESTABLISHED={0x8, 0x4, 0x1, 0x0, 0xf}, @CTA_TIMEOUT_SCTP_SHUTDOWN_SENT={0x8, 0x5, 0x1, 0x0, 0x6}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0xc0f5}, 0x20000040) 5m27.083098725s ago: executing program 7 (id=17204): mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfffffffb}, 0xc) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), 0x0) sendmsg$nl_generic(r0, 0x0, 0x24004004) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='netfs_rreq_ref\x00'}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000380), &(0x7f00000005c0)=r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000002f40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000a00)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4d, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000980)='mm_page_free\x00', r3}, 0x18) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setxattr$security_capability(0x0, &(0x7f0000000280), 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=ANY=[], &(0x7f00000002c0)=""/203, 0xfffffffffffffe5f) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x40, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r4 = io_uring_setup(0x4d42, &(0x7f0000000240)={0x0, 0xca6a, 0x40, 0x0, 0x3}) mmap(&(0x7f0000000000/0x400000)=nil, 0x1400000, 0x0, 0xc3072, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_RESTRICTIONS(r4, 0xb, &(0x7f0000000380)=[@ioring_restriction_sqe_op={0x1, 0x14}], 0x1) 5m25.170072215s ago: executing program 9 (id=17222): setrlimit(0x9, &(0x7f0000000080)={0x8606, 0xffff}) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x94) syz_read_part_table(0x5c5, &(0x7f0000000800)="$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") r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYRES64], &(0x7f0000000140)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xdab}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYRES32=r5, @ANYRES32=0x0, @ANYBLOB="00000000201100002400128009000100766c616e000000001400028006000100fdff00000600050088a80000"], 0x44}, 0x1, 0x0, 0x0, 0x2000c8d5}, 0x8000002) rmdir(0x0) r7 = socket$packet(0x11, 0x2, 0x300) r8 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f00000004c0)={r9, 0x3, 0x6, @multicast}, 0x10) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000640)={@local, @local, @mcast1, 0x2, 0x2, 0x40, 0x0, 0x9, 0x220205, r9}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='kfree\x00', r3, 0x0, 0x4ab}, 0x18) r10 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r10, 0xc0481273, &(0x7f0000000540)={'\x00', 0x7e, 0x7527, 0x5c8, 0x7fff, 0x9}) ioctl$BLKTRACETEARDOWN(r10, 0x1276, 0x0) r11 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000380)={'vxcan1\x00', 0x0}) dup2(r4, r4) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r10, &(0x7f0000000600)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000540)={&(0x7f00000003c0)={0x58, r11, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x4}, @MPTCP_PM_ATTR_ADDR_REMOTE={0x3c, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r12}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x9}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x5}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x24008080}, 0x4000804) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x10rust\xe3c*sgrVdn:Dd', 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r6, 0x80089419, &(0x7f00000001c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='kmem_cache_free\x00', r1, 0x0, 0x100000000}, 0x18) io_setup(0x8f0, &(0x7f0000002400)) 5m24.922147797s ago: executing program 9 (id=17225): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b7000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1, 0x0, 0x1}, 0x18) syz_emit_ethernet(0x66, &(0x7f0000000b80)={@broadcast, @random="6487a2bed3d6", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x300, 0x0, 0x0, 0x6c, 0x0, @private}, {{}, {}, {}, {0x8, 0x88be, 0x3}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4}}}}}}}}, 0x0) 5m24.848388657s ago: executing program 9 (id=17227): bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x7, 0x4, 0x8, 0xd9}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001480)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x2000c16, &(0x7f0000000040)={[{@nobh}, {@usrjquota}]}, 0xff, 0x240, &(0x7f00000002c0)="$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") open(&(0x7f0000000040)='./bus\x00', 0x400141042, 0x0) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x5000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0x7fff}, 0x18) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x44, 0x0, 0x8, 0x801, 0x0, 0x0, {0x3, 0x0, 0xa}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x16}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @sctp=[@CTA_TIMEOUT_SCTP_ESTABLISHED={0x8, 0x4, 0x1, 0x0, 0xf}, @CTA_TIMEOUT_SCTP_SHUTDOWN_SENT={0x8, 0x5, 0x1, 0x0, 0x6}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0xc0f5}, 0x20000040) 5m24.661128618s ago: executing program 9 (id=17230): mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_genetlink_get_family_id$netlbl_mgmt(0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kmem_cache_free\x00', r0}, 0x18) memfd_secret(0x80000) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="050000c8fbab2ba94013", @ANYRES32=0x1, @ANYRES32=0x0, @ANYBLOB], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740), &(0x7f0000000840), 0x75, r1}, 0x38) r2 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000500)={0xa, 0x4e20, 0xd19, @empty, 0x4}, 0x1c) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r3, 0x0, 0x0) syz_emit_ethernet(0xbe, &(0x7f0000000380)={@multicast, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x4400, 0x0, 0x0, 0x11, 0x0, @remote, @multicast1}, {0x0, 0x4e20, 0x9c, 0x0, @wg=@initiation={0x1, 0x1, "69eb047c187e143bddcbe699ef7a74fd2c1a7c6b59dd637719d6395dda566f42", "6e8ae37dc217c78b70a4dc5eeb6f624200e45176f0c8444ad4b18c65ce5eb8dbb3b30234e8bea411688bf272fdef179d", "ff2a09d662def3d2eb45734d1b7067384ff2442258e9fc1dfc1701ba", {"18b0a3516f6b94835c625da017fdd035", "7fa6bc2b0e933988c64a103320cfe3d2"}}}}}}}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800040000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYRESHEX=r1, @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, 0x94) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000007000000000000000000850000000700000045000000a000020095"], &(0x7f0000000080)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8604, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x8, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000003c0)='kfree\x00', r5}, 0x10) r6 = syz_io_uring_setup(0x5c6, &(0x7f0000000140)={0x0, 0x1, 0x0, 0x4}, &(0x7f00000002c0)=0x0, &(0x7f0000000580)=0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) syz_memcpy_off$IO_URING_METADATA_GENERIC(r7, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) syz_io_uring_submit(r7, r8, &(0x7f0000000400)=@IORING_OP_TIMEOUT={0xb, 0x48, 0x0, 0x0, 0x4, &(0x7f0000000280)={0x0, 0x989680}, 0x1, 0x20, 0x1}) io_uring_enter(r6, 0x6e2, 0x3900, 0x1, 0x0, 0xe00) pause() r9 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r9, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) sendto$inet(r9, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) shutdown(r9, 0x1) 5m24.36476426s ago: executing program 7 (id=17235): sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000001640)=@mangle={'mangle\x00', 0x44, 0x6, 0x510, 0x3a8, 0x210, 0x210, 0x0, 0x138, 0x478, 0x478, 0x478, 0x478, 0x478, 0x6, 0x0, {[{{@ip={@broadcast, @multicast1=0xe0007600, 0x11000000, 0x0, 'geneve1\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'batadv_slave_1\x00', 'veth1_virt_wifi\x00', {}, {}, 0x11}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'vlan1\x00', 'nr0\x00'}, 0x0, 0xb0, 0xd8, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}]}, @unspec=@CHECKSUM={0x28}}, {{@ip={@loopback, @empty, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_team\x00'}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:dbusd_etc_t:s0\x00'}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mac={{0x30}, {@multicast}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x570) connect$inet(r4, &(0x7f0000000300)={0x2, 0x4e23, @multicast1}, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r8 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000580)=@newqdisc={0x54, 0x24, 0xd0f, 0x4703d2d, 0xfffffffd, {0x60, 0x0, 0x0, r10, {0x0, 0xfff2}, {0xfff1, 0xffff}, {0x0, 0xfff3}}, [@qdisc_kind_options=@q_clsact={0xb}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x5, 0x8, 0x5, 0xd, 0x2, 0x3, 0x3}}, {0x4}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x24000040}, 0x44080) bind$packet(r8, &(0x7f0000000340)={0x11, 0x16, r7, 0x1, 0xff, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x27}}, 0x14) bpf$MAP_CREATE(0x0, 0x0, 0x48) sendmsg$nl_route_sched(r5, 0x0, 0x0) 5m24.34838483s ago: executing program 43 (id=17235): sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000001640)=@mangle={'mangle\x00', 0x44, 0x6, 0x510, 0x3a8, 0x210, 0x210, 0x0, 0x138, 0x478, 0x478, 0x478, 0x478, 0x478, 0x6, 0x0, {[{{@ip={@broadcast, @multicast1=0xe0007600, 0x11000000, 0x0, 'geneve1\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'batadv_slave_1\x00', 'veth1_virt_wifi\x00', {}, {}, 0x11}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'vlan1\x00', 'nr0\x00'}, 0x0, 0xb0, 0xd8, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}]}, @unspec=@CHECKSUM={0x28}}, {{@ip={@loopback, @empty, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_team\x00'}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:dbusd_etc_t:s0\x00'}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mac={{0x30}, {@multicast}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x570) connect$inet(r4, &(0x7f0000000300)={0x2, 0x4e23, @multicast1}, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) r5 = socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r8 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000580)=@newqdisc={0x54, 0x24, 0xd0f, 0x4703d2d, 0xfffffffd, {0x60, 0x0, 0x0, r10, {0x0, 0xfff2}, {0xfff1, 0xffff}, {0x0, 0xfff3}}, [@qdisc_kind_options=@q_clsact={0xb}, @TCA_STAB={0x24, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x5, 0x8, 0x5, 0xd, 0x2, 0x3, 0x3}}, {0x4}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x24000040}, 0x44080) bind$packet(r8, &(0x7f0000000340)={0x11, 0x16, r7, 0x1, 0xff, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x27}}, 0x14) bpf$MAP_CREATE(0x0, 0x0, 0x48) sendmsg$nl_route_sched(r5, 0x0, 0x0) 5m23.052527127s ago: executing program 9 (id=17246): mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfffffffb}, 0xc) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), 0x0) sendmsg$nl_generic(r0, 0x0, 0x24004004) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='netfs_rreq_ref\x00'}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000380), &(0x7f00000005c0)=r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000002f40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000a00)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4d, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000980)='mm_page_free\x00', r3}, 0x18) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setxattr$security_capability(0x0, &(0x7f0000000280), 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=ANY=[], &(0x7f00000002c0)=""/203, 0xfffffffffffffe5f) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x40, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r4 = io_uring_setup(0x4d42, &(0x7f0000000240)={0x0, 0xca6a, 0x40, 0x0, 0x3}) mmap(&(0x7f0000000000/0x400000)=nil, 0x1400000, 0x0, 0xc3072, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_RESTRICTIONS(r4, 0xb, &(0x7f0000000380)=[@ioring_restriction_sqe_op={0x1, 0x14}], 0x1) 5m23.043327227s ago: executing program 44 (id=17246): mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0xfffffffb}, 0xc) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), 0x0) sendmsg$nl_generic(r0, 0x0, 0x24004004) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='netfs_rreq_ref\x00'}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000380), &(0x7f00000005c0)=r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000002f40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000a00)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4d, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000980)='mm_page_free\x00', r3}, 0x18) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setxattr$security_capability(0x0, &(0x7f0000000280), 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=ANY=[], &(0x7f00000002c0)=""/203, 0xfffffffffffffe5f) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x40, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r4 = io_uring_setup(0x4d42, &(0x7f0000000240)={0x0, 0xca6a, 0x40, 0x0, 0x3}) mmap(&(0x7f0000000000/0x400000)=nil, 0x1400000, 0x0, 0xc3072, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_RESTRICTIONS(r4, 0xb, &(0x7f0000000380)=[@ioring_restriction_sqe_op={0x1, 0x14}], 0x1) 5m13.889101034s ago: executing program 5 (id=17338): r0 = socket$inet6(0xa, 0x3, 0xff) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x2}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000140)={r1, 0x2}, 0x8) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r2}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x9, 0x4, 0x7ffc0002}]}) alarm(0x2) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000fcb000), 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000001100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x48) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x21081e, &(0x7f00000002c0), 0x1, 0x4f2, &(0x7f0000000600)="$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") r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000010055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, 0x0, 0x800) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = shmget(0x2, 0x4000, 0x78000008, &(0x7f0000ffb000/0x4000)=nil) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/tty/drivers\x00', 0x0, 0x0) ioctl$PPPIOCSMAXCID(r8, 0x40047451, &(0x7f0000000300)=0x9) shmctl$SHM_UNLOCK(r7, 0xc) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a300000001f0900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000008c0)=ANY=[@ANYRESHEX=r9], 0x90}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000000000)=0x80, 0x4) 5m13.472774857s ago: executing program 5 (id=17350): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x47, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x16, 0xf, &(0x7f0000000f80)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0xfca804a0, 0x10, 0x38, &(0x7f00000002c0)="b80a000500000000", &(0x7f0000000300)=""/8, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) sendto$inet6(r5, 0x0, 0x0, 0x20004041, 0x0, 0x0) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, '\x00', 0x54}, 0x7}, 0x1c) getsockopt$IP6T_SO_GET_INFO(r5, 0x29, 0x40, &(0x7f0000000380)={'security\x00', 0x0, [0x0, 0x2, 0xdf83, 0x7, 0x5]}, &(0x7f0000000000)=0x54) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x46}, 0x94) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) r6 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r6, &(0x7f0000000140)={0x1f, 0xffff, 0x2}, 0x6) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='itimer_state\x00', r8}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='itimer_state\x00', r7}, 0x10) r9 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000a00)=@newtfilter={0x54, 0x2c, 0xd2b, 0x70bd2b, 0x25dfdbfb, {0x0, 0x0, 0x0, r10, {0x3}, {}, {0x7, 0xfff3}}, [@filter_kind_options=@f_u32={{0x8}, {0x28, 0x2, [@TCA_U32_SEL={0x24, 0x5, {0xd, 0x7, 0x1, 0x3d3f, 0x0, 0xfff, 0x3, 0x58f, [{0x0, 0x20008000, 0x4, 0x1}]}}]}}]}, 0x54}}, 0x24040084) connect$can_bcm(0xffffffffffffffff, &(0x7f00000004c0)={0x1d, r10}, 0x10) setitimer(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='vm_unmapped_area\x00', r3}, 0x10) syz_io_uring_setup(0x42ca, &(0x7f0000000300)={0x0, 0x125a, 0x400, 0x0, 0x16f}, &(0x7f0000000040), &(0x7f00000002c0)) 5m11.912899305s ago: executing program 5 (id=17364): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) r2 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, 0x0) 5m11.878212065s ago: executing program 5 (id=17365): bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x7, 0x4, 0x8, 0xd9}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001480)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x2000c16, &(0x7f0000000040)={[{@nobh}, {@usrjquota}]}, 0xff, 0x240, &(0x7f00000002c0)="$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") open(&(0x7f0000000040)='./bus\x00', 0x400141042, 0x0) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x5000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0x7fff}, 0x18) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x44, 0x0, 0x8, 0x801, 0x0, 0x0, {0x3, 0x0, 0xa}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x16}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @sctp=[@CTA_TIMEOUT_SCTP_ESTABLISHED={0x8, 0x4, 0x1, 0x0, 0xf}, @CTA_TIMEOUT_SCTP_SHUTDOWN_SENT={0x8, 0x5, 0x1, 0x0, 0x6}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0xc0f5}, 0x20000040) 5m11.425904578s ago: executing program 5 (id=17370): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b7000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1, 0x0, 0x1}, 0x18) syz_emit_ethernet(0x66, &(0x7f0000000b80)={@broadcast, @random="6487a2bed3d6", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x300, 0x0, 0x0, 0x6c, 0x0, @private}, {{}, {}, {}, {0x8, 0x88be, 0x3}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4}}}}}}}}, 0x0) 5m8.96082407s ago: executing program 5 (id=17398): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) pipe2(&(0x7f0000000080), 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x30, 0x7, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0xc82}]}, 0x30}, 0x1, 0x0, 0x0, 0x8081}, 0x8000) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000400)={0x0, 0x7fffffffffffffff, 0x1, [0x0, 0x1, 0x4, 0x5, 0x8], [0x5a4, 0x10, 0xfff, 0xffffffffffffffff, 0x2, 0x9, 0x7, 0x6, 0xa9, 0xfffffffffffffffd, 0xf8, 0x3, 0x1, 0x3, 0xd, 0x8, 0x8a, 0x9, 0x81, 0x0, 0xb2e, 0xb, 0x3, 0x7, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x9, 0x3, 0x7, 0x0, 0x200, 0x76a5, 0x7, 0x7, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x2, 0xa, 0x2, 0x8000000000000001, 0xfffffffffffffffa, 0x5, 0xa, 0x7fffffff, 0xa8, 0x4, 0x532, 0x81, 0x0, 0x4, 0x1ff, 0x1, 0x100, 0x2, 0x7fff, 0x101, 0x1, 0x100, 0x9, 0x1a1c5c56, 0x3, 0x2, 0x5, 0x3, 0x2, 0x2448c451, 0xf8, 0xfffffffffffffc01, 0x9, 0x80, 0x9, 0x9, 0x3, 0x1, 0x4, 0x4, 0x0, 0x9, 0x0, 0x2, 0x8000, 0x1, 0xffff, 0x6, 0xfffffffffffffff8, 0x5, 0x5, 0x6, 0x81, 0x87, 0x4, 0x3, 0x5, 0x1, 0xff, 0x1, 0x8, 0x5, 0x9, 0x53, 0x261, 0x10000, 0x2, 0x0, 0x2800000000000, 0x100000000, 0x3b5bb496, 0x9, 0x5, 0x9, 0x10001, 0x8, 0x0, 0x6, 0x80000000, 0x1c, 0x4]}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000300000a70000000060a010400000000000000000200000044000480400001800e000100627974656f726465720000002c0002800800014000000009080002400000000008000440000000e8080003400000000008000540000000080900010073797a30000000000900020073797a32"], 0x98}}, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000840)={0x0, 0x80, 0x9}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000c40)={0x0, 0x1, 0x1, 0x1}) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000001040)={0x18, 0x1, {0xfff, @struct={0xbcf, 0x5}, r1, 0x6, 0x5e4, 0x10, 0x8, 0x1, 0x44, @usage=0x5, 0x6, 0x4, [0x4, 0x10, 0x8e7, 0x3, 0x7fff, 0x8]}, {0x7, @usage=0x10, r3, 0x7, 0xffffffffffffffff, 0x101, 0x2, 0x10000, 0x2, @struct={0x0, 0x2}, 0x7, 0xa9, [0x8, 0x6e, 0x4, 0x5, 0x1, 0x100000001]}, {0x51, @struct={0x100, 0x200}, r4, 0x4, 0x8, 0x7, 0x9, 0x8000000000000000, 0x54, @usage=0x822a, 0x81, 0x9903, [0x8a, 0x2, 0x0, 0xfffffffffffffffd, 0x2, 0x5]}, {0x7fff, 0x6, 0x5}}) 5m8.96059583s ago: executing program 45 (id=17398): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) pipe2(&(0x7f0000000080), 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x30, 0x7, 0x6, 0x3, 0x0, 0x0, {0x7, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0xc82}]}, 0x30}, 0x1, 0x0, 0x0, 0x8081}, 0x8000) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000400)={0x0, 0x7fffffffffffffff, 0x1, [0x0, 0x1, 0x4, 0x5, 0x8], [0x5a4, 0x10, 0xfff, 0xffffffffffffffff, 0x2, 0x9, 0x7, 0x6, 0xa9, 0xfffffffffffffffd, 0xf8, 0x3, 0x1, 0x3, 0xd, 0x8, 0x8a, 0x9, 0x81, 0x0, 0xb2e, 0xb, 0x3, 0x7, 0x7, 0x2, 0x0, 0xffffffffffffffff, 0x9, 0x3, 0x7, 0x0, 0x200, 0x76a5, 0x7, 0x7, 0x2, 0x0, 0x0, 0xfffffffffffffffc, 0x2, 0xa, 0x2, 0x8000000000000001, 0xfffffffffffffffa, 0x5, 0xa, 0x7fffffff, 0xa8, 0x4, 0x532, 0x81, 0x0, 0x4, 0x1ff, 0x1, 0x100, 0x2, 0x7fff, 0x101, 0x1, 0x100, 0x9, 0x1a1c5c56, 0x3, 0x2, 0x5, 0x3, 0x2, 0x2448c451, 0xf8, 0xfffffffffffffc01, 0x9, 0x80, 0x9, 0x9, 0x3, 0x1, 0x4, 0x4, 0x0, 0x9, 0x0, 0x2, 0x8000, 0x1, 0xffff, 0x6, 0xfffffffffffffff8, 0x5, 0x5, 0x6, 0x81, 0x87, 0x4, 0x3, 0x5, 0x1, 0xff, 0x1, 0x8, 0x5, 0x9, 0x53, 0x261, 0x10000, 0x2, 0x0, 0x2800000000000, 0x100000000, 0x3b5bb496, 0x9, 0x5, 0x9, 0x10001, 0x8, 0x0, 0x6, 0x80000000, 0x1c, 0x4]}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000300000a70000000060a010400000000000000000200000044000480400001800e000100627974656f726465720000002c0002800800014000000009080002400000000008000440000000e8080003400000000008000540000000080900010073797a30000000000900020073797a32"], 0x98}}, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000840)={0x0, 0x80, 0x9}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000c40)={0x0, 0x1, 0x1, 0x1}) ioctl$BTRFS_IOC_BALANCE_V2(r0, 0xc4009420, &(0x7f0000001040)={0x18, 0x1, {0xfff, @struct={0xbcf, 0x5}, r1, 0x6, 0x5e4, 0x10, 0x8, 0x1, 0x44, @usage=0x5, 0x6, 0x4, [0x4, 0x10, 0x8e7, 0x3, 0x7fff, 0x8]}, {0x7, @usage=0x10, r3, 0x7, 0xffffffffffffffff, 0x101, 0x2, 0x10000, 0x2, @struct={0x0, 0x2}, 0x7, 0xa9, [0x8, 0x6e, 0x4, 0x5, 0x1, 0x100000001]}, {0x51, @struct={0x100, 0x200}, r4, 0x4, 0x8, 0x7, 0x9, 0x8000000000000000, 0x54, @usage=0x822a, 0x81, 0x9903, [0x8a, 0x2, 0x0, 0xfffffffffffffffd, 0x2, 0x5]}, {0x7fff, 0x6, 0x5}}) 5m8.120994085s ago: executing program 6 (id=17408): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b7000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1, 0x0, 0x1}, 0x18) syz_emit_ethernet(0x66, &(0x7f0000000b80)={@broadcast, @random="6487a2bed3d6", @void, {@ipv4={0x800, @gre={{0x5, 0x4, 0x0, 0x0, 0x58, 0x300, 0x0, 0x0, 0x6c, 0x0, @private}, {{}, {}, {}, {0x8, 0x88be, 0x3}, {0x8, 0x22eb, 0x0, {{0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4}}}}}}}}, 0x0) 5m7.888169036s ago: executing program 6 (id=17409): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001480)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9ee6, 0x200000005}, 0x104022, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000001540)=ANY=[@ANYRES32=0x0, @ANYBLOB="fb75d80e668c20ddb4b98f364f5252211189242e85b7418436ecd6d9b958c3e49c249f9818498629e47845e14f73fc9703530b1751295e289a3ff1d4d74f2cb4c425ac13f85d1d20cd48fddf638d4310933fff234945986a322bfbc9ed54f776d193b736de5d09cec073513e3e995c9a62bb76f43bfb94224f1ffda313b9a0ad4c942112c7d6cd84c490d5ccde352a", @ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001340)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="00000000fdff294865cb0ea698000084e55c5cebbd75c3c517515d9982644e7947d445793bc8f6e4b6d5eebad9d28e807e2903f6823519a0ec2df05b09845eb60c72520e06d10a4f9758d6704f95191801bf393cb077746cf5360a578959f90bf38c68d0f76b13d7db1b7f120a8960caacadf5ee3be82f8fef4c138adf3ee3077a2fde531618bfbde9591e31acb80ce65531b9d428be8724e705b1a92f86f0177b81a447c7f191d3b2ed8fc07a5110d921366709be59dc494dfb96337dab1dda6eb2f238cafce5ab87a268749472c1cbc7e9cc14fdf0695f91e274a7e6aad9127d10b003425eabee0550ce7e10", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES64=0x0], 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) preadv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000200)=""/4111, 0x100f}], 0x1, 0x144, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x5, 0x248}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r6 = socket$inet_smc(0x2b, 0x1, 0x0) bind(r6, &(0x7f00000012c0)=@nfc_llcp={0x27, 0x0, 0xffffffffffffffff, 0x2, 0x43, 0x35, "72b4d6d9c29fd34c10b72c8da3b3cad374535fb9cbcf4e90ad23ec63918baca02c4c0950c11ba2d781382e348bd58c777eead2702e169619bc874757d59ace", 0x31}, 0x80) r7 = getpid() sched_setscheduler(r7, 0x2, &(0x7f0000000040)=0x1c) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r8, &(0x7f000057eff8)=@abs, 0x6e) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000001240)) sendmmsg$unix(r9, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r8, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000001280)=ANY=[@ANYRES32, @ANYRESOCT, @ANYRESOCT=r8], 0x0, 0x4}, 0x94) syz_clone(0x41aa1000, 0x0, 0x0, 0x0, 0x0, 0x0) 5m6.034496736s ago: executing program 6 (id=17424): r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x42, 0x0) write$P9_RREADLINK(r0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8943, &(0x7f0000000100)={'macvtap0\x00', @random="b40007350060"}) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0, 0x9}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="18010000008000000000000000000004850000006d00000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000380)='kfree\x00', r4}, 0x18) creat(&(0x7f00000002c0)='./file0\x00', 0x0) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r5, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) io_uring_setup(0x9, &(0x7f0000000040)={0x0, 0x20c8a1, 0x1c881, 0x8, 0xd1}) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x83, 0x2, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x148, 0x4, 0x0, 0x9, 0xfffffffffffffff9, 0xd, 0xfffe}, 0x0, 0xffffffffffffffff, r2, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@allocspi={0x108, 0x16, 0x1, 0x0, 0x0, {{{@in6=@loopback, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {@in=@dev, 0x0, 0x6c}, @in=@private=0xa010102, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}, 0x0, 0x7fff}, [@proto={0x5, 0x1b}, @etimer_thresh={0x8, 0xc, 0xb991}]}, 0x108}}, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000040)=@known='system.posix_acl_default\x00') madvise(&(0x7f00006f5000/0x2000)=nil, 0x2000, 0xa) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = socket(0x400000000010, 0x3, 0x0) r8 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) sendmsg$nl_route_sched(r7, &(0x7f00000012c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(r7, 0x0, 0x20000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x18) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x3000010, &(0x7f0000000340)={[{@errors_remount}, {@nodioread_nolock}]}, 0x1, 0x512, &(0x7f00000008c0)="$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") listxattr(0x0, 0x0, 0x0) 5m5.548267669s ago: executing program 6 (id=17427): bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x7, 0x4, 0x8, 0xd9}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3000000"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001480)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x2000c16, &(0x7f0000000040)={[{@nobh}, {@usrjquota}]}, 0xff, 0x240, &(0x7f00000002c0)="$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") open(&(0x7f0000000040)='./bus\x00', 0x400141042, 0x0) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x5000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0x7fff}, 0x18) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x44, 0x0, 0x8, 0x801, 0x0, 0x0, {0x3, 0x0, 0xa}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x16}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @sctp=[@CTA_TIMEOUT_SCTP_ESTABLISHED={0x8, 0x4, 0x1, 0x0, 0xf}, @CTA_TIMEOUT_SCTP_SHUTDOWN_SENT={0x8, 0x5, 0x1, 0x0, 0x6}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0xc0f5}, 0x20000040) 5m5.378497519s ago: executing program 6 (id=17429): r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000380)=0x20000, 0x4) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/5, 0x204000, 0x1000}, 0x20) r1 = socket$phonet(0x23, 0x2, 0x1) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000180)=0x20, 0x4) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000040)=0x4000, 0x4) bind$xdp(r0, &(0x7f00000002c0)={0x2c, 0x4, r2, 0x30, r0}, 0x10) r3 = perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x80, 0x1, 0x6, 0xb, 0x42, 0x0, 0xfffffffffffffffd, 0x100, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x10, 0xb00000000000000}, 0x400, 0xffffffff, 0x1, 0x2, 0x7fff, 0xff, 0x8, 0x0, 0x196f, 0x0, 0xa00000000000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000140)='lo\x00') 5m3.756772788s ago: executing program 6 (id=17438): bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x7, 0x4, 0x8, 0xd9}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3000000"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001480)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x2000c16, &(0x7f0000000040)={[{@nobh}, {@usrjquota}]}, 0xff, 0x240, &(0x7f00000002c0)="$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") open(&(0x7f0000000040)='./bus\x00', 0x400141042, 0x0) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x5000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0x7fff}, 0x18) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x44, 0x0, 0x8, 0x801, 0x0, 0x0, {0x3, 0x0, 0xa}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x16}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @sctp=[@CTA_TIMEOUT_SCTP_ESTABLISHED={0x8, 0x4, 0x1, 0x0, 0xf}, @CTA_TIMEOUT_SCTP_SHUTDOWN_SENT={0x8, 0x5, 0x1, 0x0, 0x6}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0xc0f5}, 0x20000040) 5m3.756111318s ago: executing program 46 (id=17438): bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x7, 0x4, 0x8, 0xd9}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3000000"], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001480)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x2000c16, &(0x7f0000000040)={[{@nobh}, {@usrjquota}]}, 0xff, 0x240, &(0x7f00000002c0)="$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") open(&(0x7f0000000040)='./bus\x00', 0x400141042, 0x0) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x5000, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0x7fff}, 0x18) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)={0x44, 0x0, 0x8, 0x801, 0x0, 0x0, {0x3, 0x0, 0xa}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x16}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}, @CTA_TIMEOUT_DATA={0x14, 0x4, 0x0, 0x1, @sctp=[@CTA_TIMEOUT_SCTP_ESTABLISHED={0x8, 0x4, 0x1, 0x0, 0xf}, @CTA_TIMEOUT_SCTP_SHUTDOWN_SENT={0x8, 0x5, 0x1, 0x0, 0x6}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x44}, 0x1, 0x0, 0x0, 0xc0f5}, 0x20000040) 3.248845233s ago: executing program 8 (id=23180): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x18) r4 = io_uring_setup(0x6c0e, &(0x7f0000000440)={0x0, 0xe8bd, 0x400, 0x0, 0x197, 0x0, r3}) r5 = syz_io_uring_setup(0x4b4, &(0x7f0000010400)={0x0, 0x86e2, 0x1, 0x408, 0xa0, 0x0, r4}, &(0x7f0000010080), &(0x7f00000004c0)) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r5, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000640)=""/135, 0x87}, {0x0}], 0x2) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r5, 0x10, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000340), 0xa002a0}], &(0x7f00000005c0), 0x2}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400000bb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f00000005c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x4c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8604, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x0, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r6, 0xa02000000000000, 0x60, &(0x7f0000000000)={'filter\x00', 0xb001, 0x4, 0x3e8, 0x0, 0x0, 0x130, 0x300, 0x300, 0x300, 0x7fffffe, 0x0, {[{{@arp={@local, @empty, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'pimreg\x00', 'veth0_to_bridge\x00', {}, {}, 0x0, 0x3001}, 0xc0, 0x130}, @unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "f67b23ffdfa27f907a03732da3acbc6518e62a77ca06f258762e88c0d9f9d2f413b94a105f4bdf01425ce81c5d000000000000000500ffffffff00"}}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_to_team\x00', 'ip6tnl0\x00'}, 0xc0, 0xe8}, @unspec=@CLASSIFY={0x28}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE3={0x28}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) 3.212115003s ago: executing program 8 (id=23182): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000740)='scsi_dispatch_cmd_start\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000740)='scsi_dispatch_cmd_start\x00', r1}, 0x10) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) 3.181596093s ago: executing program 8 (id=23185): ftruncate(0xffffffffffffffff, 0x200002) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x8000d0, &(0x7f0000000100)={[{@bsdgroups}]}, 0x1, 0x58d, &(0x7f0000000bc0)="$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") fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xa0000, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x20, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x18) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000001f40)=ANY=[@ANYBLOB="000000004c900200290000000300010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000020000000000000ffffffffffd9ffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff"]) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2, 0x0, 0xffffffffffffffff}, 0x13) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) dup(r3) open_tree(0xffffffffffffff9c, &(0x7f0000001700)='./file0\x00', 0x89901) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r4 = getpid() sched_setscheduler(r4, 0x1, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r6, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x11, 0xc, &(0x7f0000000140)=ANY=[@ANYRESOCT=0x0], 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x44004) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000300)='rcu_utilization\x00'}, 0x10) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x2014800, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) socket$inet6_sctp(0xa, 0x1, 0x84) 2.295964778s ago: executing program 8 (id=23200): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) r2 = openat$sysfs(0xffffff9c, &(0x7f00000037c0)='/sys/kernel/notes', 0x0, 0x0) r3 = syz_io_uring_setup(0xbdc, &(0x7f0000000080)={0x0, 0xec21, 0x80, 0x1, 0x40000333}, 0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(0x0, r4, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r2, 0x0, &(0x7f0000000600)=[{&(0x7f0000001800)=""/201, 0xc9}], 0x1, 0x0, 0x1}) io_uring_enter(r3, 0x847ba, 0x2000, 0xe, 0x0, 0x0) 2.255657778s ago: executing program 8 (id=23202): r0 = socket$inet_udp(0x2, 0x2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kmem_cache_free\x00', r2, 0x0, 0x81}, 0x18) syslog(0x9, 0x0, 0x0) r3 = socket$igmp(0x2, 0x3, 0x2) io_uring_setup(0x7155, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000640)=ANY=[@ANYBLOB="2800dc1300006b62ae118c80646800010028bd7000fbdb0000000002000004000b000800010000000000"], 0x28}}, 0x0) setsockopt$MRT_FLUSH(r3, 0x0, 0xd0, &(0x7f0000000080)=0x6, 0x4) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f0000000540)={0x0, 0x5162}, &(0x7f0000000580)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f00000005c0)={r6, 0x800, 0x20}, 0xc) ioctl$SIOCGSTAMPNS(r5, 0x8907, &(0x7f0000000500)) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x44, 0x6, 0x438, 0x240, 0xe8, 0x300, 0x180, 0xe8, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x3a0, 0x6, 0x0, {[{{@ip={@dev={0xac, 0x14, 0x14, 0x1e}, @remote, 0xffffff00, 0x0, 'pim6reg0\x00', 'geneve1\x00', {}, {0xff}, 0x8, 0x2}, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x6}}, @inet=@rpfilter={{0x28}, {0x8}}]}, @common=@unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00', 0x0, {0x7ff}}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0xfc}}}, {{@uncond, 0x0, 0x98, 0xc0, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x4}}]}, @ECN={0x28}}, {{@ip={@rand_addr, @dev, 0x0, 0x0, 'syzkaller0\x00', 'macvlan1\x00', {}, {}, 0x0, 0x1}, 0x0, 0x98, 0xc0, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x4}}]}, @unspec=@CHECKSUM={0x28}}, {{@ip={@multicast1, @broadcast, 0xffffff00, 0x0, 'batadv_slave_0\x00', 'gretap0\x00', {}, {}, 0x11, 0x0, 0x30}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x4, 0x3, @local, 0x4e24}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x498) syz_emit_ethernet(0x76, &(0x7f0000000780)={@local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "000300", 0x40, 0x3a, 0x0, @private0, @mcast2, {[], @param_prob={0x4, 0x1, 0x0, 0x0, {0x0, 0x6, "4aa198", 0x0, 0x3c, 0x0, @dev={0xfe, 0x80, '\x00', 0x3e}, @ipv4={'\x00', '\xff\xff', @local}, [@srh={0x2c, 0x0, 0x4, 0x0, 0x4}, @hopopts={0x3c}]}}}}}}}, 0x0) r7 = syz_io_uring_setup(0x2649, &(0x7f00000003c0)={0x0, 0xe678, 0x8, 0xfffffffe, 0x35}, &(0x7f0000000080), &(0x7f0000000440)) io_uring_register$IORING_REGISTER_PBUF_RING(r7, 0x16, &(0x7f0000000900)={0x0, 0x0, 0x3}, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000700000000000000000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x0, 0x0, 0x41100}, 0x94) r8 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000b80)=[{0x6}]}, 0x10) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x80, 0x0) ioctl$TIOCSETD(r9, 0x5423, &(0x7f0000000080)=0xf) ioctl$TCFLSH(r9, 0x400455c8, 0x0) bind$bt_hci(r8, &(0x7f0000000140)={0x1f, 0xffff, 0x2}, 0x6) 1.964800719s ago: executing program 4 (id=23210): syz_io_uring_setup(0x3798, &(0x7f0000000400)={0x0, 0xc458, 0x80, 0x100003, 0xb8}, &(0x7f0000000500)=0x0, &(0x7f0000000a40)=0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[@ANYBLOB="8000000000010104110000000000000002000000240001801400018008000100e000000108000200e00000010c000280050001"], 0x80}}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="d400000000010104000000000000000002000000240001801400018008000100e000000108000200ac1414400c0002800500010000000000240002801400018008000100e000000108000200e00000010c0002800500010000000000080007400000000070000d801400080000000000000000000000000000000000080001007f0000012c00"], 0xd4}}, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') getdents64(r4, 0x0, 0x607a9e0a432a4785) munlockall() madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x8) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps_rollup\x00') pread64(r5, &(0x7f0000000080)=""/196, 0xc4, 0x3) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000002b40), 0xffffffffffffffff) sendmsg$FOU_CMD_ADD(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002bc0)={&(0x7f0000002b80)={0x2c, r6, 0x1, 0x0, 0x25dfdbf7, {}, [@FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}]}, 0x2c}}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r0, 0x4, &(0x7f0000000000)=0xff8, 0x0, 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40008, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0x6}, 0x0, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_io_uring_submit(r0, r1, &(0x7f0000000b00)=@IORING_OP_UNLINKAT={0x24, 0x58, 0x0, r4, 0x0, 0x0}) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r7, 0x4b72, &(0x7f0000000000)={0x0, 0x1, 0x8, 0x13, 0x200, &(0x7f0000000d80)="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"}) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000080b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r9}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, 0x0, 0x0, 0x4}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/cgroup.procs\x00', 0x80042, 0x20262076a4e6d5e) write$binfmt_format(r10, 0x0, 0x0) 1.87265945s ago: executing program 4 (id=23211): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) r2 = openat$sysfs(0xffffff9c, &(0x7f00000037c0)='/sys/kernel/notes', 0x0, 0x0) r3 = syz_io_uring_setup(0xbdc, &(0x7f0000000080)={0x0, 0xec21, 0x80, 0x1, 0x40000333}, 0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(0x0, r4, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r2, 0x0, &(0x7f0000000600)=[{&(0x7f0000001800)=""/201, 0xc9}], 0x1, 0x0, 0x1}) io_uring_enter(r3, 0x847ba, 0x2000, 0xe, 0x0, 0x0) 1.84121891s ago: executing program 4 (id=23212): perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x1, 0x81, 0x7, 0x0, 0x0, 0x4, 0x40002, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x2, @perf_bp={0x0, 0x1}, 0xc88c, 0x40, 0x0, 0x1, 0x200008, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x2000000020000006}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0xa) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x6, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sync() openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/timers\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x340) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000400)={[{@nolazytime}]}, 0x2, 0x522, &(0x7f00000006c0)="$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") r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r2, &(0x7f00000000c0)=ANY=[], 0xff2e) madvise(&(0x7f0000cf6000/0x4000)=nil, 0x4000, 0x16) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x49, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000066f500000091c86cf64a5306e8ccee00", @ANYRES32=r3, @ANYRES16], 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='itimer_state\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='itimer_state\x00', r5}, 0x10) setitimer(0x0, 0x0, 0x0) ioctl$PAGEMAP_SCAN(0xffffffffffffffff, 0xc0606610, &(0x7f0000000140)={0x60, 0x0, &(0x7f0000001000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, 0x0, &(0x7f00000000c0)=[{0x800000000}, {0x0, 0x0, 0x4}], 0x2, 0x100000c01, 0x38, 0x0, 0x42, 0x6e}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000540)=ANY=[@ANYBLOB="f000000010000d0400000000000000", @ANYRES16=r4, @ANYBLOB="0008000000020000bc0012800c0001006d6163766c616e00ac000280080006000100000008000100100000000a0004000180c200000300000a00040000000000030000000800070005000000080007000a0000004c0005800a000400aaaaaaaaaabb00000a000400aaaaaaaaaabb00000a0004"], 0xf0}, 0x1, 0x0, 0x0, 0x20000015}, 0x0) 944.875295ms ago: executing program 4 (id=23220): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000850000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000), 0x101000, 0x800, 0x3, 0x1}, 0x20) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f00000003c0)=0x800, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'veth1_to_batadv\x00', 0x0}) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000180)=0x20, 0x4) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f0000000140)=0x4000, 0x4) bind$xdp(r1, &(0x7f00000001c0)={0x2c, 0x8, r3}, 0x10) r4 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r4, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000), 0x101000, 0x800, 0x3, 0x1}, 0x20) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) sendmsg$NFT_BATCH(r5, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x2}}, [@NFT_MSG_NEWRULE={0x9c, 0x6, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x1}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_EXPRESSIONS={0x70, 0x4, 0x0, 0x1, [{0x58, 0x1, 0x0, 0x1, @target={{0xb}, @val={0x48, 0x2, 0x0, 0x1, [@NFTA_TARGET_INFO={0x2c, 0x3, "9ac420000461afb9fdd672bad09dfb78c7699c74e891a0c700"/40}, @NFTA_TARGET_REV={0x8}, @NFTA_TARGET_NAME={0xe, 0x1, 'IDLETIMER\x00'}]}}}, {0x14, 0x1, 0x0, 0x1, @socket={{0xb}, @val={0x4}}}]}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0xc4}, 0x1, 0x0, 0x0, 0x4000850}, 0x20040040) 910.822775ms ago: executing program 4 (id=23223): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000027c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x2d, 0x20040040) writev(r1, &(0x7f0000000100)=[{&(0x7f0000000500)="87", 0x1}], 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) 567.554747ms ago: executing program 2 (id=23227): r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYRESHEX=r0], 0x60}, 0x1, 0x0, 0x0, 0x408c0}, 0x10000000) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0], 0x78) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0xa, 0x300) socket$packet(0x11, 0xa, 0x300) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x2, 0x0, 0x0, 0x40f00, 0x20}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0xb68, 0x560b0000, &(0x7f0000000000)="219a53f271a76d2608004c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r2 = bpf$MAP_CREATE(0x0, 0xfffffffffffffffc, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000027b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), 0xffffffffffffffff) unshare(0x22020400) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0x8, 0x0}, 0x8) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000030100850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x2000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r6}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='qi_submit\x00'}, 0x18) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="240000001900010000000000000000001c140000fefc03"], 0x24}, 0x1, 0x0, 0x0, 0x40010}, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) r8 = fsopen(&(0x7f0000000040)='cgroup2\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000001801000020756c2508000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d1b000095000000000000000000000000c92804b216e60034d1e1c8c0009338b03fad"], 0x0, 0x0, 0x0, 0x0, 0xc2c0e956b10527fa, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000580)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) fsconfig$FSCONFIG_CMD_CREATE(r8, 0x6, 0x0, 0x0, 0x0) 394.543728ms ago: executing program 0 (id=23228): bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000d00)={0x0, 0x0}, 0x8) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=r2, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r3, 0x0, 0x0}, 0x10) 392.879198ms ago: executing program 2 (id=23229): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000740)='scsi_dispatch_cmd_start\x00', r0}, 0x10) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) 365.938298ms ago: executing program 0 (id=23231): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) r2 = openat$sysfs(0xffffff9c, &(0x7f00000037c0)='/sys/kernel/notes', 0x0, 0x0) r3 = syz_io_uring_setup(0xbdc, &(0x7f0000000080)={0x0, 0xec21, 0x80, 0x1, 0x40000333}, &(0x7f0000000340)=0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r4, 0x0, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r2, 0x0, &(0x7f0000000600)=[{&(0x7f0000001800)=""/201, 0xc9}], 0x1, 0x0, 0x1}) io_uring_enter(r3, 0x847ba, 0x2000, 0xe, 0x0, 0x0) 365.060668ms ago: executing program 2 (id=23232): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYRESDEC], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRESDEC=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8e6f2a218ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='kfree\x00', r1, 0x0, 0x115}, 0x18) fallocate(r2, 0x3, 0x9100, 0x3) mremap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3000, 0x3, &(0x7f0000ff5000/0x3000)=nil) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) (async) r3 = syz_pidfd_open(0x0, 0x0) r4 = dup(r3) (async) socketpair(0x2c, 0x800, 0x0, 0x0) (async) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) (async) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) dup(r6) (async) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000000240), 0x0) (async) r7 = dup(r6) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r7, 0x84, 0x84, &(0x7f0000000580)={0x0, @in6={{0xa, 0x4e20, 0x0, @loopback, 0x4}}, 0x651, 0xd}, 0x90) (async) sendmmsg$inet(r6, &(0x7f0000001780)=[{{&(0x7f0000000140)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x3e}}, 0x10, &(0x7f0000000200)=[{&(0x7f00000001c0)='\v', 0x1}], 0x1}}], 0x1, 0x4844) (async) bind$inet(r5, &(0x7f0000000400)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$sock_int(r5, 0x1, 0x29, &(0x7f0000000100)=0xac05, 0x4) sendto$inet(r5, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x4e27, @rand_addr=0x64010101}, 0x10) (async) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x41, &(0x7f0000000040)=0x1dba, 0x4) (async) r8 = openat$selinux_policy(0xffffff9c, 0x0, 0x0, 0x0) (async) sendto$inet(r5, &(0x7f0000000540)='v', 0x1, 0x4040, 0x0, 0x0) recvmmsg(r4, &(0x7f0000000a00)=[{{0x0, 0x0, 0x0}, 0x1e0d}], 0x1, 0x120a0, 0x0) (async) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r9, 0x0, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYRES8=r5], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x6, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_bp={0x0, 0x6}, 0x8000, 0x0, 0x43a1bd76, 0x7, 0x400009, 0x6, 0x4002, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket(0x10, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 325.367818ms ago: executing program 0 (id=23233): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000740)='scsi_dispatch_cmd_start\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000740)='scsi_dispatch_cmd_start\x00', r1}, 0x10) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) 325.125298ms ago: executing program 2 (id=23234): mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x200, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3af, 0x4}, 0x100000, 0x0, 0x0, 0x3, 0x2, 0x802, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r0 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$selinux_validatetrans(r0, &(0x7f0000000240)={'system_u:object_r:src_t:s0', 0x20, 'system_u:object_r:system_map_t:s0', 0x20, 0x401, 0x20, '/usr/lib/telepathy/mission-control-5\x00'}, 0x77) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) mbind(&(0x7f00005b4000/0x4000)=nil, 0x100000000004000, 0x0, 0x0, 0x0, 0x2) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x300000c, 0x51031, 0xffffffffffffffff, 0x0) 324.697828ms ago: executing program 3 (id=23235): bpf$PROG_LOAD(0x5, 0x0, 0x0) setreuid(0xffffffffffffffff, 0xee01) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x100) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg(r1, &(0x7f0000001300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=[{0x10, 0x88, 0xc1}, {0x10, 0x84, 0x200}], 0x20}}], 0x1, 0x20000081) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000280)={'syztnl1\x00', &(0x7f0000000340)={'ip6gre0\x00', 0x0, 0x29, 0xf0, 0x3, 0xd, 0x66, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, 0x8000, 0x7827, 0xb}}) r3 = syz_open_dev$loop(&(0x7f0000000100), 0xf01c, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.stat\x00', 0x275a, 0x0) ioctl$LOOP_CONFIGURE(r3, 0x4c0a, &(0x7f00000002c0)={r4, 0x0, {0x2a00, 0x80010000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1c, "fee8a2ab78fc5e3ed1e00d96072000001ea89de2b7fb0000e60080b8785d96000100", "2809e8dbe108598948224ad54afac11d875397bdb22d0000b420a1a93c5240f45f819e01177d3d458dd4992861ac00", "90be8b1c551265406c7f306003d8a0f4bd00"}}) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000002500)={0x0, 0x0, 0x0, 0x5, 0x1, 0x0, 0x0, 0x20, 0x4, "6bec25058e637b44e58c1c72a4c01c47e50a2793c042d4aea4dcf9c014d0e072a3f096bdbd0b1dc56f7a305e6e539a0f68412e32c7881104f7a2a88bb4a033af", "563e7e5b61a321b296a4d858a1a07e3c87df2f85a1df2c909cda49a11ff76e906b13a0c26ef2f2b18d4dcaffbc3200f99d6f328ccecaf9ec49aa55fba663c523", "6dd072b5e9aa72a58f2d1e56225ed54c50d0fc588f0800", [0xa2, 0x3562]}) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), r0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x6, 0x1f, 0x0, &(0x7f0000000200)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41000, 0x0, '\x00', r2, 0x25, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f00000003c0)={0x3, 0x7, 0x3, 0x2}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x101}, 0x94) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x6a1c2, 0x50) faccessat(r0, &(0x7f0000000000)='./file0\x00', 0x5) 306.521638ms ago: executing program 0 (id=23236): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet6_int(r0, 0x29, 0x46, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000040)="c6", 0x1, 0x2000c851, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback, 0xffffffff}, 0x1c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000140), 0x4) bpf$ITER_CREATE(0x21, &(0x7f0000000200)={r3}, 0x8) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r1, &(0x7f0000000080), &(0x7f0000000280)=@udp}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r4 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x194) getdents(r4, &(0x7f0000001fc0)=""/184, 0xb8) 260.683518ms ago: executing program 3 (id=23237): pipe(0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000480)='ns/ipc\x00') r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nfc(&(0x7f00000005c0), r1) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000600)=0x0) sendmsg$NFC_CMD_ACTIVATE_TARGET(r1, &(0x7f00000006c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x2c, r2, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [@NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x0) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0xc0ed0040, &(0x7f0000002a00)={[{@noblock_validity}, {@resgid={'resgid', 0x3d, 0xee00}}, {@acl}, {@noload}, {@journal_dev={'journal_dev', 0x3d, 0x3}}, {@nodiscard}]}, 0xf6, 0x477, &(0x7f0000001e00)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x2904c, 0x1, 0x10003, '\x00', [{0x0, 0x0, 0x2000000000700}, {0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}], ['\x00']}) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000180)={'wpan1\x00', 0x0}) r7 = getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x24, r4, 0x1, 0x70bd27, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r6}, @NL802154_ATTR_PID={0x8, 0x1c, r7}]}, 0x24}}, 0x0) ioctl$NS_GET_OWNER_UID(r0, 0xb704, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[], 0x5c}}, 0x0) r8 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000200), r1) sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000400)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, r8, 0x1, 0x70bd2a, 0x25dfdbfe, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20040000}, 0x800) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=@gettaction={0xff53, 0x32, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@action_gd=@TCA_ACT_TAB={0x28, 0x1, [{0xc, 0x1c, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'bpf\x00'}}, {0xc, 0x1d, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0xc, 0x20, 0x0, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}]}, @action_gd=@TCA_ACT_TAB={0x1c, 0x1, [{0xc, 0x7, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x10000}}, {0xc, 0x17, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x40}}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x40000}, 0x4048840) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="4800000010000d0428bd7000fcdbff2500008000", @ANYRES32=0x0, @ANYBLOB="1000000000000000280012800b0001006272696467650000180002"], 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="500000001000010425bbe5ad600027842cf52300", @ANYRES32=0x0, @ANYBLOB="0300000000000000280012800a00010076786c616e00"], 0x50}, 0x1, 0x0, 0x0, 0x13d33d22cca65c15}, 0x4008840) r9 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_TEST(r9, &(0x7f0000000880)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000840)={&(0x7f0000000740)={0xc4, 0xb, 0x6, 0x101, 0x0, 0x0, {0x1, 0x0, 0x9}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x2}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_DATA={0x4c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @local}}, @IPSET_ATTR_COMMENT={0x5, 0x1a, '\x00'}, @IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0x6}, @IPSET_ATTR_IP2={0x18, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @mcast2}}, @IPSET_ATTR_COMMENT={0x5, 0x1a, '\x00'}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x6}]}, @IPSET_ATTR_DATA={0x1c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP2_TO={0x18, 0x16, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}]}, @IPSET_ATTR_DATA={0x24, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @local}}, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0xf}]}, @IPSET_ATTR_ADT={0x10, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_CIDR={0x5, 0x3, 0x7}}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x15}, 0x4040000) sendmmsg(r9, &(0x7f00000002c0), 0x40000000000009f, 0x0) 260.387909ms ago: executing program 2 (id=23238): r0 = socket(0x2b, 0x1, 0x0) r1 = syz_io_uring_setup(0x110, &(0x7f0000000480)={0x0, 0xfad6, 0x400, 0x2}, &(0x7f0000000240)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r0}) (async) syz_io_uring_submit(r2, r3, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r0}) socket$inet6_udp(0xa, 0x2, 0x0) (async) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000bc0)=@raw={'raw\x00', 0x3c1, 0x3, 0x380, 0x0, 0x4c, 0x1a, 0x160, 0x73, 0x2b0, 0x258, 0x258, 0x2b0, 0x258, 0x3, 0x0, {[{{@ipv6={@private0, @local, [], [], 'dvmrp1\x00', 'macvlan1\x00', {}, {}, 0x73}, 0x0, 0x118, 0x160, 0x0, {}, [@common=@inet=@l2tp={{0x30}, {0x0, 0x0, 0x3, 0x0, 0x7}}, @common=@unspec=@connlimit={{0x40}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0x120, 0x150, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@inet=@multiport={{0x50}, {0x1, 0x4, [0x4e22, 0x4e20, 0x4e24, 0x8, 0x4e21, 0x4e22, 0x4e23, 0x4e21, 0x4e21, 0x4e23, 0x4e22, 0x4e20, 0x4e23, 0x4e21, 0x4e24], [0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1], 0x1}}]}, @common=@inet=@SET2={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0, 0x0, {0x0, 0x5400}}, {0x28}}}}, 0x3e0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x6000, 0x0) (async) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x6000, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) (async) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x28, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) capset(&(0x7f0000000100)={0x20080522}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x1000}) r7 = syz_open_dev$loop(&(0x7f0000000000), 0x81, 0x8001) ioctl$BLKRRPART(r7, 0x125f, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x18) r8 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r8, 0xc0481273, &(0x7f0000000540)={'\x00', 0x7e, 0x7527, 0x5c8, 0x7fff, 0x9}) (async) ioctl$BLKTRACESETUP(r8, 0xc0481273, &(0x7f0000000540)={'\x00', 0x7e, 0x7527, 0x5c8, 0x7fff, 0x9}) ioctl$BLKTRACETEARDOWN(r8, 0x1276, 0x0) io_uring_enter(r1, 0xdb4, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_SYNC_CANCEL(r1, 0x18, &(0x7f0000000000)={0xfeffffff, r0, 0x23, {0x3b4, 0x6d3}, 0x6}, 0x1) 260.108658ms ago: executing program 0 (id=23239): r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYRESHEX=r0], 0x60}, 0x1, 0x0, 0x0, 0x408c0}, 0x10000000) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYRES64=r0, @ANYRESHEX=r0], 0x78) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0xa, 0x300) socket$packet(0x11, 0xa, 0x300) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x2, 0x0, 0x0, 0x40f00, 0x20}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0xb68, 0x560b0000, &(0x7f0000000000)="219a53f271a76d2608004c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r2 = bpf$MAP_CREATE(0x0, 0xfffffffffffffffc, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000027b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), 0xffffffffffffffff) unshare(0x22020400) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000180)={0x8, 0x0}, 0x8) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000030100850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x2000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r6}, 0x18) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='qi_submit\x00'}, 0x18) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="240000001900010000000000000000001c140000fefc03"], 0x24}, 0x1, 0x0, 0x0, 0x40010}, 0x0) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) r8 = fsopen(&(0x7f0000000040)='cgroup2\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000001801000020756c2508000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d1b000095000000000000000000000000c92804b216e60034d1e1c8c0009338b03fad"], 0x0, 0x0, 0x0, 0x0, 0xc2c0e956b10527fa, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000580)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) fsconfig$FSCONFIG_CMD_CREATE(r8, 0x6, 0x0, 0x0, 0x0) 251.210538ms ago: executing program 2 (id=23240): r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) preadv(r2, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102386, 0xfffffd6e}], 0x1, 0x0, 0x0) ioctl$RTC_WIE_ON(r2, 0x700f) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @dev}, 0x2}}, 0x2e) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000440), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_DELETE(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01002cbd7000040000000700b600080009000200000008000c00a60a0000060001000500004008000b"], 0x40}, 0x1, 0x0, 0x0, 0xc100}, 0x4040) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x3, 0x2, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x7}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) r7 = syz_open_dev$usbfs(&(0x7f0000000000), 0x1ff, 0xa401) ioctl$USBDEVFS_CONTROL(r7, 0x8008551c, &(0x7f0000000180)={0x1, 0x18, 0x0, 0x1, 0x0, 0x0, 0x0}) 142.864279ms ago: executing program 0 (id=23241): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSET={0x1c, 0x9, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2b}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x44}, 0x1, 0x0, 0x0, 0x4000850}, 0x24000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="4800000010000d0428bd7000fcdbff2500008000", @ANYRES32=0x0, @ANYBLOB="1000000000000000280012800b00010062726964676500001800028005001900840000000c001e"], 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4008050) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="500000001000010425bbe5ad600027842cf52300", @ANYRES32=0x0, @ANYBLOB="0300000000000000280012800a00010076786c616e00"], 0x50}, 0x1, 0x0, 0x0, 0x13d33d22cca65c15}, 0x4008840) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/74, 0x328000, 0x1000}, 0x1c) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000200)=0x1, 0x4) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000001980)=0x100, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000580)={'batadv_slave_0\x00', 0x0}) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000140), 0x4) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000002340)=@deltfilter={0x984, 0x2d, 0x800, 0x70bd27, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x0, 0xd}, {0xa, 0x10}, {0x10, 0xc}}, [@filter_kind_options=@f_bpf={{0x8}, {0x44c, 0x2, [@TCA_BPF_OPS={{0x6, 0x4, 0x1}, {0xc, 0x5, [{0xfff9, 0x9, 0x7, 0xb}]}}, @TCA_BPF_FLAGS={0x8}, @TCA_BPF_NAME={0xc, 0x7, './file0\x00'}, @TCA_BPF_FD={0x8}, @TCA_BPF_POLICE={0x410, 0x2, [@TCA_POLICE_AVRATE={0x8, 0x4, 0x9}, @TCA_POLICE_RATE={0x404, 0x2, [0x800, 0x1f, 0x0, 0x4, 0x1, 0x8, 0x9, 0x3, 0x5, 0xffff, 0x7, 0xffffffff, 0x10001, 0x80000000, 0x3, 0x2, 0x3f, 0x1, 0x9, 0x3, 0x5, 0xffff, 0x8, 0x7, 0x800, 0x1, 0x6, 0x0, 0x2, 0xffffffff, 0xb, 0x4, 0x1ff, 0xd4, 0x2, 0x8, 0x722b, 0x3, 0x2, 0x4, 0xdd, 0x6, 0x8, 0x81, 0x7, 0x9, 0xe2, 0x9, 0x8, 0xf, 0x7, 0x1deb797b, 0x2, 0x0, 0x6, 0x9, 0x4, 0x1000, 0x9b, 0x0, 0x0, 0x3ff, 0xfffffff2, 0x1, 0x8, 0x0, 0x7, 0xfff, 0xffff8000, 0x10, 0x7, 0x9464, 0x3, 0x21, 0x9, 0x8, 0x2, 0x10, 0x5, 0x120, 0xe, 0x8, 0x7, 0x8001, 0x2, 0x4, 0x0, 0x2, 0x0, 0x6, 0x3, 0x6, 0x7, 0x3, 0x6f5a60f0, 0x5, 0x6, 0x3, 0x8, 0x9, 0xbc, 0x6, 0x3, 0x6000000, 0x9, 0x3, 0x5, 0x10001, 0x3, 0x40000, 0x8, 0xff, 0x3ff, 0x80000000, 0x101, 0xd, 0xa, 0x6, 0x7, 0x3fff80, 0x9, 0x8, 0x9, 0x10000, 0x10000, 0xb6e8, 0x1, 0x0, 0x3a, 0x4, 0x6, 0x400, 0x8, 0x1, 0x10000, 0x4, 0x4, 0x0, 0x6, 0x7, 0x8, 0x2, 0x87, 0xf, 0x3, 0xffff, 0x2, 0x2711, 0x6, 0xa310, 0x4ec, 0x4, 0x3, 0x30e700, 0xe4b, 0x622, 0x7, 0xd5, 0x19c, 0xacb, 0x8001, 0x1, 0x3, 0x1, 0x1, 0x7, 0xffff, 0x9, 0x1, 0x7, 0xb898, 0x4, 0xffffff6b, 0x100, 0xffffff4f, 0xb0, 0x6, 0x8, 0x4, 0x5, 0x200, 0x5, 0x8, 0x19bc, 0x6, 0x3, 0xd07, 0x7, 0x7, 0x5, 0x7, 0x8bb, 0x8, 0x0, 0xf, 0x46c, 0x7, 0x6, 0x4, 0x0, 0x30e3, 0x98, 0xe, 0xfffffff9, 0x5, 0xef3c, 0x10, 0x9, 0x0, 0x8, 0x7, 0x6, 0x10000, 0x2, 0xf2, 0x5, 0x7fffffff, 0x5, 0x95, 0x401, 0x10000000, 0x66, 0x2, 0x100, 0x50d, 0x7, 0xffffffff, 0x2, 0x8000, 0x8, 0x1, 0x0, 0x1000, 0x6, 0x1, 0xf0d5, 0x26e, 0x96, 0x10001, 0xc0, 0x5, 0x9, 0x3, 0x5, 0x8, 0x8001, 0x5, 0x3c0, 0x0, 0x6, 0x9, 0x8, 0xff, 0x2, 0x3, 0x19a]}]}, @TCA_BPF_FD={0x8}]}}, @filter_kind_options=@f_route={{0xa}, {0x488, 0x2, [@TCA_ROUTE4_CLASSID={0x8, 0x1, {0x3, 0xb}}, @TCA_ROUTE4_POLICE={0x464, 0x5, [@TCA_POLICE_AVRATE={0x8, 0x4, 0x80000001}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x10}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x5}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x1, 0x100, 0x4, 0x6, 0x0, 0xfffffff8, 0x401, 0x10, 0x64e, 0x1, 0x12a, 0x6, 0x7d4f, 0x8, 0xbe, 0x56d7, 0x3, 0x2, 0x3, 0x1ff, 0x6, 0x6, 0xffffffff, 0x9, 0x9, 0x1, 0x13f, 0x9, 0xfffffff8, 0x7, 0xd, 0x3f0, 0x101, 0x2, 0xfff, 0x20, 0x81, 0xf3c8, 0x2, 0x9, 0xfffffffc, 0x6, 0x4, 0x401, 0xd32, 0xca, 0xc, 0x8, 0x6, 0x7, 0x5, 0xffffffff, 0xfffffff9, 0x4, 0x5, 0x4, 0x7, 0x9, 0x400, 0x800, 0xd, 0x1151f322, 0xfffffffa, 0x0, 0x2, 0x7, 0x2, 0x6, 0x1, 0x7, 0x6, 0x9, 0x5, 0xdaec, 0x51b, 0x6, 0x6, 0x7, 0xf, 0x9, 0x6, 0x6, 0x4aa667a8, 0x800, 0x542, 0x1, 0x3, 0x7, 0x5, 0x2, 0x10000, 0xf, 0x7f, 0xdfa7, 0x7, 0x4, 0x5, 0x7a0a, 0x4a, 0x80, 0x9, 0x3, 0x3, 0x3ff, 0x1, 0x2, 0x0, 0x1, 0x9, 0x400, 0x4, 0x3, 0x6, 0xcc3, 0x5, 0x5, 0x10000, 0x817, 0x9, 0x401, 0x9, 0xad39, 0x3ff, 0x2000000, 0xfffffffe, 0x4, 0x31c971e0, 0x5, 0x10000, 0x0, 0x3, 0x9, 0x5, 0x0, 0x370800, 0x5, 0x6, 0xffffff49, 0x9, 0x6, 0x10001, 0xfff, 0xd99a, 0x80000001, 0x1677fca7, 0x7, 0x7fff, 0x6, 0x6, 0xf, 0xd, 0x80000001, 0x3, 0x8, 0x8, 0x8000, 0x4, 0x8001, 0x535, 0x8, 0x80, 0x3a, 0x6, 0x1, 0x1, 0x4, 0x2, 0x2, 0xe, 0x7, 0xfffff801, 0x100, 0x6, 0x1, 0x9f3, 0x800, 0x40, 0x7fffffff, 0x10000, 0x8, 0xfffffff2, 0x7, 0x5a000000, 0x4, 0xb9, 0x7f, 0x0, 0x8, 0xfffffffb, 0x4, 0x3, 0x6, 0x1ff, 0xe2e, 0x7, 0x4, 0x7, 0x6206, 0xff, 0x3, 0x234, 0x2, 0x7, 0x1, 0x800, 0x800, 0x8, 0x2, 0xb, 0xdf, 0xfffffffd, 0x2, 0xff, 0xfffffffb, 0x7ff, 0xd8000000, 0x9, 0x6, 0x35f61708, 0xff, 0x401, 0xff, 0xffffffff, 0x5, 0xb4c, 0x5, 0x7fff, 0xf361, 0x40, 0x1, 0x37c8304c, 0x2, 0x4f1, 0xe, 0x9, 0x6, 0x0, 0x39e2, 0x1, 0x7fff, 0x7, 0x46, 0x19e5, 0x7, 0x2, 0xf, 0x6f1, 0xfffffffb, 0x1, 0x0, 0x6a9, 0xff, 0x101, 0x1, 0x199, 0x6]}, @TCA_POLICE_RATE64={0xc, 0x8, 0x297}, @TCA_POLICE_RATE64={0xc, 0x8, 0x13f}, @TCA_POLICE_RATE64={0xc, 0x8, 0xfffffffffffffe61}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x1}, @TCA_POLICE_RATE64={0xc, 0x8, 0xdea}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x2f23}]}, @TCA_ROUTE4_TO={0x8, 0x2, 0xc7}, @TCA_ROUTE4_CLASSID={0x8, 0x1, {0x2, 0xfff1}}, @TCA_ROUTE4_FROM={0x8, 0x3, 0xd5}]}}, @TCA_RATE={0x6, 0x5, {0x2, 0x6}}, @filter_kind_options=@f_flower={{0xb}, {0x44, 0x2, [@TCA_FLOWER_KEY_MPLS_LABEL={0x8, 0x46, 0x3ff}, @TCA_FLOWER_KEY_IP_TOS_MASK={0x5, 0x4a, 0x2}, @TCA_FLOWER_KEY_MPLS_TTL={0x5, 0x43, 0x1}, @TCA_FLOWER_KEY_SCTP_DST_MASK={0x6}, @TCA_FLOWER_KEY_IPV4_SRC={0x8, 0xa, @broadcast}, @TCA_FLOWER_KEY_MPLS_TTL={0x5, 0x43, 0xc}, @TCA_FLOWER_KEY_CT_ZONE={0x6, 0x5d, 0x4}, @TCA_FLOWER_KEY_SCTP_SRC_MASK={0x6}]}}, @TCA_RATE={0x6, 0x5, {0x6, 0x8}}, @TCA_RATE={0x6, 0x5, {0x5, 0x80}}, @TCA_RATE={0x6, 0x5, {0x1, 0xf}}, @TCA_RATE={0x6, 0x5, {0x3, 0xc4}}]}, 0x984}, 0x1, 0x0, 0x0, 0x40}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0xfe, 0x0, 0x7fff0026}]}) syz_usbip_server_init(0x1) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000012c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)={{0x1, 0x1, 0x18, r6, {0x4}}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000240)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r9, 0x89f0, &(0x7f0000000540)={'syztnl2\x00', &(0x7f00000004c0)={'ip6_vti0\x00', r10, 0x4, 0x81, 0x9, 0x934c, 0x68, @dev={0xfe, 0x80, '\x00', 0x38}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x80, 0x8, 0x9, 0x9}}) readv(r8, &(0x7f0000000000)=[{&(0x7f0000001300)=""/4103, 0x1007}], 0x1) ioctl$TIOCVHANGUP(r8, 0x5437, 0x0) sendmmsg(r3, &(0x7f00000002c0), 0x40000000000009f, 0x0) r11 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r3) sendmsg$ETHTOOL_MSG_COALESCE_SET(r3, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000580)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="10002cbd7000ffdbdf25140000000800020002000000080011004b3600000800150004000000080012000f00000008000700040000000800160005000000080005000800000008000e0005000000ee1a731effd0ac885a9a0c65355b6720572eb9fc8347381fc1eddff440ac23af98e3fe644fa7dea50ecf3981986e5916bb1de11d4325055583570fe6bc976c0fda4f0e18ebb5e3bbe806dd23ce81126835f7db372982771ef29eb9b8652afb5589a46c5c99723fa920206a09581cabfce272ca947ebb385179231f726d96aea109eccc1ca3049d963a79bcc943309f54973ee1d358e612047caa38c48d2700263101d0aecb"], 0x54}, 0x1, 0x0, 0x0, 0x40000}, 0x0) copy_file_range(r7, &(0x7f0000000400)=0x3, r5, 0x0, 0x3, 0x0) 105.423249ms ago: executing program 3 (id=23242): bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x0) close(r0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x24, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xa) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000d00)={0x0, 0x0}, 0x8) r3 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000000)=r2, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r3, 0x0, 0x0}, 0x10) 44.94471ms ago: executing program 3 (id=23243): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) r2 = openat$sysfs(0xffffff9c, &(0x7f00000037c0)='/sys/kernel/notes', 0x0, 0x0) r3 = syz_io_uring_setup(0xbdc, &(0x7f0000000080)={0x0, 0xec21, 0x80, 0x1, 0x40000333}, &(0x7f0000000340)=0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r4, 0x0, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r2, 0x0, &(0x7f0000000600)=[{&(0x7f0000001800)=""/201, 0xc9}], 0x1, 0x0, 0x1}) io_uring_enter(r3, 0x847ba, 0x2000, 0xe, 0x0, 0x0) 44.79894ms ago: executing program 3 (id=23244): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) 25.15551ms ago: executing program 8 (id=23245): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfd, 0x0, 0x7ffc0002}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0xf) getresuid(0x0, 0x0, 0x0) 20.75381ms ago: executing program 4 (id=23246): ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) recvmsg$can_raw(r0, &(0x7f0000001240)={&(0x7f0000000040)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/49, 0x31}, {&(0x7f0000000100)=""/108, 0x6c}, {&(0x7f0000000180)=""/21, 0x15}, {&(0x7f00000001c0)}], 0x4, &(0x7f0000000240)=""/4096, 0x1000}, 0x0) getresuid(&(0x7f00000012c0), &(0x7f0000001300), &(0x7f0000001340)) (async) getresuid(&(0x7f00000012c0)=0x0, &(0x7f0000001300), &(0x7f0000001340)) r2 = getegid() lchown(&(0x7f0000001280)='./file0\x00', r1, r2) r3 = socket$nl_route(0x10, 0x3, 0x0) creat(&(0x7f0000001380)='./file0\x00', 0x3) (async) r4 = creat(&(0x7f0000001380)='./file0\x00', 0x3) r5 = openat$misdntimer(0xffffffffffffff9c, &(0x7f00000013c0), 0x200000, 0x0) fcntl$lock(r5, 0x26, &(0x7f0000001400)={0x2, 0x4, 0x0, 0x82c6, 0xffffffffffffffff}) newfstatat(0xffffffffffffff9c, &(0x7f0000001440)='./file0\x00', &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mount$bpf(0x0, &(0x7f0000001500)='./file0\x00', &(0x7f0000001540), 0xca964, &(0x7f0000001580)={[{@uid={'uid', 0x3d, r6}}], [{@obj_role}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/mISDNtimer\x00'}}, {@appraise_type}, {@uid_lt={'uid<', r1}}, {@dont_appraise}]}) r7 = accept4(r3, 0x0, &(0x7f0000001600), 0x40800) syz_emit_ethernet(0x76, &(0x7f0000001640)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @local, @void, {@ipv6={0x86dd, @icmpv6={0x7, 0x6, "3c43f4", 0x40, 0x3a, 0x1, @dev={0xfe, 0x80, '\x00', 0x14}, @empty, {[@fragment={0x5e, 0x0, 0x10, 0x0, 0x0, 0x7, 0x65}, @hopopts={0x87, 0x1, '\x00', [@pad1, @enc_lim, @enc_lim={0x4, 0x1, 0x2e}, @jumbo={0xc2, 0x4, 0x400}]}, @fragment={0x6, 0x0, 0xe4, 0x1, 0x0, 0x0, 0x68}], @mld={0x0, 0x0, 0x0, 0x2, 0x7f, @private1}}}}}}, 0x0) ioctl$SIOCX25SCALLUSERDATA(r4, 0x89e5, &(0x7f00000016c0)={0x5e, "114eb8363a2035dd2de1ab53d308321f66a5dc36af85f5aa2fd5d1f3c6c1f60aa57bdaf97cf68a378bd9a2920efbc09fc216df00589ce741702714892193e2a1fde3e0cd236ac96798b67c5f004b099e130ade56bbc5cdb7304a12ad19146b69e239274b8a35baeec108b42d7012f84b8af7958c81bf70222c3bdf9932536f81"}) getsockopt$X25_QBITINCL(r7, 0x106, 0x1, &(0x7f0000001780), &(0x7f00000017c0)=0x4) setxattr(&(0x7f0000001800)='./file0\x00', &(0x7f0000001840)=@random={'trusted.', '{^\x00'}, &(0x7f0000001880)='$][\x00', 0x4, 0x1) (async) setxattr(&(0x7f0000001800)='./file0\x00', &(0x7f0000001840)=@random={'trusted.', '{^\x00'}, &(0x7f0000001880)='$][\x00', 0x4, 0x1) r8 = socket$key(0xf, 0x3, 0x2) setsockopt$inet6_tcp_int(r7, 0x6, 0x22, &(0x7f00000018c0)=0x1, 0x4) syz_clone(0x400, &(0x7f0000001900)="c6483704255f79f7ccb5488ff7f448c68e0e4be94fb31858895bf12c7f7d7e700bb81fe904fd77eefc780f03006a8325906e3811df5374b2418870", 0x3b, &(0x7f0000001940), &(0x7f0000001980), &(0x7f00000019c0)="dabd53765d842b0795ca012f0325da2e031c9cf4bb22c8e6fffbdfa9d6dafc51924556178a76ad64e3b2ce821c93d81d97c0840508cdf1d27a18aa528a75f81291b139a6208d379c3e3b05163d1aa9cdefac66dc2f3c909139818b7aebfb75df24cc2706201c1ee05e7dec7e834c80cd5671eefa167e3b304c58f4af6756fca418daebae560d4a4fe155fc0e2de3c5939472d7c0e992cb11258a7af2b2b94fb0a29dc87dd8ccf84e1182f51f4a8ea6c2944a43f1466cda14b4e2883caf85998ec7e4e1a5af7a02077946f1975145e005204f7e686481ef70310493088694e8618e627be2db4b4507047b70b2ee903eae192324d18dd6e6") (async) syz_clone(0x400, &(0x7f0000001900)="c6483704255f79f7ccb5488ff7f448c68e0e4be94fb31858895bf12c7f7d7e700bb81fe904fd77eefc780f03006a8325906e3811df5374b2418870", 0x3b, &(0x7f0000001940), &(0x7f0000001980), &(0x7f00000019c0)="dabd53765d842b0795ca012f0325da2e031c9cf4bb22c8e6fffbdfa9d6dafc51924556178a76ad64e3b2ce821c93d81d97c0840508cdf1d27a18aa528a75f81291b139a6208d379c3e3b05163d1aa9cdefac66dc2f3c909139818b7aebfb75df24cc2706201c1ee05e7dec7e834c80cd5671eefa167e3b304c58f4af6756fca418daebae560d4a4fe155fc0e2de3c5939472d7c0e992cb11258a7af2b2b94fb0a29dc87dd8ccf84e1182f51f4a8ea6c2944a43f1466cda14b4e2883caf85998ec7e4e1a5af7a02077946f1975145e005204f7e686481ef70310493088694e8618e627be2db4b4507047b70b2ee903eae192324d18dd6e6") setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000001b00)={0x6, &(0x7f0000001ac0)=[{0x401, 0x9, 0xf, 0xaf8}, {0x7, 0x7, 0x4, 0x2}, {0x3ff, 0x6, 0x1, 0x80000000}, {0x66dc, 0x1, 0x7f, 0x2}, {0x2, 0x1, 0x3}, {0x1ff, 0x8, 0x1}]}, 0x10) (async) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000001b00)={0x6, &(0x7f0000001ac0)=[{0x401, 0x9, 0xf, 0xaf8}, {0x7, 0x7, 0x4, 0x2}, {0x3ff, 0x6, 0x1, 0x80000000}, {0x66dc, 0x1, 0x7f, 0x2}, {0x2, 0x1, 0x3}, {0x1ff, 0x8, 0x1}]}, 0x10) fchown(r5, 0x0, r2) (async) fchown(r5, 0x0, r2) syz_genetlink_get_family_id$nl80211(&(0x7f0000001b80), r7) (async) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001b80), r7) sendmsg$NL80211_CMD_LEAVE_OCB(r7, &(0x7f0000001c40)={&(0x7f0000001b40)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001c00)={&(0x7f0000001bc0)={0x20, r9, 0x2, 0x70bd29, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x3, 0x5f}}}}}, 0x20}, 0x1, 0x0, 0x0, 0x810}, 0x20044010) r10 = syz_open_dev$vcsu(&(0x7f0000001c80), 0x40000000, 0x711000) openat$tun(0xffffffffffffff9c, &(0x7f0000001cc0), 0x40000, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000001cc0), 0x40000, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000001d40)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_BSS(r10, &(0x7f0000001e40)={&(0x7f0000001d00)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001e00)={&(0x7f0000001d80)={0x4c, r9, 0x200, 0x70bd2b, 0x25dfdbff, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_BSS_SHORT_PREAMBLE={0x5, 0x1d, 0xcb}, @NL80211_ATTR_BSS_CTS_PROT={0x5, 0x1c, 0x3}, @NL80211_ATTR_BSS_SHORT_SLOT_TIME={0x5, 0x1e, 0x4f}, @NL80211_ATTR_P2P_OPPPS={0x5, 0xa3, 0x1}, @NL80211_ATTR_BSS_SHORT_SLOT_TIME={0x5, 0x1e, 0x9d}, @NL80211_ATTR_P2P_OPPPS={0x5, 0xa3, 0x4}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4040014}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000001e80)={'sit0\x00'}) (async) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000001e80)={'sit0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000001ec0)=@base={0x6, 0x1, 0x0, 0x4, 0x301, 0x1, 0x7bc, '\x00', r12, r10, 0x1, 0x3, 0x2}, 0x50) sendmsg$NL80211_CMD_SET_INTERFACE(r10, &(0x7f0000002040)={&(0x7f0000001f40)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000002000)={&(0x7f0000001fc0)={0x3c, r9, 0x200, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@mon_options=[@NL80211_ATTR_MNTR_FLAGS={0x14, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_COOK_FRAMES={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}]}], @NL80211_ATTR_MESH_ID={0xa}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10}, 0x8014) (async) sendmsg$NL80211_CMD_SET_INTERFACE(r10, &(0x7f0000002040)={&(0x7f0000001f40)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000002000)={&(0x7f0000001fc0)={0x3c, r9, 0x200, 0x70bd25, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [@mon_options=[@NL80211_ATTR_MNTR_FLAGS={0x14, 0x17, 0x0, 0x1, [@NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_OTHER_BSS={0x4}, @NL80211_MNTR_FLAG_COOK_FRAMES={0x4}, @NL80211_MNTR_FLAG_FCSFAIL={0x4}]}], @NL80211_ATTR_MESH_ID={0xa}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10}, 0x8014) 0s ago: executing program 3 (id=23247): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000740)='scsi_dispatch_cmd_start\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000740)='scsi_dispatch_cmd_start\x00', r1}, 0x10) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) kernel console output (not intermixed with test programs): j=root:sysadm_r:sysadm_t pid=30979 comm="syz.8.20948" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f39b46cefc9 code=0x7ffc0000 [ 1638.017767][ T29] audit: type=1326 audit(1637.858:85812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30979 comm="syz.8.20948" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39b46cefc9 code=0x7ffc0000 [ 1638.282175][T31010] SELinux: policydb version 0 does not match my version range 15-35 [ 1638.412280][T31028] bond0: ARP target 9.0.0.0 is already present [ 1638.418585][T31028] bond0: option arp_ip_target: invalid value (9) [ 1638.426399][T31028] bond0 (unregistering): Released all slaves [ 1638.575629][T31039] SELinux: policydb version 0 does not match my version range 15-35 [ 1638.639256][T30914] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1638.680333][T30914] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1638.699913][T31056] tipc: Enabling of bearer rejected, already enabled [ 1638.732095][T30914] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1638.811942][T31074] vhci_hcd: default hub control req: 8013 v0000 i0000 l31125 [ 1638.906779][T31087] tipc: Enabling of bearer rejected, failed to enable media [ 1638.944880][T31094] IPv6: Can't replace route, no match found [ 1638.988897][T31103] FAULT_INJECTION: forcing a failure. [ 1638.988897][T31103] name failslab, interval 1, probability 0, space 0, times 0 [ 1639.001778][T31103] CPU: 1 UID: 0 PID: 31103 Comm: syz.2.21000 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1639.001835][T31103] Tainted: [W]=WARN [ 1639.001842][T31103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1639.001855][T31103] Call Trace: [ 1639.001863][T31103] [ 1639.001872][T31103] __dump_stack+0x1d/0x30 [ 1639.001899][T31103] dump_stack_lvl+0xe8/0x140 [ 1639.001924][T31103] dump_stack+0x15/0x1b [ 1639.001999][T31103] should_fail_ex+0x265/0x280 [ 1639.002024][T31103] should_failslab+0x8c/0xb0 [ 1639.002106][T31103] kmem_cache_alloc_noprof+0x50/0x480 [ 1639.002135][T31103] ? skb_clone+0x151/0x1f0 [ 1639.002154][T31103] skb_clone+0x151/0x1f0 [ 1639.002171][T31103] __netlink_deliver_tap+0x2c9/0x500 [ 1639.002227][T31103] netlink_unicast+0x66b/0x690 [ 1639.002258][T31103] netlink_sendmsg+0x58b/0x6b0 [ 1639.002283][T31103] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1639.002416][T31103] __sock_sendmsg+0x145/0x180 [ 1639.002444][T31103] ____sys_sendmsg+0x31e/0x4e0 [ 1639.002483][T31103] ___sys_sendmsg+0x17b/0x1d0 [ 1639.002557][T31103] __x64_sys_sendmsg+0xd4/0x160 [ 1639.002581][T31103] x64_sys_call+0x191e/0x3000 [ 1639.002605][T31103] do_syscall_64+0xd2/0x200 [ 1639.002636][T31103] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1639.002723][T31103] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1639.002754][T31103] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1639.002768][T31103] RIP: 0033:0x7f5aceaeefc9 [ 1639.002817][T31103] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1639.002828][T31103] RSP: 002b:00007f5acd54f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1639.002840][T31103] RAX: ffffffffffffffda RBX: 00007f5aced45fa0 RCX: 00007f5aceaeefc9 [ 1639.002848][T31103] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 1639.002856][T31103] RBP: 00007f5acd54f090 R08: 0000000000000000 R09: 0000000000000000 [ 1639.002864][T31103] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1639.002871][T31103] R13: 00007f5aced46038 R14: 00007f5aced45fa0 R15: 00007ffe2c77b5a8 [ 1639.002950][T31103] [ 1639.228110][T31105] wireguard0: entered promiscuous mode [ 1639.233624][T31105] wireguard0: entered allmulticast mode [ 1639.258223][T31108] FAULT_INJECTION: forcing a failure. [ 1639.258223][T31108] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1639.271426][T31108] CPU: 0 UID: 0 PID: 31108 Comm: syz.4.21002 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1639.271512][T31108] Tainted: [W]=WARN [ 1639.271520][T31108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1639.271535][T31108] Call Trace: [ 1639.271553][T31108] [ 1639.271563][T31108] __dump_stack+0x1d/0x30 [ 1639.271591][T31108] dump_stack_lvl+0xe8/0x140 [ 1639.271615][T31108] dump_stack+0x15/0x1b [ 1639.271653][T31108] should_fail_ex+0x265/0x280 [ 1639.271675][T31108] should_fail+0xb/0x20 [ 1639.271691][T31108] should_fail_usercopy+0x1a/0x20 [ 1639.271747][T31108] _copy_to_user+0x20/0xa0 [ 1639.271776][T31108] simple_read_from_buffer+0xb5/0x130 [ 1639.271807][T31108] proc_fail_nth_read+0x10e/0x150 [ 1639.271938][T31108] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1639.271969][T31108] vfs_read+0x1a8/0x770 [ 1639.271996][T31108] ? mntput+0x4b/0x80 [ 1639.272015][T31108] ? __rcu_read_unlock+0x4f/0x70 [ 1639.272061][T31108] ? __fget_files+0x184/0x1c0 [ 1639.272101][T31108] ksys_read+0xda/0x1a0 [ 1639.272137][T31108] __x64_sys_read+0x40/0x50 [ 1639.272166][T31108] x64_sys_call+0x27c0/0x3000 [ 1639.272223][T31108] do_syscall_64+0xd2/0x200 [ 1639.272245][T31108] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1639.272282][T31108] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1639.272374][T31108] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1639.272395][T31108] RIP: 0033:0x7fcfe0f1d9dc [ 1639.272410][T31108] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1639.272432][T31108] RSP: 002b:00007fcfdf987030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1639.272454][T31108] RAX: ffffffffffffffda RBX: 00007fcfe1175fa0 RCX: 00007fcfe0f1d9dc [ 1639.272492][T31108] RDX: 000000000000000f RSI: 00007fcfdf9870a0 RDI: 0000000000000006 [ 1639.272508][T31108] RBP: 00007fcfdf987090 R08: 0000000000000000 R09: 0000000000000000 [ 1639.272523][T31108] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1639.272584][T31108] R13: 00007fcfe1176038 R14: 00007fcfe1175fa0 R15: 00007ffed1e61b68 [ 1639.272603][T31108] [ 1639.539232][T31125] FAULT_INJECTION: forcing a failure. [ 1639.539232][T31125] name failslab, interval 1, probability 0, space 0, times 0 [ 1639.551983][T31125] CPU: 1 UID: 0 PID: 31125 Comm: syz.0.21009 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1639.552023][T31125] Tainted: [W]=WARN [ 1639.552031][T31125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1639.552046][T31125] Call Trace: [ 1639.552054][T31125] [ 1639.552106][T31125] __dump_stack+0x1d/0x30 [ 1639.552129][T31125] dump_stack_lvl+0xe8/0x140 [ 1639.552191][T31125] dump_stack+0x15/0x1b [ 1639.552209][T31125] should_fail_ex+0x265/0x280 [ 1639.552230][T31125] should_failslab+0x8c/0xb0 [ 1639.552264][T31125] kmem_cache_alloc_noprof+0x50/0x480 [ 1639.552295][T31125] ? skb_clone+0x151/0x1f0 [ 1639.552358][T31125] skb_clone+0x151/0x1f0 [ 1639.552380][T31125] __netlink_deliver_tap+0x2c9/0x500 [ 1639.552419][T31125] netlink_unicast+0x66b/0x690 [ 1639.552455][T31125] netlink_sendmsg+0x58b/0x6b0 [ 1639.552517][T31125] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1639.552536][T31125] __sock_sendmsg+0x145/0x180 [ 1639.552560][T31125] ____sys_sendmsg+0x31e/0x4e0 [ 1639.552652][T31125] ___sys_sendmsg+0x17b/0x1d0 [ 1639.552829][T31125] __x64_sys_sendmsg+0xd4/0x160 [ 1639.552932][T31125] x64_sys_call+0x191e/0x3000 [ 1639.553033][T31125] do_syscall_64+0xd2/0x200 [ 1639.553066][T31125] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1639.553098][T31125] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1639.553129][T31125] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1639.553150][T31125] RIP: 0033:0x7f5379eaefc9 [ 1639.553239][T31125] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1639.553258][T31125] RSP: 002b:00007f5378917038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1639.553279][T31125] RAX: ffffffffffffffda RBX: 00007f537a105fa0 RCX: 00007f5379eaefc9 [ 1639.553293][T31125] RDX: 0000000000000000 RSI: 0000200000000140 RDI: 0000000000000006 [ 1639.553305][T31125] RBP: 00007f5378917090 R08: 0000000000000000 R09: 0000000000000000 [ 1639.553356][T31125] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1639.553370][T31125] R13: 00007f537a106038 R14: 00007f537a105fa0 R15: 00007ffd6279b348 [ 1639.553390][T31125] [ 1639.873930][T31131] bond0: ARP target 9.0.0.0 is already present [ 1639.880214][T31131] bond0: option arp_ip_target: invalid value (9) [ 1639.896503][T31131] bond0 (unregistering): Released all slaves [ 1639.991614][T31148] 9pnet_fd: Insufficient options for proto=fd [ 1640.020422][T31148] lo speed is unknown, defaulting to 1000 [ 1640.058368][T31148] lo speed is unknown, defaulting to 1000 [ 1640.094000][T31158] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1640.141411][T31158] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1640.200946][T31158] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1640.263069][T31158] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1640.400973][T15118] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1640.429586][T15118] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1640.437912][T15118] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1640.446218][T15118] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1640.537247][T31185] pim6reg: entered allmulticast mode [ 1640.550137][T31185] pim6reg: left allmulticast mode [ 1640.618322][T31197] pim6reg: entered allmulticast mode [ 1640.626912][T31197] pim6reg: left allmulticast mode [ 1640.805489][T31215] pim6reg: entered allmulticast mode [ 1640.817466][T31215] pim6reg: left allmulticast mode [ 1640.893555][T31222] bond1: ARP target 9.0.0.0 is already present [ 1640.899933][T31222] bond1: option arp_ip_target: invalid value (9) [ 1640.909769][T31222] bond1 (unregistering): Released all slaves [ 1640.918790][T31216] atomic_op ffff8881049ebd28 conn xmit_atomic 0000000000000000 [ 1641.000907][T31240] nfs: Unknown parameter 'noac ' [ 1641.018278][T31243] bridge0: entered promiscuous mode [ 1641.023695][T31243] bridge0: left promiscuous mode [ 1641.480827][T15118] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1641.489361][T15118] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1641.507805][T15118] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1641.516588][T15118] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1641.548930][T31255] pim6reg: entered allmulticast mode [ 1641.554931][T31255] pim6reg: left allmulticast mode [ 1641.809425][T31276] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1641.831963][T31279] atomic_op ffff8881049ebd28 conn xmit_atomic 0000000000000000 [ 1641.855996][T31283] pim6reg: entered allmulticast mode [ 1641.866574][T31276] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1641.881256][T31283] pim6reg: left allmulticast mode [ 1641.909463][T31276] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1641.966515][T31295] tipc: Enabling of bearer rejected, already enabled [ 1641.976741][T31276] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1642.039084][T31305] nfs: Unknown parameter 'noac ' [ 1642.446317][T31313] __nla_validate_parse: 16 callbacks suppressed [ 1642.446331][T31313] netlink: 8 bytes leftover after parsing attributes in process `syz.8.21087'. [ 1642.857191][T31320] IPv6: Can't replace route, no match found [ 1642.896986][T31324] pim6reg: entered allmulticast mode [ 1642.903749][T31324] pim6reg: left allmulticast mode [ 1642.947921][T31329] tipc: Enabling of bearer rejected, failed to enable media [ 1643.043785][T31347] SELinux: policydb version 0 does not match my version range 15-35 [ 1643.061987][T31347] sel_write_load: 4 callbacks suppressed [ 1643.062004][T31347] SELinux: failed to load policy [ 1643.125793][T31353] atomic_op ffff8881049ea928 conn xmit_atomic 0000000000000000 [ 1643.142866][T31355] bridge0: entered promiscuous mode [ 1643.148400][T31355] bridge0: left promiscuous mode [ 1643.507975][T31365] netlink: 8 bytes leftover after parsing attributes in process `syz.8.21105'. [ 1643.567848][T31367] netlink: 24 bytes leftover after parsing attributes in process `syz.8.21106'. [ 1644.043170][T31392] netlink: 8 bytes leftover after parsing attributes in process `syz.8.21116'. [ 1644.052593][T31390] FAULT_INJECTION: forcing a failure. [ 1644.052593][T31390] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1644.065697][T31390] CPU: 0 UID: 0 PID: 31390 Comm: syz.0.21117 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1644.065731][T31390] Tainted: [W]=WARN [ 1644.065738][T31390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1644.065831][T31390] Call Trace: [ 1644.065839][T31390] [ 1644.065848][T31390] __dump_stack+0x1d/0x30 [ 1644.065874][T31390] dump_stack_lvl+0xe8/0x140 [ 1644.065968][T31390] dump_stack+0x15/0x1b [ 1644.066046][T31390] should_fail_ex+0x265/0x280 [ 1644.066075][T31390] should_fail+0xb/0x20 [ 1644.066094][T31390] should_fail_usercopy+0x1a/0x20 [ 1644.066119][T31390] _copy_from_iter+0x254/0xe80 [ 1644.066143][T31390] ? __build_skb_around+0x1ab/0x200 [ 1644.066175][T31390] skb_copy_datagram_from_iter+0xb1/0x490 [ 1644.066233][T31390] ? __netdev_alloc_frag_align+0xd8/0x130 [ 1644.066267][T31390] tun_get_user+0xafa/0x26e0 [ 1644.066340][T31390] ? ref_tracker_alloc+0x1f2/0x2f0 [ 1644.066377][T31390] tun_chr_write_iter+0x15e/0x210 [ 1644.066406][T31390] do_iter_readv_writev+0x4a1/0x540 [ 1644.066473][T31390] vfs_writev+0x2df/0x8b0 [ 1644.066514][T31390] do_writev+0xe7/0x210 [ 1644.066614][T31390] __x64_sys_writev+0x45/0x50 [ 1644.066645][T31390] x64_sys_call+0x1e9a/0x3000 [ 1644.066715][T31390] do_syscall_64+0xd2/0x200 [ 1644.066734][T31390] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1644.066780][T31390] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1644.066826][T31390] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1644.066850][T31390] RIP: 0033:0x7f5379eaefc9 [ 1644.066866][T31390] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1644.066886][T31390] RSP: 002b:00007f5378917038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 1644.066908][T31390] RAX: ffffffffffffffda RBX: 00007f537a105fa0 RCX: 00007f5379eaefc9 [ 1644.066923][T31390] RDX: 0000000000000002 RSI: 00002000000001c0 RDI: 0000000000000003 [ 1644.066993][T31390] RBP: 00007f5378917090 R08: 0000000000000000 R09: 0000000000000000 [ 1644.067026][T31390] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1644.067039][T31390] R13: 00007f537a106038 R14: 00007f537a105fa0 R15: 00007ffd6279b348 [ 1644.067057][T31390] [ 1645.543011][T31441] Â: renamed from pim6reg1 [ 1645.626308][T15118] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1645.660531][T15118] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1645.670488][T15118] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1645.965361][T31453] netlink: 16186 bytes leftover after parsing attributes in process `syz.4.21142'. [ 1646.118013][T31457] netlink: 'syz.8.21144': attribute type 4 has an invalid length. [ 1646.125878][T31457] netlink: 140 bytes leftover after parsing attributes in process `syz.8.21144'. [ 1646.207495][T31465] netlink: 'syz.2.21148': attribute type 10 has an invalid length. [ 1646.215437][T31465] netlink: 55 bytes leftover after parsing attributes in process `syz.2.21148'. [ 1646.246710][T31476] IPv6: Can't replace route, no match found [ 1646.294072][T31474] Q±6ã`Ò˜: renamed from lo (while UP) [ 1646.499196][T31484] netlink: 'syz.2.21156': attribute type 10 has an invalid length. [ 1646.555559][ T29] kauditd_printk_skb: 33 callbacks suppressed [ 1646.555578][ T29] audit: type=1400 audit(1646.619:85846): avc: denied { write } for pid=31490 comm="syz.4.21159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1646.606022][ T29] audit: type=1400 audit(1646.669:85847): avc: denied { create } for pid=31494 comm="syz.0.21160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 1646.902858][ T29] audit: type=1400 audit(1646.969:85848): avc: denied { create } for pid=31517 comm="syz.8.21169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 1647.150441][T31285] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1647.187538][T31532] netlink: 'syz.2.21174': attribute type 39 has an invalid length. [ 1647.240203][T31285] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1647.332560][T31285] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1647.419680][T31550] bridge0: port 2(bridge_slave_1) entered disabled state [ 1647.426919][T31550] bridge0: port 1(bridge_slave_0) entered disabled state [ 1647.434791][T31550] bridge0: entered allmulticast mode [ 1647.444427][T31550] bridge0: port 2(bridge_slave_1) entered blocking state [ 1647.451613][T31550] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1647.458909][T31550] bridge0: port 1(bridge_slave_0) entered blocking state [ 1647.465963][T31550] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1647.474100][T31550] bridge0: entered promiscuous mode [ 1647.939776][ T29] audit: type=1400 audit(1648.009:85849): avc: denied { write } for pid=31559 comm="syz.2.21187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 1648.203540][T31579] netlink: 4 bytes leftover after parsing attributes in process `syz.2.21192'. [ 1648.391833][T31595] netlink: 16399 bytes leftover after parsing attributes in process `syz.8.21199'. [ 1648.775922][T31621] lo speed is unknown, defaulting to 1000 [ 1648.812886][T31621] lo speed is unknown, defaulting to 1000 [ 1649.038390][T31645] netlink: 'syz.4.21218': attribute type 21 has an invalid length. [ 1649.050582][T31645] netlink: 132 bytes leftover after parsing attributes in process `syz.4.21218'. [ 1649.122318][ T29] audit: type=1400 audit(1649.189:85850): avc: denied { read } for pid=31656 comm="syz.0.21224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 1649.163272][ T29] audit: type=1400 audit(1649.219:85851): avc: denied { create } for pid=31650 comm="syz.2.21221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 1649.183454][ T29] audit: type=1400 audit(1649.249:85852): avc: denied { setopt } for pid=31650 comm="syz.2.21221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 1649.215019][T31650] delete_channel: no stack [ 1649.231210][T31664] pimreg1: tun_chr_ioctl cmd 21731 [ 1649.438637][T31685] netlink: 'syz.2.21237': attribute type 10 has an invalid length. [ 1649.532578][T31693] netlink: 126588 bytes leftover after parsing attributes in process `syz.2.21239'. [ 1649.611151][T31702] netlink: 'syz.0.21244': attribute type 25 has an invalid length. [ 1649.619551][T31702] netlink: 'syz.0.21244': attribute type 1 has an invalid length. [ 1649.627435][T31702] bridge0: port 1(bridge_slave_0) entered learning state [ 1649.643391][T15118] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1649.677321][T15118] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1649.695812][T15118] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1649.710499][T31710] netlink: 'syz.8.21248': attribute type 3 has an invalid length. [ 1649.718468][T31710] netlink: 132 bytes leftover after parsing attributes in process `syz.8.21248'. [ 1649.727842][T15118] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1649.741248][T31716] bridge0: port 2(bridge_slave_1) entered disabled state [ 1649.748461][T31716] bridge0: port 1(bridge_slave_0) entered disabled state [ 1649.758009][T31716] bridge0: left promiscuous mode [ 1649.765764][T31716] bridge0: port 2(bridge_slave_1) entered blocking state [ 1649.772876][T31716] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1649.780259][T31716] bridge0: port 1(bridge_slave_0) entered blocking state [ 1649.787614][T31716] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1649.799576][T31716] bridge0: entered promiscuous mode [ 1650.274138][T31769] netlink: 'syz.3.21273': attribute type 10 has an invalid length. [ 1650.283749][T31769] bridge0: port 2(bridge_slave_1) entered disabled state [ 1650.291113][T31769] bridge0: port 1(bridge_slave_0) entered disabled state [ 1650.356422][T31769] bridge0: port 2(bridge_slave_1) entered blocking state [ 1650.363759][T31769] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1650.371263][T31769] bridge0: port 1(bridge_slave_0) entered blocking state [ 1650.378489][T31769] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1650.408233][T31769] team0: Port device bridge0 added [ 1650.415688][T31773] vcan0: entered promiscuous mode [ 1650.420794][T31773] vcan0: entered allmulticast mode [ 1650.576657][T31796] hsr0: entered promiscuous mode [ 1650.578347][ T29] audit: type=1400 audit(1650.629:85853): avc: denied { write } for pid=31795 comm="syz.2.21286" path="socket:[247830]" dev="sockfs" ino=247830 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 1650.582167][T31796] hsr0: entered allmulticast mode [ 1650.610365][T31796] hsr_slave_0: entered allmulticast mode [ 1650.616077][T31796] hsr_slave_1: entered allmulticast mode [ 1650.698654][T31798] netlink: 40 bytes leftover after parsing attributes in process `syz.2.21286'. [ 1650.849073][ T29] audit: type=1400 audit(1650.909:85854): avc: denied { ioctl } for pid=31795 comm="syz.2.21286" path="/dev/ppp" dev="devtmpfs" ino=140 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 1650.881084][T31796] syz.2.21286 (31796) used obsolete PPPIOCDETACH ioctl [ 1651.172055][ T29] audit: type=1400 audit(1651.229:85855): avc: denied { read } for pid=31827 comm="syz.3.21299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1651.325908][T31845] sctp: [Deprecated]: syz.4.21304 (pid 31845) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1651.325908][T31845] Use struct sctp_sack_info instead [ 1651.364406][T31849] validate_nla: 1 callbacks suppressed [ 1651.364424][T31849] netlink: 'syz.3.21307': attribute type 10 has an invalid length. [ 1651.380286][T31853] netlink: 60 bytes leftover after parsing attributes in process `syz.8.21309'. [ 1651.390250][T31853] netlink: 60 bytes leftover after parsing attributes in process `syz.8.21309'. [ 1651.399878][T31853] netlink: 60 bytes leftover after parsing attributes in process `syz.8.21309'. [ 1651.412495][T31842] netlink: 14 bytes leftover after parsing attributes in process `syz.2.21305'. [ 1651.713110][T32004] delete_channel: no stack [ 1651.719179][T32004] delete_channel: no stack [ 1651.831428][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 1651.831445][ T29] audit: type=1400 audit(1651.889:85857): avc: denied { setopt } for pid=32023 comm="syz.8.21329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 1651.860120][ T29] audit: type=1400 audit(1651.919:85858): avc: denied { write } for pid=32023 comm="syz.8.21329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 1652.308149][T32084] lo speed is unknown, defaulting to 1000 [ 1652.404143][T32084] lo speed is unknown, defaulting to 1000 [ 1652.724182][T32120] netlink: 'syz.0.21373': attribute type 10 has an invalid length. [ 1652.794937][ T29] audit: type=1400 audit(1652.849:85859): avc: denied { relabelfrom } for pid=32118 comm="syz.2.21374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1652.815218][ T29] audit: type=1400 audit(1652.849:85860): avc: denied { relabelto } for pid=32118 comm="syz.2.21374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1653.084031][T32162] netlink: 'syz.4.21394': attribute type 1 has an invalid length. [ 1653.226690][T32184] __nla_validate_parse: 8 callbacks suppressed [ 1653.226706][T32184] netlink: 60 bytes leftover after parsing attributes in process `syz.8.21404'. [ 1653.244079][T32184] netlink: 60 bytes leftover after parsing attributes in process `syz.8.21404'. [ 1653.254098][T32184] netlink: 60 bytes leftover after parsing attributes in process `syz.8.21404'. [ 1653.384031][T32200] netlink: 'syz.8.21409': attribute type 10 has an invalid length. [ 1653.928899][T32229] sctp: [Deprecated]: syz.8.21424 (pid 32229) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1653.928899][T32229] Use struct sctp_sack_info instead [ 1654.021387][ T29] audit: type=1400 audit(1654.079:85861): avc: denied { setopt } for pid=32234 comm="syz.3.21427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1654.051991][T32235] netlink: 'syz.3.21427': attribute type 10 has an invalid length. [ 1654.084467][T32235] hsr_slave_0 (unregistering): left promiscuous mode [ 1654.159038][ T29] audit: type=1400 audit(1654.219:85862): avc: denied { cpu } for pid=32250 comm="syz.3.21436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1654.186605][ T29] audit: type=1400 audit(1654.249:85863): avc: denied { ioctl } for pid=32250 comm="syz.3.21436" path="socket:[249234]" dev="sockfs" ino=249234 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1654.639138][ T29] audit: type=1400 audit(1654.699:85864): avc: denied { read } for pid=32281 comm="syz.8.21450" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 1655.488497][T32401] netlink: 'syz.8.21505': attribute type 10 has an invalid length. [ 1655.496820][T32401] bridge0: port 2(bridge_slave_1) entered disabled state [ 1655.504066][T32401] bridge0: port 1(bridge_slave_0) entered disabled state [ 1655.516237][T32401] bridge0: port 2(bridge_slave_1) entered blocking state [ 1655.523507][T32401] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1655.531088][T32401] bridge0: port 1(bridge_slave_0) entered blocking state [ 1655.538175][T32401] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1655.548802][T32401] bond0: (slave bridge0): Enslaving as an active interface with an up link [ 1655.832239][T32461] netlink: 'syz.0.21535': attribute type 10 has an invalid length. [ 1655.847250][T32461] hsr_slave_0 (unregistering): left promiscuous mode [ 1655.964275][T32473] hsr0: entered promiscuous mode [ 1655.969709][T32473] hsr0: entered allmulticast mode [ 1655.974866][T32473] hsr_slave_1: entered allmulticast mode [ 1656.154852][ T29] audit: type=1400 audit(1656.209:85865): avc: denied { name_bind } for pid=32503 comm="syz.4.21555" src=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=sctp_socket permissive=1 [ 1656.313333][T32530] netlink: 'syz.8.21568': attribute type 10 has an invalid length. [ 1656.321374][T32530] netlink: 65015 bytes leftover after parsing attributes in process `syz.8.21568'. [ 1656.363598][T32537] netlink: 60 bytes leftover after parsing attributes in process `syz.8.21571'. [ 1656.380337][T32537] netlink: 60 bytes leftover after parsing attributes in process `syz.8.21571'. [ 1656.407145][T32537] netlink: 60 bytes leftover after parsing attributes in process `syz.8.21571'. [ 1656.656553][T32585] netlink: 'syz.3.21595': attribute type 10 has an invalid length. [ 1656.836238][T32598] netlink: 'syz.3.21601': attribute type 10 has an invalid length. [ 1657.238504][T32628] netlink: 'syz.3.21614': attribute type 10 has an invalid length. [ 1657.251660][T32628] 8021q: adding VLAN 0 to HW filter on device team0 [ 1657.269098][T32628] bond0: (slave team0): Enslaving as an active interface with an up link [ 1657.402212][T32641] netlink: 'syz.8.21619': attribute type 10 has an invalid length. [ 1658.292907][T32757] netlink: 'syz.0.21674': attribute type 10 has an invalid length. [ 1658.672523][ T320] A link change request failed with some changes committed already. Interface Q±6ã`Ò˜ may have been left with an inconsistent configuration, please check. [ 1658.900496][ T29] audit: type=1400 audit(1658.959:85866): avc: denied { read } for pid=348 comm="syz.8.21701" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1659.059278][ T381] sctp: [Deprecated]: syz.3.21715 (pid 381) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1659.059278][ T381] Use struct sctp_sack_info instead [ 1659.233235][ T412] bridge0: entered promiscuous mode [ 1659.238538][ T412] bridge0: entered allmulticast mode [ 1659.319840][ T429] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1659.383276][ T429] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1659.395662][ T433] sctp: [Deprecated]: syz.0.21741 (pid 433) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1659.395662][ T433] Use struct sctp_sack_info instead [ 1659.449886][ T429] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1659.455907][ T444] nfs: Unknown parameter 'noac ' [ 1659.494095][ T448] netlink: 8 bytes leftover after parsing attributes in process `syz.0.21747'. [ 1659.508681][ T429] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1659.564108][T15103] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1659.580719][T15103] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1659.603528][T15103] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1660.250446][ T465] netlink: 'syz.2.21754': attribute type 10 has an invalid length. [ 1660.357395][ T472] sctp: [Deprecated]: syz.8.21757 (pid 472) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1660.357395][ T472] Use struct sctp_sack_info instead [ 1660.483339][ T483] Ÿë: port 1(veth0_to_team) entered blocking state [ 1660.491039][ T483] Ÿë: port 1(veth0_to_team) entered disabled state [ 1660.498440][ T483] veth0_to_team: entered allmulticast mode [ 1660.509447][ T483] veth0_to_team: entered promiscuous mode [ 1660.695291][ T504] netlink: 8 bytes leftover after parsing attributes in process `syz.8.21771'. [ 1660.744101][ T510] sctp: [Deprecated]: syz.8.21773 (pid 510) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1660.744101][ T510] Use struct sctp_sack_info instead [ 1660.819846][ T522] SELinux: policydb version 0 does not match my version range 15-35 [ 1660.828266][ T522] SELinux: failed to load policy [ 1660.894924][ T536] netlink: 'syz.8.21786': attribute type 10 has an invalid length. [ 1660.932960][ T542] tipc: Enabled bearer , priority 0 [ 1660.941816][ T542] tipc: Resetting bearer [ 1660.949248][ T541] tipc: Disabling bearer [ 1661.045873][ T545] atomic_op ffff888133368d28 conn xmit_atomic 0000000000000000 [ 1661.121399][ T565] netlink: 'syz.0.21800': attribute type 10 has an invalid length. [ 1661.133568][ T567] SELinux: policydb version 0 does not match my version range 15-35 [ 1661.143085][ T567] SELinux: failed to load policy [ 1661.222236][ T583] netlink: 8 bytes leftover after parsing attributes in process `syz.0.21809'. [ 1661.238536][ T434] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1661.299779][ T434] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1661.352626][ T434] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1661.398781][ T606] SELinux: policydb version 0 does not match my version range 15-35 [ 1661.407211][ T606] SELinux: failed to load policy [ 1661.649018][ T638] SELinux: policydb version 0 does not match my version range 15-35 [ 1661.657621][ T638] SELinux: failed to load policy [ 1661.754807][ T661] netlink: 8 bytes leftover after parsing attributes in process `syz.8.21844'. [ 1661.836184][ T677] pim6reg: entered allmulticast mode [ 1661.846426][ T677] pim6reg: left allmulticast mode [ 1661.988120][ T692] netlink: 8 bytes leftover after parsing attributes in process `syz.2.21859'. [ 1662.373696][ T735] syzkaller0: entered promiscuous mode [ 1662.379317][ T735] syzkaller0: entered allmulticast mode [ 1662.721966][ T7584] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1662.733890][ T7584] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1662.761302][T15103] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1662.776591][T15103] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1662.831666][ T762] atomic_op ffff888140b50d28 conn xmit_atomic 0000000000000000 [ 1662.844076][ T769] syzkaller0: entered promiscuous mode [ 1662.849753][ T769] syzkaller0: entered allmulticast mode [ 1662.940686][ T785] netlink: 'syz.3.21902': attribute type 10 has an invalid length. [ 1663.056345][ T797] atomic_op ffff888140b52d28 conn xmit_atomic 0000000000000000 [ 1663.202624][ T815] netlink: 8 bytes leftover after parsing attributes in process `syz.2.21915'. [ 1663.245434][ T817] netlink: 'syz.8.21916': attribute type 10 has an invalid length. [ 1663.479393][ T841] netlink: 8 bytes leftover after parsing attributes in process `syz.0.21927'. [ 1663.819268][ T873] netlink: 8 bytes leftover after parsing attributes in process `syz.2.21942'. [ 1663.841001][ T874] syz_tun: entered allmulticast mode [ 1663.980488][ T902] netlink: 8 bytes leftover after parsing attributes in process `syz.4.21954'. [ 1664.426182][ T947] netlink: 'syz.8.21976': attribute type 10 has an invalid length. [ 1664.543473][ T955] syzkaller0: entered promiscuous mode [ 1664.549123][ T955] syzkaller0: entered allmulticast mode [ 1664.846723][ T977] pim6reg: entered allmulticast mode [ 1664.854110][ T977] pim6reg: left allmulticast mode [ 1665.119006][ T1011] syzkaller0: entered promiscuous mode [ 1665.124520][ T1011] syzkaller0: entered allmulticast mode [ 1665.387883][ T1045] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 1665.427786][ T1044] atomic_op ffff8881049ead28 conn xmit_atomic 0000000000000000 [ 1665.578765][ T1062] atomic_op ffff8881049ead28 conn xmit_atomic 0000000000000000 [ 1665.648982][ T1068] pim6reg: entered allmulticast mode [ 1665.654925][ T1068] pim6reg: left allmulticast mode [ 1665.823756][ T1086] atomic_op ffff888140b52128 conn xmit_atomic 0000000000000000 [ 1666.023258][ T1104] atomic_op ffff888140b52128 conn xmit_atomic 0000000000000000 [ 1666.413927][ T1164] atomic_op ffff8881049ead28 conn xmit_atomic 0000000000000000 [ 1666.544216][ T1177] pim6reg: entered allmulticast mode [ 1666.557242][ T1177] pim6reg: left allmulticast mode [ 1667.049842][ T1258] atomic_op ffff8881049eb528 conn xmit_atomic 0000000000000000 [ 1667.089806][ T1262] atomic_op ffff888140b50d28 conn xmit_atomic 0000000000000000 [ 1667.136910][ T1247] lo speed is unknown, defaulting to 1000 [ 1667.201446][ T1247] lo speed is unknown, defaulting to 1000 [ 1667.320370][ T1247] chnl_net:caif_netlink_parms(): no params data found [ 1667.342243][ T1299] 9pnet_fd: Insufficient options for proto=fd [ 1667.393028][ T1247] bridge0: port 1(bridge_slave_0) entered blocking state [ 1667.400200][ T1247] bridge0: port 1(bridge_slave_0) entered disabled state [ 1667.414215][ T1247] bridge_slave_0: entered allmulticast mode [ 1667.429568][ T1247] bridge_slave_0: entered promiscuous mode [ 1667.436224][ T1309] bridge0: entered promiscuous mode [ 1667.446225][ T1247] bridge0: port 2(bridge_slave_1) entered blocking state [ 1667.453317][ T1247] bridge0: port 2(bridge_slave_1) entered disabled state [ 1667.471665][ T1247] bridge_slave_1: entered allmulticast mode [ 1667.485463][ T1247] bridge_slave_1: entered promiscuous mode [ 1667.498756][ T1309] bridge0: left promiscuous mode [ 1667.537463][ T1247] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1667.556859][ T1247] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1667.613111][ T1247] team0: Port device team_slave_0 added [ 1667.627663][ T1247] team0: Port device team_slave_1 added [ 1667.654987][ T1327] atomic_op ffff8881049ebd28 conn xmit_atomic 0000000000000000 [ 1667.677286][ T1247] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1667.684271][ T1247] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1667.710233][ T1247] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1667.729359][ T1247] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1667.736505][ T1247] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1667.762581][ T1247] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1667.830213][ T1247] hsr_slave_0: entered promiscuous mode [ 1667.838932][ T1247] hsr_slave_1: entered promiscuous mode [ 1667.845063][ T1247] debugfs: 'hsr0' already exists in 'hsr' [ 1667.850880][ T1247] Cannot create hsr debugfs directory [ 1667.915844][ T1357] atomic_op ffff8881049e9928 conn xmit_atomic 0000000000000000 [ 1667.959997][ T1247] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1667.993645][ T1375] syz_tun: entered allmulticast mode [ 1668.109480][ T1247] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1668.189159][ T1247] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1668.239822][ T1247] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1668.255921][ T1407] 9pnet_fd: Insufficient options for proto=fd [ 1668.372398][ T1247] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 1668.445700][ T1247] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 1668.481196][ T1247] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1668.509466][ T1247] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 1668.769252][ T1247] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1668.818624][ T1247] 8021q: adding VLAN 0 to HW filter on device team0 [ 1668.843627][T15118] bridge0: port 1(bridge_slave_0) entered blocking state [ 1668.850799][T15118] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1668.877330][T15118] bridge0: port 2(bridge_slave_1) entered blocking state [ 1668.884406][T15118] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1668.909930][ T1454] atomic_op ffff8881049e9d28 conn xmit_atomic 0000000000000000 [ 1668.918284][ T1450] netlink: 8 bytes leftover after parsing attributes in process `syz.8.22198'. [ 1669.028569][ T1247] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1669.110952][ T1489] syzkaller0: entered promiscuous mode [ 1669.116543][ T1489] syzkaller0: entered allmulticast mode [ 1669.229522][ T1247] veth0_vlan: entered promiscuous mode [ 1669.245368][ T1247] veth1_vlan: entered promiscuous mode [ 1669.275380][ T1247] veth0_macvtap: entered promiscuous mode [ 1669.284127][ T1247] veth1_macvtap: entered promiscuous mode [ 1669.295766][ T1247] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1669.314388][ T1247] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1669.331311][T15103] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1669.347877][T15103] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1669.375311][T15103] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1669.408170][T15103] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1669.419343][ T29] audit: type=1400 audit(1669.460:85867): avc: denied { write } for pid=1247 comm="syz-executor" name="cgroup.procs" dev="cgroup" ino=200 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:netutils_exec_t:s0" [ 1669.446218][ T29] audit: type=1400 audit(1669.460:85868): avc: denied { open } for pid=1247 comm="syz-executor" path="/syzcgroup/cpu/syz4/cgroup.procs" dev="cgroup" ino=200 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:netutils_exec_t:s0" [ 1669.646948][ T1566] pim6reg: entered allmulticast mode [ 1669.660413][ T1564] pim6reg: left allmulticast mode [ 1669.921217][ T1594] netlink: 8 bytes leftover after parsing attributes in process `syz.2.22250'. [ 1669.985907][ T1601] atomic_op ffff8881049ea928 conn xmit_atomic 0000000000000000 [ 1670.061463][ T1608] pim6reg: entered allmulticast mode [ 1670.081330][ T1606] pim6reg: left allmulticast mode [ 1670.107678][ T1616] syzkaller0: entered promiscuous mode [ 1670.113218][ T1616] syzkaller0: entered allmulticast mode [ 1670.172897][ T1622] netlink: 8 bytes leftover after parsing attributes in process `syz.0.22264'. [ 1670.244158][ T1639] netlink: 40 bytes leftover after parsing attributes in process `syz.3.22272'. [ 1670.305908][ T1651] netlink: 8 bytes leftover after parsing attributes in process `syz.2.22278'. [ 1670.418351][ T1670] netlink: 20 bytes leftover after parsing attributes in process `syz.2.22287'. [ 1670.427488][ T1670] netlink: 20 bytes leftover after parsing attributes in process `syz.2.22287'. [ 1670.606833][ T1697] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 1670.630131][ T1700] netlink: 20 bytes leftover after parsing attributes in process `syz.3.22301'. [ 1670.639237][ T1700] netlink: 20 bytes leftover after parsing attributes in process `syz.3.22301'. [ 1670.772767][ T1713] atomic_op ffff8881049e9d28 conn xmit_atomic 0000000000000000 [ 1670.815837][ T1715] bond1: ARP target 9.0.0.0 is already present [ 1670.822075][ T1715] bond1: option arp_ip_target: invalid value (9) [ 1670.831760][ T1715] bond1 (unregistering): Released all slaves [ 1670.997249][ T1734] netlink: 20 bytes leftover after parsing attributes in process `syz.3.22316'. [ 1671.059459][ T1740] atomic_op ffff8881049e9d28 conn xmit_atomic 0000000000000000 [ 1671.317756][ T1758] atomic_op ffff888118359d28 conn xmit_atomic 0000000000000000 [ 1671.400805][ T1763] netdevsim netdevsim2 eth3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1671.410657][ T1763] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1671.458179][ T1763] netdevsim netdevsim2 eth2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1671.468314][ T1763] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1671.529660][ T1763] netdevsim netdevsim2 eth1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1671.539488][ T1763] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1671.638589][ T1763] netdevsim netdevsim2 eth0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1671.648648][ T1763] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1671.735236][ T7584] netdevsim netdevsim2 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 1671.743548][ T7584] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1671.766539][ T1785] atomic_op ffff888118358128 conn xmit_atomic 0000000000000000 [ 1671.774620][ T7584] netdevsim netdevsim2 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 1671.782833][ T7584] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1671.811338][ T7584] netdevsim netdevsim2 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 1671.819564][ T7584] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1671.998756][ T1808] bridge0: entered promiscuous mode [ 1672.004085][ T1808] bridge0: left promiscuous mode [ 1672.193444][ T1825] netlink: 'syz.4.22359': attribute type 10 has an invalid length. [ 1672.246851][ T1829] 9pnet_fd: Insufficient options for proto=fd [ 1672.313530][ T1833] bridge0: entered promiscuous mode [ 1672.319487][ T1833] bridge0: left promiscuous mode [ 1672.359799][ T1837] netlink: 'syz.3.22365': attribute type 10 has an invalid length. [ 1672.549543][ T1851] 9pnet_fd: Insufficient options for proto=fd [ 1672.567928][ T1853] atomic_op ffff8881049e9128 conn xmit_atomic 0000000000000000 [ 1672.611746][ T1859] bridge0: entered promiscuous mode [ 1672.617408][ T1859] bridge0: left promiscuous mode [ 1672.644378][ T1862] pim6reg: entered allmulticast mode [ 1672.653094][ T1862] pim6reg: left allmulticast mode [ 1672.740521][ T1875] 9pnet_fd: Insufficient options for proto=fd [ 1672.806969][ T1884] netlink: 'syz.3.22388': attribute type 10 has an invalid length. [ 1672.997239][ T1915] netlink: 'syz.3.22403': attribute type 10 has an invalid length. [ 1673.009035][ T1917] bridge0: entered promiscuous mode [ 1673.014460][ T1917] bridge0: left promiscuous mode [ 1673.093455][ T1928] atomic_op ffff8881023fed28 conn xmit_atomic 0000000000000000 [ 1673.172992][ T1940] 9pnet_fd: Insufficient options for proto=fd [ 1673.431482][ T1966] 9pnet_fd: Insufficient options for proto=fd [ 1673.487547][ T1768] netdevsim netdevsim2 eth2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1673.497494][ T1768] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1673.563304][ T1768] netdevsim netdevsim2 eth1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1673.573299][ T1768] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1673.622625][ T1768] netdevsim netdevsim2 eth0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1673.632610][ T1768] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1673.712121][ T1986] syzkaller0: entered promiscuous mode [ 1673.717655][ T1986] syzkaller0: entered allmulticast mode [ 1673.771371][ T1992] 9pnet_fd: Insufficient options for proto=fd [ 1673.885308][ T2012] bridge0: entered promiscuous mode [ 1673.890936][ T2012] bridge0: left promiscuous mode [ 1673.937002][ T2017] 9pnet_fd: Insufficient options for proto=fd [ 1674.096577][ T2025] atomic_op ffff8881023ff528 conn xmit_atomic 0000000000000000 [ 1674.147917][ T2038] 9pnet_fd: Insufficient options for proto=fd [ 1674.317064][ T2065] 9pnet_fd: Insufficient options for proto=fd [ 1674.491888][ T2093] 9pnet_fd: Insufficient options for proto=fd [ 1674.640006][ T2107] netlink: 'syz.0.22494': attribute type 10 has an invalid length. [ 1674.691073][ T2117] netlink: 'syz.4.22500': attribute type 10 has an invalid length. [ 1675.031834][ T2189] bridge0: entered promiscuous mode [ 1675.037463][ T2189] bridge0: left promiscuous mode [ 1675.112044][ T7556] netdevsim netdevsim2 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 1675.120300][ T7556] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1675.140734][ T7556] netdevsim netdevsim2 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 1675.149055][ T7556] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1675.164579][ T7556] netdevsim netdevsim2 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 1675.172850][ T7556] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1675.189177][ T7556] netdevsim netdevsim2 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 1675.199285][ T7556] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1675.233349][ T2211] syzkaller0: entered promiscuous mode [ 1675.238920][ T2211] syzkaller0: entered allmulticast mode [ 1675.366052][ T2244] bridge0: entered promiscuous mode [ 1675.371640][ T2244] bridge0: left promiscuous mode [ 1675.438154][ T2258] tipc: Enabling of bearer rejected, failed to enable media [ 1675.447515][ T2258] syzkaller0: entered promiscuous mode [ 1675.453020][ T2258] syzkaller0: entered allmulticast mode [ 1675.691913][ T2291] sctp: [Deprecated]: syz.2.22586 (pid 2291) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1675.691913][ T2291] Use struct sctp_sack_info instead [ 1675.984261][ T2320] atomic_op ffff88813608e928 conn xmit_atomic 0000000000000000 [ 1676.280830][ T2348] atomic_op ffff8881023fd128 conn xmit_atomic 0000000000000000 [ 1676.290495][ T2336] atomic_op ffff8881023ff528 conn xmit_atomic 0000000000000000 [ 1676.400074][ T2362] nfs: Unknown parameter 'noac ' [ 1676.615629][ T2386] netlink: 'syz.4.22633': attribute type 10 has an invalid length. [ 1676.786026][ T2402] netlink: 'syz.4.22640': attribute type 10 has an invalid length. [ 1677.444554][ T2471] nfs: Unknown parameter 'noac ' [ 1677.476304][ T2478] syz_tun: entered allmulticast mode [ 1677.547616][ T2487] tipc: Enabling of bearer rejected, failed to enable media [ 1677.556738][ T2487] syzkaller0: entered promiscuous mode [ 1677.562711][ T2487] syzkaller0: entered allmulticast mode [ 1677.886229][ T2508] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1677.898547][ T2510] tipc: Enabling of bearer rejected, failed to enable media [ 1677.908165][ T2510] syzkaller0: entered promiscuous mode [ 1677.914119][ T2510] syzkaller0: entered allmulticast mode [ 1677.931236][ T2508] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1678.010617][ T2508] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1678.077702][ T2508] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1678.139413][ T7556] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1678.151367][ T7556] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1678.171690][ T8336] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1678.189314][ T8336] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1678.201179][ T2513] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1678.277837][ T2513] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1678.316800][ T2535] bridge0: entered promiscuous mode [ 1678.336156][ T2535] bridge0: left promiscuous mode [ 1678.357690][ T2513] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1678.408018][ T2513] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1678.519078][ T2557] nfs: Unknown parameter 'noac ' [ 1678.608151][ T2559] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 1679.133347][ T2576] atomic_op ffff8881023fc928 conn xmit_atomic 0000000000000000 [ 1679.499656][ T2603] bridge0: entered promiscuous mode [ 1679.505821][ T2603] bridge0: left promiscuous mode [ 1679.523277][ T2605] syzkaller0: entered promiscuous mode [ 1679.529105][ T2605] syzkaller0: entered allmulticast mode [ 1679.741778][ T2627] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 1679.753636][ T2627] __nla_validate_parse: 1 callbacks suppressed [ 1679.753651][ T2627] netlink: 60 bytes leftover after parsing attributes in process `syz.8.22743'. [ 1679.791104][ T2629] bridge0: entered promiscuous mode [ 1679.796664][ T2629] bridge0: left promiscuous mode [ 1679.948777][ T2635] atomic_op ffff8881023fe928 conn xmit_atomic 0000000000000000 [ 1680.104408][ T2644] FAULT_INJECTION: forcing a failure. [ 1680.104408][ T2644] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1680.117567][ T2644] CPU: 1 UID: 0 PID: 2644 Comm: syz.0.22750 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1680.117664][ T2644] Tainted: [W]=WARN [ 1680.117672][ T2644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1680.117687][ T2644] Call Trace: [ 1680.117696][ T2644] [ 1680.117705][ T2644] __dump_stack+0x1d/0x30 [ 1680.117733][ T2644] dump_stack_lvl+0xe8/0x140 [ 1680.117763][ T2644] dump_stack+0x15/0x1b [ 1680.117814][ T2644] should_fail_ex+0x265/0x280 [ 1680.117838][ T2644] should_fail+0xb/0x20 [ 1680.117856][ T2644] should_fail_usercopy+0x1a/0x20 [ 1680.117879][ T2644] _copy_from_user+0x1c/0xb0 [ 1680.117910][ T2644] ucma_write+0xd9/0x250 [ 1680.117978][ T2644] ? __pfx_ucma_write+0x10/0x10 [ 1680.118007][ T2644] vfs_write+0x269/0x960 [ 1680.118076][ T2644] ? __rcu_read_unlock+0x4f/0x70 [ 1680.118108][ T2644] ? __fget_files+0x184/0x1c0 [ 1680.118147][ T2644] ksys_write+0xda/0x1a0 [ 1680.118247][ T2644] __x64_sys_write+0x40/0x50 [ 1680.118277][ T2644] x64_sys_call+0x2802/0x3000 [ 1680.118301][ T2644] do_syscall_64+0xd2/0x200 [ 1680.118324][ T2644] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1680.118357][ T2644] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1680.118416][ T2644] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1680.118442][ T2644] RIP: 0033:0x7f5379eaefc9 [ 1680.118459][ T2644] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1680.118492][ T2644] RSP: 002b:00007f53788f6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1680.118517][ T2644] RAX: ffffffffffffffda RBX: 00007f537a106090 RCX: 00007f5379eaefc9 [ 1680.118529][ T2644] RDX: 0000000000000065 RSI: 0000200000000180 RDI: 0000000000000004 [ 1680.118541][ T2644] RBP: 00007f53788f6090 R08: 0000000000000000 R09: 0000000000000000 [ 1680.118555][ T2644] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1680.118570][ T2644] R13: 00007f537a106128 R14: 00007f537a106090 R15: 00007ffd6279b348 [ 1680.118609][ T2644] [ 1680.440636][ T2646] vlan2: entered allmulticast mode [ 1680.550183][ T2653] netlink: 'syz.0.22754': attribute type 10 has an invalid length. [ 1680.767164][ T2677] syzkaller0: entered promiscuous mode [ 1680.772705][ T2677] syzkaller0: entered allmulticast mode [ 1680.796135][ T8568] IPVS: starting estimator thread 0... [ 1680.813701][ T2683] netlink: 'syz.4.22769': attribute type 10 has an invalid length. [ 1680.895678][ T2684] IPVS: using max 2832 ests per chain, 141600 per kthread [ 1680.920933][ T2696] netlink: 8 bytes leftover after parsing attributes in process `syz.4.22775'. [ 1680.951067][ T29] audit: type=1326 audit(1681.011:85869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2701 comm="syz.8.22778" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39b46cefc9 code=0x7ffc0000 [ 1680.974343][ T29] audit: type=1326 audit(1681.011:85870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2701 comm="syz.8.22778" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39b46cefc9 code=0x7ffc0000 [ 1680.997556][ T29] audit: type=1326 audit(1681.011:85871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2701 comm="syz.8.22778" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f39b46cefc9 code=0x7ffc0000 [ 1681.020829][ T29] audit: type=1326 audit(1681.011:85872): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2701 comm="syz.8.22778" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39b46cefc9 code=0x7ffc0000 [ 1681.044303][ T29] audit: type=1326 audit(1681.011:85873): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2701 comm="syz.8.22778" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f39b46cefc9 code=0x7ffc0000 [ 1681.067403][ T29] audit: type=1326 audit(1681.011:85874): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2701 comm="syz.8.22778" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39b46cefc9 code=0x7ffc0000 [ 1681.090640][ T29] audit: type=1326 audit(1681.011:85875): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2701 comm="syz.8.22778" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f39b46cefc9 code=0x7ffc0000 [ 1681.113791][ T29] audit: type=1326 audit(1681.011:85876): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2701 comm="syz.8.22778" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39b46cefc9 code=0x7ffc0000 [ 1681.136913][ T29] audit: type=1326 audit(1681.011:85877): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2701 comm="syz.8.22778" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f39b46cefc9 code=0x7ffc0000 [ 1681.159955][ T29] audit: type=1326 audit(1681.011:85878): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2701 comm="syz.8.22778" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39b46cefc9 code=0x7ffc0000 [ 1681.185753][ T2709] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 1681.262722][ T2715] syzkaller0: entered promiscuous mode [ 1681.268538][ T2715] syzkaller0: entered allmulticast mode [ 1681.275942][ T2721] tipc: Enabling of bearer rejected, media not registered [ 1681.286640][ T2721] netlink: 68 bytes leftover after parsing attributes in process `syz.4.22785'. [ 1681.312994][ T2723] netlink: 'syz.4.22786': attribute type 10 has an invalid length. [ 1681.422224][ T2732] netlink: 8 bytes leftover after parsing attributes in process `syz.4.22790'. [ 1681.509458][ T2739] binfmt_misc: register: failed to install interpreter file ./file2 [ 1681.561276][ T2745] FAULT_INJECTION: forcing a failure. [ 1681.561276][ T2745] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1681.574428][ T2745] CPU: 0 UID: 0 PID: 2745 Comm: syz.0.22796 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1681.574577][ T2745] Tainted: [W]=WARN [ 1681.574585][ T2745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1681.574598][ T2745] Call Trace: [ 1681.574605][ T2745] [ 1681.574613][ T2745] __dump_stack+0x1d/0x30 [ 1681.574637][ T2745] dump_stack_lvl+0xe8/0x140 [ 1681.574657][ T2745] dump_stack+0x15/0x1b [ 1681.574737][ T2745] should_fail_ex+0x265/0x280 [ 1681.574794][ T2745] should_fail+0xb/0x20 [ 1681.574813][ T2745] should_fail_usercopy+0x1a/0x20 [ 1681.574844][ T2745] _copy_from_user+0x1c/0xb0 [ 1681.574869][ T2745] ___sys_sendmsg+0xc1/0x1d0 [ 1681.574916][ T2745] __x64_sys_sendmsg+0xd4/0x160 [ 1681.574943][ T2745] x64_sys_call+0x191e/0x3000 [ 1681.574970][ T2745] do_syscall_64+0xd2/0x200 [ 1681.575071][ T2745] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1681.575112][ T2745] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1681.575153][ T2745] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1681.575177][ T2745] RIP: 0033:0x7f5379eaefc9 [ 1681.575192][ T2745] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1681.575236][ T2745] RSP: 002b:00007f5378917038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1681.575257][ T2745] RAX: ffffffffffffffda RBX: 00007f537a105fa0 RCX: 00007f5379eaefc9 [ 1681.575273][ T2745] RDX: 0000000000000004 RSI: 00002000000004c0 RDI: 0000000000000003 [ 1681.575288][ T2745] RBP: 00007f5378917090 R08: 0000000000000000 R09: 0000000000000000 [ 1681.575302][ T2745] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1681.575317][ T2745] R13: 00007f537a106038 R14: 00007f537a105fa0 R15: 00007ffd6279b348 [ 1681.575338][ T2745] [ 1681.867457][ T2751] netlink: 'syz.0.22799': attribute type 10 has an invalid length. [ 1681.962301][ T2756] syzkaller0: entered promiscuous mode [ 1681.967908][ T2756] syzkaller0: entered allmulticast mode [ 1682.006974][ T2757] FAULT_INJECTION: forcing a failure. [ 1682.006974][ T2757] name failslab, interval 1, probability 0, space 0, times 0 [ 1682.019620][ T2757] CPU: 0 UID: 0 PID: 2757 Comm: syz.4.22798 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1682.019656][ T2757] Tainted: [W]=WARN [ 1682.019695][ T2757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1682.019769][ T2757] Call Trace: [ 1682.019776][ T2757] [ 1682.019785][ T2757] __dump_stack+0x1d/0x30 [ 1682.019811][ T2757] dump_stack_lvl+0xe8/0x140 [ 1682.019836][ T2757] dump_stack+0x15/0x1b [ 1682.019858][ T2757] should_fail_ex+0x265/0x280 [ 1682.019882][ T2757] should_failslab+0x8c/0xb0 [ 1682.019953][ T2757] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 1682.020020][ T2757] ? __alloc_skb+0x101/0x320 [ 1682.020051][ T2757] __alloc_skb+0x101/0x320 [ 1682.020082][ T2757] netlink_alloc_large_skb+0xbf/0xf0 [ 1682.020120][ T2757] netlink_sendmsg+0x3cf/0x6b0 [ 1682.020149][ T2757] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1682.020169][ T2757] __sock_sendmsg+0x145/0x180 [ 1682.020193][ T2757] ____sys_sendmsg+0x31e/0x4e0 [ 1682.020233][ T2757] ___sys_sendmsg+0x17b/0x1d0 [ 1682.020346][ T2757] __x64_sys_sendmsg+0xd4/0x160 [ 1682.020428][ T2757] x64_sys_call+0x191e/0x3000 [ 1682.020451][ T2757] do_syscall_64+0xd2/0x200 [ 1682.020472][ T2757] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1682.020550][ T2757] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1682.020587][ T2757] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1682.020613][ T2757] RIP: 0033:0x7fb56150efc9 [ 1682.020631][ T2757] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1682.020711][ T2757] RSP: 002b:00007fb55ff2d038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1682.020756][ T2757] RAX: ffffffffffffffda RBX: 00007fb561766180 RCX: 00007fb56150efc9 [ 1682.020769][ T2757] RDX: 0000000020000010 RSI: 0000200000000080 RDI: 0000000000000003 [ 1682.020782][ T2757] RBP: 00007fb55ff2d090 R08: 0000000000000000 R09: 0000000000000000 [ 1682.020797][ T2757] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1682.020812][ T2757] R13: 00007fb561766218 R14: 00007fb561766180 R15: 00007ffe062b6f98 [ 1682.020905][ T2757] [ 1682.253146][ T2759] netlink: 8 bytes leftover after parsing attributes in process `syz.8.22802'. [ 1682.337476][ T2767] nfs: Unknown parameter 'noac ' [ 1682.837277][ T2780] netlink: 'syz.2.22810': attribute type 10 has an invalid length. [ 1682.922015][T15118] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1682.936861][T15118] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1682.947911][T15118] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1682.970182][T15118] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1683.007998][ T2797] netlink: '+}[@': attribute type 3 has an invalid length. [ 1683.142275][ T2809] atomic_op ffff8881023ff128 conn xmit_atomic 0000000000000000 [ 1683.170845][ T2812] netlink: 8 bytes leftover after parsing attributes in process `syz.2.22825'. [ 1683.303399][ T2831] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 1683.376037][ T2839] atomic_op ffff8881023ff528 conn xmit_atomic 0000000000000000 [ 1683.398703][ T2837] 9pnet: Could not find request transport: fd [ 1687.155717][ T3061] __dump_stack+0x1d/0x30 [ 1687.155744][ T3061] dump_stack_lvl+0xe8/0x140 [ 1687.155766][ T3061] dump_stack+0x15/0x1b [ 1687.155785][ T3061] should_fail_ex+0x265/0x280 [ 1687.155805][ T3061] should_failslab+0x8c/0xb0 [ 1687.155874][ T3061] kmem_cache_alloc_noprof+0x50/0x480 [ 1687.155908][ T3061] ? getname_flags+0x80/0x3b0 [ 1687.155977][ T3061] getname_flags+0x80/0x3b0 [ 1687.156010][ T3061] user_path_at+0x28/0x130 [ 1687.156031][ T3061] __se_sys_mount+0x25b/0x2e0 [ 1687.156061][ T3061] ? fput+0x8f/0xc0 [ 1687.156126][ T3061] __x64_sys_mount+0x67/0x80 [ 1687.156240][ T3061] x64_sys_call+0x2b51/0x3000 [ 1687.156290][ T3061] do_syscall_64+0xd2/0x200 [ 1687.156309][ T3061] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1687.156408][ T3061] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1687.156563][ T3061] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1687.156589][ T3061] RIP: 0033:0x7f5379eaefc9 [ 1687.156605][ T3061] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1687.156627][ T3061] RSP: 002b:00007f5378917038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1687.156669][ T3061] RAX: ffffffffffffffda RBX: 00007f537a105fa0 RCX: 00007f5379eaefc9 [ 1687.156682][ T3061] RDX: 0000200000000080 RSI: 0000200000000000 RDI: 0000000000000000 [ 1687.156695][ T3061] RBP: 00007f5378917090 R08: 0000200000000300 R09: 0000000000000000 [ 1687.156736][ T3061] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1687.156750][ T3061] R13: 00007f537a106038 R14: 00007f537a105fa0 R15: 00007ffd6279b348 [ 1687.156772][ T3061] [ 1687.540464][ T3073] netlink: 8 bytes leftover after parsing attributes in process `syz.8.22940'. [ 1687.591444][ T3079] bridge0: entered promiscuous mode [ 1687.597040][ T3079] bridge0: left promiscuous mode [ 1687.633119][ T3086] netlink: 'syz.2.22947': attribute type 10 has an invalid length. [ 1687.892866][ T3107] bridge0: entered promiscuous mode [ 1687.898395][ T3107] bridge0: left promiscuous mode [ 1687.961550][ T3113] SELinux: Context system_u:object_r:audisp_remote_exec_t:s0 is not valid (left unmapped). [ 1688.154902][ T3123] netlink: 4 bytes leftover after parsing attributes in process `syz.4.22962'. [ 1688.164685][ T3123] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1688.172225][ T3123] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1688.180401][ T3123] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1688.187905][ T3123] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1688.456011][ T3145] atomic_op ffff88813d7d7128 conn xmit_atomic 0000000000000000 [ 1688.632673][ T3154] nfs: Unknown parameter 'noac ' [ 1688.699962][ T3156] atomic_op ffff8881023fc128 conn xmit_atomic 0000000000000000 [ 1688.918242][ T3165] bridge0: entered promiscuous mode [ 1688.923861][ T3165] bridge0: left promiscuous mode [ 1689.023165][ T3171] atomic_op ffff88813d7d4d28 conn xmit_atomic 0000000000000000 [ 1689.029881][ T3173] netlink: 8 bytes leftover after parsing attributes in process `syz.8.22983'. [ 1689.121592][ T3179] atomic_op ffff88813d7d4d28 conn xmit_atomic 0000000000000000 [ 1689.213627][ T3187] bridge0: entered promiscuous mode [ 1689.219088][ T3187] bridge0: left promiscuous mode [ 1689.369521][ T3195] atomic_op ffff88813d7d7528 conn xmit_atomic 0000000000000000 [ 1689.506663][ T3213] bridge0: entered promiscuous mode [ 1689.511989][ T3213] bridge0: left promiscuous mode [ 1689.546779][ T3217] netlink: 32 bytes leftover after parsing attributes in process `syz.2.23003'. [ 1689.576507][ T3217] netlink: 32 bytes leftover after parsing attributes in process `syz.2.23003'. [ 1689.614267][ T3222] netdevsim netdevsim2 eth3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1689.624312][ T3222] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1689.668207][ T3222] netdevsim netdevsim2 eth2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1689.678186][ T3222] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1689.726860][ T3222] netdevsim netdevsim2 eth1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1689.736672][ T3222] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1689.759145][ T3228] netlink: 24 bytes leftover after parsing attributes in process `syz.8.23008'. [ 1689.778424][ T3228] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=3228 comm=syz.8.23008 [ 1689.847025][ T3222] netdevsim netdevsim2 eth0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1689.856859][ T3222] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1689.867000][ T3234] nfs: Unknown parameter 'noac ' [ 1689.934638][ T7556] netdevsim netdevsim2 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 1689.942918][ T7556] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1689.987241][ T7556] netdevsim netdevsim2 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 1689.995658][ T7556] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1690.003937][ T7556] netdevsim netdevsim2 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 1690.012149][ T7556] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1690.100588][ T3247] FAULT_INJECTION: forcing a failure. [ 1690.100588][ T3247] name failslab, interval 1, probability 0, space 0, times 0 [ 1690.113335][ T3247] CPU: 0 UID: 0 PID: 3247 Comm: syz.3.23017 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1690.113372][ T3247] Tainted: [W]=WARN [ 1690.113380][ T3247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1690.113394][ T3247] Call Trace: [ 1690.113402][ T3247] [ 1690.113411][ T3247] __dump_stack+0x1d/0x30 [ 1690.113437][ T3247] dump_stack_lvl+0xe8/0x140 [ 1690.113524][ T3247] dump_stack+0x15/0x1b [ 1690.113554][ T3247] should_fail_ex+0x265/0x280 [ 1690.113644][ T3247] should_failslab+0x8c/0xb0 [ 1690.113679][ T3247] kmem_cache_alloc_noprof+0x50/0x480 [ 1690.113769][ T3247] ? getname_flags+0x80/0x3b0 [ 1690.113810][ T3247] getname_flags+0x80/0x3b0 [ 1690.113913][ T3247] user_path_at+0x28/0x130 [ 1690.113936][ T3247] __se_sys_mount+0x25b/0x2e0 [ 1690.113964][ T3247] ? fput+0x8f/0xc0 [ 1690.114054][ T3247] __x64_sys_mount+0x67/0x80 [ 1690.114100][ T3247] x64_sys_call+0x2b51/0x3000 [ 1690.114127][ T3247] do_syscall_64+0xd2/0x200 [ 1690.114149][ T3247] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1690.114182][ T3247] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1690.114248][ T3247] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1690.114273][ T3247] RIP: 0033:0x7fe53420efc9 [ 1690.114304][ T3247] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1690.114324][ T3247] RSP: 002b:00007fe532c6f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1690.114345][ T3247] RAX: ffffffffffffffda RBX: 00007fe534465fa0 RCX: 00007fe53420efc9 [ 1690.114359][ T3247] RDX: 00002000000006c0 RSI: 0000200000000680 RDI: 0000000000000000 [ 1690.114373][ T3247] RBP: 00007fe532c6f090 R08: 0000200000000080 R09: 0000000000000000 [ 1690.114463][ T3247] R10: 0000000000008010 R11: 0000000000000246 R12: 0000000000000001 [ 1690.114488][ T3247] R13: 00007fe534466038 R14: 00007fe534465fa0 R15: 00007ffc6cd04e88 [ 1690.114509][ T3247] [ 1690.361128][ T3254] netlink: 4 bytes leftover after parsing attributes in process `syz.3.23020'. [ 1690.625770][ T3273] netlink: 'syz.3.23024': attribute type 16 has an invalid length. [ 1690.633742][ T3273] netlink: 'syz.3.23024': attribute type 17 has an invalid length. [ 1690.655611][ T3273] 8021q: adding VLAN 0 to HW filter on device team0 [ 1690.677309][ T3273] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1690.872808][T29888] syz_tun (unregistering): left allmulticast mode [ 1691.030092][T15103] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1691.076701][ T3311] lo speed is unknown, defaulting to 1000 [ 1691.152803][ T3311] lo speed is unknown, defaulting to 1000 [ 1691.186378][T15103] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1691.276514][T15103] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1691.339672][T15103] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1691.380746][ T3370] nfs: Unknown parameter 'noac ' [ 1691.388082][ T3311] chnl_net:caif_netlink_parms(): no params data found [ 1691.419706][ T29] kauditd_printk_skb: 228 callbacks suppressed [ 1691.419720][ T29] audit: type=1400 audit(1691.481:86301): avc: denied { create } for pid=3374 comm="syz.0.23036" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 1691.449148][T15103] bridge_slave_1: left allmulticast mode [ 1691.451583][ T29] audit: type=1400 audit(1691.511:86302): avc: denied { append } for pid=3374 comm="syz.0.23036" name="virtual_nci" dev="devtmpfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1691.454803][T15103] bridge_slave_1: left promiscuous mode [ 1691.454967][T15103] bridge0: port 2(bridge_slave_1) entered disabled state [ 1691.505870][T15103] bridge_slave_0: left promiscuous mode [ 1691.511620][T15103] bridge0: port 1(bridge_slave_0) entered disabled state [ 1691.520853][T15103] veth0_to_team: left allmulticast mode [ 1691.526467][T15103] veth0_to_team: left promiscuous mode [ 1691.532230][T15103] Ÿë: port 1(veth0_to_team) entered disabled state [ 1691.545798][ T3393] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=3393 comm=syz.0.23038 [ 1691.588878][ T3393] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=3393 comm=syz.0.23038 [ 1691.633410][T15103] bond0 (unregistering): (slave bridge0): Releasing backup interface [ 1691.747485][T15103] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1691.757625][T15103] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1691.767965][T15103] bond0 (unregistering): Released all slaves [ 1691.777197][T15103] bond1 (unregistering): Released all slaves [ 1691.785902][ T3225] netdevsim netdevsim2 eth2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1691.795854][ T3225] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1691.813922][ T3420] pimreg: entered allmulticast mode [ 1691.822783][ T3405] pimreg: left allmulticast mode [ 1691.836656][T15103] tipc: Left network mode [ 1691.849897][ T3311] bridge0: port 1(bridge_slave_0) entered blocking state [ 1691.857421][ T3311] bridge0: port 1(bridge_slave_0) entered disabled state [ 1691.864807][ T3311] bridge_slave_0: entered allmulticast mode [ 1691.875511][ T3311] bridge_slave_0: entered promiscuous mode [ 1691.883964][T15103] hsr_slave_0: left promiscuous mode [ 1691.891477][T15103] hsr_slave_1: left promiscuous mode [ 1691.897850][T15103] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1691.905264][T15103] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1691.912985][T15103] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1691.920580][T15103] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1691.931005][T15103] veth1_vlan: left promiscuous mode [ 1691.936326][T15103] veth0_vlan: left promiscuous mode [ 1691.976076][ T29] audit: type=1326 audit(1692.041:86303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3458 comm="@*" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5379eaefc9 code=0x7ffc0000 [ 1691.998522][ T29] audit: type=1326 audit(1692.041:86304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3458 comm="@*" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5379eaefc9 code=0x7ffc0000 [ 1692.020840][ T29] audit: type=1326 audit(1692.041:86305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3458 comm="@*" exe="/root/syz-executor" sig=0 arch=c000003e syscall=38 compat=0 ip=0x7f5379eaefc9 code=0x7ffc0000 [ 1692.043017][ T29] audit: type=1326 audit(1692.041:86306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3458 comm="@*" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5379eaefc9 code=0x7ffc0000 [ 1692.065565][ T29] audit: type=1326 audit(1692.071:86307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3458 comm="@*" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5379eaefc9 code=0x7ffc0000 [ 1692.113677][ T29] audit: type=1326 audit(1692.171:86308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3462 comm="@*" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5379eaefc9 code=0x7ffc0000 [ 1692.161742][ T29] audit: type=1326 audit(1692.171:86309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3462 comm="@*" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5379eaefc9 code=0x7ffc0000 [ 1692.184536][ T29] audit: type=1326 audit(1692.171:86310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3462 comm="@*" exe="/root/syz-executor" sig=0 arch=c000003e syscall=38 compat=0 ip=0x7f5379eaefc9 code=0x7ffc0000 [ 1692.208110][ T3311] bridge0: port 2(bridge_slave_1) entered blocking state [ 1692.215210][ T3311] bridge0: port 2(bridge_slave_1) entered disabled state [ 1692.224118][ T3311] bridge_slave_1: entered allmulticast mode [ 1692.230988][ T3311] bridge_slave_1: entered promiscuous mode [ 1692.248765][ T3225] netdevsim netdevsim2 eth1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1692.258619][ T3225] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1692.282032][ T3476] FAULT_INJECTION: forcing a failure. [ 1692.282032][ T3476] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1692.295377][ T3476] CPU: 0 UID: 0 PID: 3476 Comm: syz.0.23048 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1692.295455][ T3476] Tainted: [W]=WARN [ 1692.295462][ T3476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1692.295474][ T3476] Call Trace: [ 1692.295480][ T3476] [ 1692.295486][ T3476] __dump_stack+0x1d/0x30 [ 1692.295509][ T3476] dump_stack_lvl+0xe8/0x140 [ 1692.295530][ T3476] dump_stack+0x15/0x1b [ 1692.295575][ T3476] should_fail_ex+0x265/0x280 [ 1692.295598][ T3476] should_fail_alloc_page+0xf2/0x100 [ 1692.295635][ T3476] alloc_pages_bulk_noprof+0xef/0x540 [ 1692.295701][ T3476] copy_splice_read+0xf3/0x660 [ 1692.295731][ T3476] ? __pfx_shmem_file_splice_read+0x10/0x10 [ 1692.295869][ T3476] splice_direct_to_actor+0x290/0x680 [ 1692.295898][ T3476] ? __pfx_direct_splice_actor+0x10/0x10 [ 1692.295928][ T3476] do_splice_direct+0xda/0x150 [ 1692.295989][ T3476] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 1692.296023][ T3476] do_sendfile+0x380/0x650 [ 1692.296108][ T3476] __x64_sys_sendfile64+0x105/0x150 [ 1692.296141][ T3476] x64_sys_call+0x2bb4/0x3000 [ 1692.296243][ T3476] do_syscall_64+0xd2/0x200 [ 1692.296263][ T3476] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1692.296357][ T3476] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1692.296402][ T3476] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1692.296424][ T3476] RIP: 0033:0x7f5379eaefc9 [ 1692.296439][ T3476] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1692.296457][ T3476] RSP: 002b:00007f5378917038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 1692.296551][ T3476] RAX: ffffffffffffffda RBX: 00007f537a105fa0 RCX: 00007f5379eaefc9 [ 1692.296564][ T3476] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000003 [ 1692.296577][ T3476] RBP: 00007f5378917090 R08: 0000000000000000 R09: 0000000000000000 [ 1692.296590][ T3476] R10: 0000000800000009 R11: 0000000000000246 R12: 0000000000000001 [ 1692.296604][ T3476] R13: 00007f537a106038 R14: 00007f537a105fa0 R15: 00007ffd6279b348 [ 1692.296624][ T3476] [ 1692.299153][ T3311] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1692.515544][ T3311] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1692.548835][ T3311] team0: Port device team_slave_0 added [ 1692.555469][ T3225] netdevsim netdevsim2 eth0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1692.565292][ T3225] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1692.587989][ T3311] team0: Port device team_slave_1 added [ 1692.619492][ T3493] nfs: Unknown parameter 'noac ' [ 1692.631414][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1692.638439][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1692.664585][ T3311] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1692.684061][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1692.691233][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1692.717481][ T3311] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1692.728676][ T3498] netlink: 12 bytes leftover after parsing attributes in process `syz.0.23058'. [ 1692.749398][ T3311] hsr_slave_0: entered promiscuous mode [ 1692.755817][ T3311] hsr_slave_1: entered promiscuous mode [ 1692.766510][ T3500] netlink: 4 bytes leftover after parsing attributes in process `syz.0.23059'. [ 1692.776050][ T3500] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1692.783428][ T3500] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1692.791132][ T3500] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1692.798525][ T3500] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1692.939072][ T3513] netlink: 8 bytes leftover after parsing attributes in process `syz.4.23066'. [ 1692.967562][T15103] IPVS: stop unused estimator thread 0... [ 1693.003009][ T3525] FAULT_INJECTION: forcing a failure. [ 1693.003009][ T3525] name failslab, interval 1, probability 0, space 0, times 0 [ 1693.015897][ T3525] CPU: 1 UID: 0 PID: 3525 Comm: syz.4.23071 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1693.016003][ T3525] Tainted: [W]=WARN [ 1693.016011][ T3525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1693.016034][ T3525] Call Trace: [ 1693.016040][ T3525] [ 1693.016048][ T3525] __dump_stack+0x1d/0x30 [ 1693.016070][ T3525] dump_stack_lvl+0xe8/0x140 [ 1693.016094][ T3525] dump_stack+0x15/0x1b [ 1693.016172][ T3525] should_fail_ex+0x265/0x280 [ 1693.016194][ T3525] should_failslab+0x8c/0xb0 [ 1693.016286][ T3525] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 1693.016318][ T3525] ? __alloc_skb+0x101/0x320 [ 1693.016412][ T3525] __alloc_skb+0x101/0x320 [ 1693.016441][ T3525] ? audit_log_start+0x342/0x720 [ 1693.016498][ T3525] audit_log_start+0x3a0/0x720 [ 1693.016521][ T3525] ? kstrtouint+0x76/0xc0 [ 1693.016542][ T3525] audit_seccomp+0x48/0x100 [ 1693.016561][ T3525] ? __seccomp_filter+0x82d/0x1250 [ 1693.016658][ T3525] __seccomp_filter+0x83e/0x1250 [ 1693.016675][ T3525] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1693.016755][ T3525] ? vfs_write+0x7e8/0x960 [ 1693.016769][ T3525] ? __rcu_read_unlock+0x4f/0x70 [ 1693.016784][ T3525] ? __fget_files+0x184/0x1c0 [ 1693.016801][ T3525] __secure_computing+0x82/0x150 [ 1693.016820][ T3525] syscall_trace_enter+0xcf/0x1e0 [ 1693.016838][ T3525] do_syscall_64+0xac/0x200 [ 1693.016875][ T3525] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1693.016938][ T3525] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1693.016956][ T3525] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1693.016969][ T3525] RIP: 0033:0x7fb56150efc9 [ 1693.016979][ T3525] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1693.016996][ T3525] RSP: 002b:00007fb55ff6f038 EFLAGS: 00000246 ORIG_RAX: 000000000000000c [ 1693.017008][ T3525] RAX: ffffffffffffffda RBX: 00007fb561765fa0 RCX: 00007fb56150efc9 [ 1693.017022][ T3525] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000400000ffc000 [ 1693.017029][ T3525] RBP: 00007fb55ff6f090 R08: 0000000000000000 R09: 0000000000000000 [ 1693.017036][ T3525] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1693.017119][ T3525] R13: 00007fb561766038 R14: 00007fb561765fa0 R15: 00007ffe062b6f98 [ 1693.017130][ T3525] [ 1693.334620][ T3540] FAULT_INJECTION: forcing a failure. [ 1693.334620][ T3540] name failslab, interval 1, probability 0, space 0, times 0 [ 1693.347413][ T3540] CPU: 0 UID: 0 PID: 3540 Comm: syz.4.23078 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1693.347450][ T3540] Tainted: [W]=WARN [ 1693.347497][ T3540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1693.347512][ T3540] Call Trace: [ 1693.347520][ T3540] [ 1693.347530][ T3540] __dump_stack+0x1d/0x30 [ 1693.347553][ T3540] dump_stack_lvl+0xe8/0x140 [ 1693.347575][ T3540] dump_stack+0x15/0x1b [ 1693.347593][ T3540] should_fail_ex+0x265/0x280 [ 1693.347650][ T3540] ? audit_log_d_path+0x8d/0x150 [ 1693.347672][ T3540] should_failslab+0x8c/0xb0 [ 1693.347700][ T3540] __kmalloc_cache_noprof+0x4c/0x4a0 [ 1693.347740][ T3540] audit_log_d_path+0x8d/0x150 [ 1693.347785][ T3540] audit_log_d_path_exe+0x42/0x70 [ 1693.347859][ T3540] audit_log_task+0x1e9/0x250 [ 1693.347899][ T3540] ? kstrtouint+0x76/0xc0 [ 1693.347936][ T3540] audit_seccomp+0x61/0x100 [ 1693.348028][ T3540] ? __seccomp_filter+0x82d/0x1250 [ 1693.348061][ T3540] __seccomp_filter+0x83e/0x1250 [ 1693.348093][ T3540] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1693.348124][ T3540] ? vfs_write+0x7e8/0x960 [ 1693.348163][ T3540] __secure_computing+0x82/0x150 [ 1693.348190][ T3540] syscall_trace_enter+0xcf/0x1e0 [ 1693.348219][ T3540] do_syscall_64+0xac/0x200 [ 1693.348242][ T3540] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1693.348290][ T3540] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1693.348329][ T3540] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1693.348354][ T3540] RIP: 0033:0x7fb56150efc9 [ 1693.348370][ T3540] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1693.348458][ T3540] RSP: 002b:00007fb55ff6f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000094 [ 1693.348476][ T3540] RAX: ffffffffffffffda RBX: 00007fb561765fa0 RCX: 00007fb56150efc9 [ 1693.348489][ T3540] RDX: 0000000000000000 RSI: 0000200000000400 RDI: 0000000000000199 [ 1693.348503][ T3540] RBP: 00007fb55ff6f090 R08: 0000000000000000 R09: 0000000000000000 [ 1693.348517][ T3540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1693.348532][ T3540] R13: 00007fb561766038 R14: 00007fb561765fa0 R15: 00007ffe062b6f98 [ 1693.348550][ T3540] [ 1693.596845][ T3311] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 1693.619341][ T3311] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 1693.658874][ T3311] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 1693.666621][ T3545] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=2 sclass=netlink_xfrm_socket pid=3545 comm=syz.3.23080 [ 1693.670774][ T3311] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 1693.687310][ T3545] netlink: 4 bytes leftover after parsing attributes in process `syz.3.23080'. [ 1693.782950][ T3311] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1693.799095][ T3311] 8021q: adding VLAN 0 to HW filter on device team0 [ 1693.812549][T15103] bridge0: port 1(bridge_slave_0) entered blocking state [ 1693.819658][T15103] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1693.840209][T15103] bridge0: port 2(bridge_slave_1) entered blocking state [ 1693.847358][T15103] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1693.873952][ T3311] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1693.949821][ T3311] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1693.977925][ T3581] tmpfs: Bad value for 'size' [ 1694.023416][ T3584] atomic_op ffff88814189d928 conn xmit_atomic 0000000000000000 [ 1694.144549][ T3311] veth0_vlan: entered promiscuous mode [ 1694.170583][ T3311] veth1_vlan: entered promiscuous mode [ 1694.190144][ T3311] veth0_macvtap: entered promiscuous mode [ 1694.202978][ T3311] veth1_macvtap: entered promiscuous mode [ 1694.216577][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1694.233505][T15076] netdevsim netdevsim2 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 1694.241788][T15076] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1694.251490][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1694.269056][ T3612] atomic_op ffff88814189d528 conn xmit_atomic 0000000000000000 [ 1694.283887][T15104] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1694.306208][T15104] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1694.350871][T15104] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1694.385461][T15104] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1694.404502][ T3627] netlink: 'syz.3.23105': attribute type 1 has an invalid length. [ 1694.435035][ T7538] netdevsim netdevsim2 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 1694.443446][ T7538] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1694.453109][ T3632] FAULT_INJECTION: forcing a failure. [ 1694.453109][ T3632] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1694.466345][ T3632] CPU: 0 UID: 0 PID: 3632 Comm: syz.2.23106 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1694.466441][ T3632] Tainted: [W]=WARN [ 1694.466448][ T3632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1694.466461][ T3632] Call Trace: [ 1694.466468][ T3632] [ 1694.466476][ T3632] __dump_stack+0x1d/0x30 [ 1694.466502][ T3632] dump_stack_lvl+0xe8/0x140 [ 1694.466623][ T3632] dump_stack+0x15/0x1b [ 1694.466641][ T3632] should_fail_ex+0x265/0x280 [ 1694.466661][ T3632] should_fail+0xb/0x20 [ 1694.466677][ T3632] should_fail_usercopy+0x1a/0x20 [ 1694.466702][ T3632] strncpy_from_user+0x25/0x230 [ 1694.466773][ T3632] path_setxattrat+0xeb/0x310 [ 1694.466816][ T3632] __x64_sys_lsetxattr+0x71/0x90 [ 1694.466916][ T3632] x64_sys_call+0x287b/0x3000 [ 1694.466943][ T3632] do_syscall_64+0xd2/0x200 [ 1694.466966][ T3632] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1694.467000][ T3632] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1694.467038][ T3632] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1694.467059][ T3632] RIP: 0033:0x7f5aceaeefc9 [ 1694.467155][ T3632] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1694.467182][ T3632] RSP: 002b:00007f5acd54f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 1694.467205][ T3632] RAX: ffffffffffffffda RBX: 00007f5aced45fa0 RCX: 00007f5aceaeefc9 [ 1694.467221][ T3632] RDX: 0000200000000280 RSI: 0000200000000240 RDI: 00002000000001c0 [ 1694.467236][ T3632] RBP: 00007f5acd54f090 R08: 0000000000000000 R09: 0000000000000000 [ 1694.467251][ T3632] R10: 0000000000001001 R11: 0000000000000246 R12: 0000000000000001 [ 1694.467266][ T3632] R13: 00007f5aced46038 R14: 00007f5aced45fa0 R15: 00007ffe2c77b5a8 [ 1694.467346][ T3632] [ 1694.479342][ T7538] netdevsim netdevsim2 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 1694.658942][ T7538] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1694.968145][ T7538] netdevsim netdevsim2 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 1694.976444][ T7538] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1695.075681][ T3652] atomic_op ffff8881011e4928 conn xmit_atomic 0000000000000000 [ 1695.209868][T15103] Bluetooth: hci0: Frame reassembly failed (-84) [ 1695.252905][ T3660] netlink: 268 bytes leftover after parsing attributes in process `syz.8.23119'. [ 1695.374532][ T3663] lo speed is unknown, defaulting to 1000 [ 1695.383077][T30334] syz_tun (unregistering): left allmulticast mode [ 1695.418687][ T3663] lo speed is unknown, defaulting to 1000 [ 1695.511786][ T3663] chnl_net:caif_netlink_parms(): no params data found [ 1695.668787][ T3663] bridge0: port 1(bridge_slave_0) entered blocking state [ 1695.675984][ T3663] bridge0: port 1(bridge_slave_0) entered disabled state [ 1695.683956][ T3663] bridge_slave_0: entered allmulticast mode [ 1695.690983][ T3663] bridge_slave_0: entered promiscuous mode [ 1695.702848][ T3663] bridge0: port 2(bridge_slave_1) entered blocking state [ 1695.710069][ T3663] bridge0: port 2(bridge_slave_1) entered disabled state [ 1695.717546][ T3663] bridge_slave_1: entered allmulticast mode [ 1695.724142][ T3663] bridge_slave_1: entered promiscuous mode [ 1695.744671][ T3663] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1695.755665][ T3663] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1695.780123][ T3663] team0: Port device team_slave_0 added [ 1695.787517][ T3663] team0: Port device team_slave_1 added [ 1695.810805][ T3663] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1695.817914][ T3663] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1695.843856][ T3663] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1695.855643][ T3663] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1695.862610][ T3663] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1695.888710][ T3663] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1695.905365][ T3694] atomic_op ffff8881049e9128 conn xmit_atomic 0000000000000000 [ 1695.956094][ T3663] hsr_slave_0: entered promiscuous mode [ 1695.972684][ T3663] hsr_slave_1: entered promiscuous mode [ 1695.985094][ T3663] debugfs: 'hsr0' already exists in 'hsr' [ 1695.990848][ T3663] Cannot create hsr debugfs directory [ 1696.021036][ T3701] netlink: 12 bytes leftover after parsing attributes in process `syz.8.23128'. [ 1696.155715][ T3663] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1696.196507][ T3663] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1696.245525][ T3663] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1696.296470][ T3663] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1696.362811][ T3663] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1696.402363][ T3663] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1696.411655][ T3663] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1696.420832][ T3663] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1696.494593][ T29] kauditd_printk_skb: 276 callbacks suppressed [ 1696.494608][ T29] audit: type=1400 audit(1696.551:86585): avc: denied { create } for pid=3718 comm="syz.4.23135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1696.498560][ T3719] ip6t_rpfilter: unknown options [ 1696.559554][ T29] audit: type=1400 audit(1696.621:86586): avc: denied { ioctl } for pid=3718 comm="syz.4.23135" path="socket:[264609]" dev="sockfs" ino=264609 ioctlcmd=0x7452 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 1696.625094][ T3663] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1696.634031][ T29] audit: type=1400 audit(1696.621:86587): avc: denied { create } for pid=3718 comm="syz.4.23135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1696.675582][ T3663] 8021q: adding VLAN 0 to HW filter on device team0 [ 1696.696015][T15103] bridge0: port 1(bridge_slave_0) entered blocking state [ 1696.703101][T15103] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1696.747740][T15104] bridge0: port 2(bridge_slave_1) entered blocking state [ 1696.755025][T15104] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1696.858353][ T3663] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1696.928513][ T3737] atomic_op ffff8881016fe528 conn xmit_atomic 0000000000000000 [ 1696.978164][ T3663] veth0_vlan: entered promiscuous mode [ 1696.990965][ T29] audit: type=1400 audit(1697.051:86588): avc: denied { execute } for pid=3748 comm="syz.8.23142" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=264704 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 1696.992889][ T3663] veth1_vlan: entered promiscuous mode [ 1697.022511][ T29] audit: type=1400 audit(1697.081:86589): avc: denied { setattr } for pid=3748 comm="syz.8.23142" name="[io_uring]" dev="anon_inodefs" ino=265655 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1697.058129][ T3751] sg_write: data in/out 124/1 bytes for SCSI command 0x1c-- guessing data in; [ 1697.058129][ T3751] program syz.3.23141 not setting count and/or reply_len properly [ 1697.075060][ T29] audit: type=1400 audit(1697.121:86590): avc: denied { execute_no_trans } for pid=3750 comm="syz.3.23141" path="/406/file1" dev="tmpfs" ino=2101 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1697.077800][ T3663] veth0_macvtap: entered promiscuous mode [ 1697.098292][ T29] audit: type=1400 audit(1697.121:86591): avc: denied { write } for pid=3750 comm="syz.3.23141" name="sg0" dev="devtmpfs" ino=137 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 1697.127176][ T29] audit: type=1400 audit(1697.121:86592): avc: denied { open } for pid=3750 comm="syz.3.23141" path="/dev/sg0" dev="devtmpfs" ino=137 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 1697.150813][ T29] audit: type=1400 audit(1697.121:86593): avc: denied { ioctl } for pid=3750 comm="syz.3.23141" path="/dev/sg0" dev="devtmpfs" ino=137 ioctlcmd=0x2285 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 1697.177799][ T3663] veth1_macvtap: entered promiscuous mode [ 1697.192495][ T3663] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1697.205273][ T3663] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1697.222423][T15104] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1697.242629][T15104] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1697.255471][T15104] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1697.264604][T15104] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1697.284881][T10394] Bluetooth: hci0: command 0x1003 tx timeout [ 1697.291050][ T3595] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 1697.324336][ T3767] atomic_op ffff8881016ff528 conn xmit_atomic 0000000000000000 [ 1697.338936][ T3768] netlink: 12 bytes leftover after parsing attributes in process `syz.4.23147'. [ 1697.409201][ T3776] FAULT_INJECTION: forcing a failure. [ 1697.409201][ T3776] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1697.422498][ T3776] CPU: 1 UID: 0 PID: 3776 Comm: syz.2.23152 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1697.422537][ T3776] Tainted: [W]=WARN [ 1697.422545][ T3776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1697.422561][ T3776] Call Trace: [ 1697.422567][ T3776] [ 1697.422576][ T3776] __dump_stack+0x1d/0x30 [ 1697.422604][ T3776] dump_stack_lvl+0xe8/0x140 [ 1697.422646][ T3776] dump_stack+0x15/0x1b [ 1697.422668][ T3776] should_fail_ex+0x265/0x280 [ 1697.422691][ T3776] should_fail+0xb/0x20 [ 1697.422711][ T3776] should_fail_usercopy+0x1a/0x20 [ 1697.422808][ T3776] _copy_from_user+0x1c/0xb0 [ 1697.422837][ T3776] ___sys_sendmsg+0xc1/0x1d0 [ 1697.422891][ T3776] __x64_sys_sendmsg+0xd4/0x160 [ 1697.422932][ T3776] x64_sys_call+0x191e/0x3000 [ 1697.422978][ T3776] do_syscall_64+0xd2/0x200 [ 1697.423000][ T3776] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1697.423092][ T3776] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1697.423193][ T3776] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1697.423219][ T3776] RIP: 0033:0x7f5aceaeefc9 [ 1697.423236][ T3776] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1697.423306][ T3776] RSP: 002b:00007f5acd54f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1697.423328][ T3776] RAX: ffffffffffffffda RBX: 00007f5aced45fa0 RCX: 00007f5aceaeefc9 [ 1697.423344][ T3776] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000006 [ 1697.423408][ T3776] RBP: 00007f5acd54f090 R08: 0000000000000000 R09: 0000000000000000 [ 1697.423423][ T3776] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1697.423438][ T3776] R13: 00007f5aced46038 R14: 00007f5aced45fa0 R15: 00007ffe2c77b5a8 [ 1697.423460][ T3776] [ 1697.646103][ T3783] FAULT_INJECTION: forcing a failure. [ 1697.646103][ T3783] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1697.656689][ T3787] netlink: 8 bytes leftover after parsing attributes in process `syz.2.23157'. [ 1697.659973][ T3783] CPU: 1 UID: 0 PID: 3783 Comm: syz.3.23155 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1697.660060][ T3783] Tainted: [W]=WARN [ 1697.660068][ T3783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1697.660082][ T3783] Call Trace: [ 1697.660088][ T3783] [ 1697.660097][ T3783] __dump_stack+0x1d/0x30 [ 1697.660122][ T3783] dump_stack_lvl+0xe8/0x140 [ 1697.660145][ T3783] dump_stack+0x15/0x1b [ 1697.660167][ T3783] should_fail_ex+0x265/0x280 [ 1697.660189][ T3783] should_fail+0xb/0x20 [ 1697.660255][ T3783] should_fail_usercopy+0x1a/0x20 [ 1697.660278][ T3783] _copy_to_user+0x20/0xa0 [ 1697.660307][ T3783] simple_read_from_buffer+0xb5/0x130 [ 1697.660335][ T3783] proc_fail_nth_read+0x10e/0x150 [ 1697.660448][ T3783] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1697.660610][ T3783] vfs_read+0x1a8/0x770 [ 1697.660637][ T3783] ? __rcu_read_unlock+0x4f/0x70 [ 1697.660675][ T3783] ? __fget_files+0x184/0x1c0 [ 1697.660708][ T3783] ksys_read+0xda/0x1a0 [ 1697.660737][ T3783] __x64_sys_read+0x40/0x50 [ 1697.660766][ T3783] x64_sys_call+0x27c0/0x3000 [ 1697.660866][ T3783] do_syscall_64+0xd2/0x200 [ 1697.660887][ T3783] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1697.660925][ T3783] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1697.660961][ T3783] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1697.661051][ T3783] RIP: 0033:0x7fe53420d9dc [ 1697.661148][ T3783] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1697.661200][ T3783] RSP: 002b:00007fe532c6f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1697.661221][ T3783] RAX: ffffffffffffffda RBX: 00007fe534465fa0 RCX: 00007fe53420d9dc [ 1697.661236][ T3783] RDX: 000000000000000f RSI: 00007fe532c6f0a0 RDI: 0000000000000007 [ 1697.661250][ T3783] RBP: 00007fe532c6f090 R08: 0000000000000000 R09: 0000000000000000 [ 1697.661263][ T3783] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1697.661278][ T3783] R13: 00007fe534466038 R14: 00007fe534465fa0 R15: 00007ffc6cd04e88 [ 1697.661376][ T3783] [ 1697.729731][ T29] audit: type=1400 audit(1697.801:86594): avc: denied { mount } for pid=3786 comm="syz.2.23157" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1697.760542][ T3792] atomic_op ffff8881016ff528 conn xmit_atomic 0000000000000000 [ 1698.098555][ T3816] xt_bpf: check failed: parse error [ 1698.119932][ T3816] vhci_hcd: invalid port number 96 [ 1698.125171][ T3816] vhci_hcd: default hub control req: 2000 vfffc i0060 l7 [ 1698.132537][ T3815] netlink: 8 bytes leftover after parsing attributes in process `syz.0.23170'. [ 1698.174020][ T3809] syz_tun (unregistering): left allmulticast mode [ 1698.181895][ T3823] atomic_op ffff8881016fdd28 conn xmit_atomic 0000000000000000 [ 1698.306120][ T3826] program syz.3.23173 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 1698.307747][ T3819] lo speed is unknown, defaulting to 1000 [ 1698.319014][ T3826] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 1698.390694][ T3849] netlink: 8 bytes leftover after parsing attributes in process `syz.0.23181'. [ 1698.409192][ T3819] lo speed is unknown, defaulting to 1000 [ 1698.456918][ T3853] atomic_op ffff88811bc0a128 conn xmit_atomic 0000000000000000 [ 1698.506850][ T3819] chnl_net:caif_netlink_parms(): no params data found [ 1698.583652][ T3819] bridge0: port 1(bridge_slave_0) entered blocking state [ 1698.590961][ T3819] bridge0: port 1(bridge_slave_0) entered disabled state [ 1698.598401][ T3819] bridge_slave_0: entered allmulticast mode [ 1698.605327][ T3819] bridge_slave_0: entered promiscuous mode [ 1698.612974][ T3819] bridge0: port 2(bridge_slave_1) entered blocking state [ 1698.620215][ T3819] bridge0: port 2(bridge_slave_1) entered disabled state [ 1698.640178][ T3819] bridge_slave_1: entered allmulticast mode [ 1698.647351][ T3819] bridge_slave_1: entered promiscuous mode [ 1698.655103][ T3875] lo speed is unknown, defaulting to 1000 [ 1698.708703][ T3819] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1698.760483][ T3875] lo speed is unknown, defaulting to 1000 [ 1698.834995][ T3884] netlink: 8 bytes leftover after parsing attributes in process `syz.4.23195'. [ 1698.859162][ T3819] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1698.906530][ T3819] team0: Port device team_slave_0 added [ 1698.913746][ T3819] team0: Port device team_slave_1 added [ 1698.967926][ T3819] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1698.974972][ T3819] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1699.001003][ T3819] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1699.016153][ T3819] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1699.023570][ T3819] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1699.049767][ T3819] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1699.061989][ T3895] FAULT_INJECTION: forcing a failure. [ 1699.061989][ T3895] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1699.062021][ T3895] CPU: 0 UID: 0 PID: 3895 Comm: syz.0.23199 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1699.062057][ T3895] Tainted: [W]=WARN [ 1699.062065][ T3895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1699.062081][ T3895] Call Trace: [ 1699.062089][ T3895] [ 1699.062097][ T3895] __dump_stack+0x1d/0x30 [ 1699.062123][ T3895] dump_stack_lvl+0xe8/0x140 [ 1699.062144][ T3895] dump_stack+0x15/0x1b [ 1699.062162][ T3895] should_fail_ex+0x265/0x280 [ 1699.062194][ T3895] should_fail+0xb/0x20 [ 1699.062210][ T3895] should_fail_usercopy+0x1a/0x20 [ 1699.062236][ T3895] _copy_from_user+0x1c/0xb0 [ 1699.062326][ T3895] __copy_msghdr+0x244/0x300 [ 1699.062396][ T3895] ___sys_sendmsg+0x109/0x1d0 [ 1699.062520][ T3895] __sys_sendmmsg+0x178/0x300 [ 1699.062549][ T3895] __x64_sys_sendmmsg+0x57/0x70 [ 1699.062571][ T3895] x64_sys_call+0x1c4a/0x3000 [ 1699.062598][ T3895] do_syscall_64+0xd2/0x200 [ 1699.062636][ T3895] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1699.062671][ T3895] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1699.062709][ T3895] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1699.062735][ T3895] RIP: 0033:0x7f588de3efc9 [ 1699.062751][ T3895] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1699.062777][ T3895] RSP: 002b:00007f588c8a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1699.062844][ T3895] RAX: ffffffffffffffda RBX: 00007f588e095fa0 RCX: 00007f588de3efc9 [ 1699.062859][ T3895] RDX: 0000000000000001 RSI: 0000200000000440 RDI: 000000000000000b [ 1699.062872][ T3895] RBP: 00007f588c8a7090 R08: 0000000000000000 R09: 0000000000000000 [ 1699.062886][ T3895] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1699.062901][ T3895] R13: 00007f588e096038 R14: 00007f588e095fa0 R15: 00007ffe89b25f78 [ 1699.062923][ T3895] [ 1699.377465][ T3896] netlink: 24 bytes leftover after parsing attributes in process `syz.4.23197'. [ 1699.412584][ T3819] hsr_slave_0: entered promiscuous mode [ 1699.419490][ T3819] hsr_slave_1: entered promiscuous mode [ 1699.426740][ T3819] debugfs: 'hsr0' already exists in 'hsr' [ 1699.432476][ T3819] Cannot create hsr debugfs directory [ 1699.470121][T15104] Bluetooth: hci0: Frame reassembly failed (-84) [ 1699.479737][ T7538] netdevsim netdevsim2 eth3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1699.489632][ T7538] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1699.500493][ T3915] netlink: 8 bytes leftover after parsing attributes in process `syz.4.23206'. [ 1699.546283][ T7538] netdevsim netdevsim2 eth2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1699.556082][ T7538] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1699.587445][ T3925] netlink: 'syz.4.23210': attribute type 1 has an invalid length. [ 1699.615714][T22236] hid_parser_main: 43 callbacks suppressed [ 1699.615732][T22236] hid-generic 0000:0000:0000.001A: unknown main item tag 0x0 [ 1699.650618][T22236] hid-generic 0000:0000:0000.001A: hidraw0: HID v0.00 Device [syz1] on syz0 [ 1699.666473][ T7538] netdevsim netdevsim2 eth1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1699.676329][ T7538] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1699.716823][ T7538] netdevsim netdevsim2 eth0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1699.726724][ T7538] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1699.790026][ T7538] tipc: Resetting bearer [ 1699.840744][ T7538] tipc: Disabling bearer [ 1699.866435][ T3930] netlink: 208 bytes leftover after parsing attributes in process `syz.4.23212'. [ 1699.886635][ T7538] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1699.896521][ T7538] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1699.906010][ T7538] bond0 (unregistering): Released all slaves [ 1699.948449][ T7538] tipc: Disabling bearer [ 1699.953831][ T7538] tipc: Left network mode [ 1699.970904][ T7538] hsr_slave_0: left promiscuous mode [ 1699.976928][ T7538] hsr_slave_1: left promiscuous mode [ 1700.020651][ T7538] team0 (unregistering): Port device team_slave_1 removed [ 1700.031893][ T7538] team0 (unregistering): Port device team_slave_0 removed [ 1700.333506][ T3819] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1700.343202][ T3819] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1700.352116][ T3819] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1700.360812][ T3819] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1700.395903][ T3819] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1700.408177][ T3819] 8021q: adding VLAN 0 to HW filter on device team0 [ 1700.422401][T15080] bridge0: port 1(bridge_slave_0) entered blocking state [ 1700.429589][T15080] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1700.439612][T15080] bridge0: port 2(bridge_slave_1) entered blocking state [ 1700.446791][T15080] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1700.500522][ T3951] netlink: 8 bytes leftover after parsing attributes in process `syz.3.23216'. [ 1700.519130][ T3819] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1700.611191][ T3819] veth0_vlan: entered promiscuous mode [ 1700.628090][ T3819] veth1_vlan: entered promiscuous mode [ 1700.649711][ T3819] veth0_macvtap: entered promiscuous mode [ 1700.665866][ T3819] veth1_macvtap: entered promiscuous mode [ 1700.682630][ T3819] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1700.696223][ T3819] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1700.709082][ T7538] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1700.719467][ T3975] FAULT_INJECTION: forcing a failure. [ 1700.719467][ T3975] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1700.732585][ T3975] CPU: 0 UID: 0 PID: 3975 Comm: syz.3.23224 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1700.732619][ T3975] Tainted: [W]=WARN [ 1700.732682][ T3975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1700.732692][ T3975] Call Trace: [ 1700.732696][ T3975] [ 1700.732702][ T3975] __dump_stack+0x1d/0x30 [ 1700.732756][ T3975] dump_stack_lvl+0xe8/0x140 [ 1700.732769][ T3975] dump_stack+0x15/0x1b [ 1700.732779][ T3975] should_fail_ex+0x265/0x280 [ 1700.732792][ T3975] should_fail+0xb/0x20 [ 1700.732802][ T3975] should_fail_usercopy+0x1a/0x20 [ 1700.732836][ T3975] _copy_from_user+0x1c/0xb0 [ 1700.732854][ T3975] __sys_bpf+0x183/0x7c0 [ 1700.732869][ T3975] __x64_sys_bpf+0x41/0x50 [ 1700.732888][ T3975] x64_sys_call+0x2aee/0x3000 [ 1700.732998][ T3975] do_syscall_64+0xd2/0x200 [ 1700.733011][ T3975] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1700.733031][ T3975] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1700.733119][ T3975] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1700.733133][ T3975] RIP: 0033:0x7fe53420efc9 [ 1700.733144][ T3975] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1700.733155][ T3975] RSP: 002b:00007fe532c6f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1700.733167][ T3975] RAX: ffffffffffffffda RBX: 00007fe534465fa0 RCX: 00007fe53420efc9 [ 1700.733175][ T3975] RDX: 0000000000000050 RSI: 0000200000000180 RDI: 0000000000000000 [ 1700.733183][ T3975] RBP: 00007fe532c6f090 R08: 0000000000000000 R09: 0000000000000000 [ 1700.733215][ T3975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1700.733260][ T3975] R13: 00007fe534466038 R14: 00007fe534465fa0 R15: 00007ffc6cd04e88 [ 1700.733271][ T3975] [ 1700.908768][ T7538] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1700.919729][ T7538] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1700.935507][ T7538] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1700.948396][ T3979] FAULT_INJECTION: forcing a failure. [ 1700.948396][ T3979] name failslab, interval 1, probability 0, space 0, times 0 [ 1700.961063][ T3979] CPU: 1 UID: 0 PID: 3979 Comm: syz.3.23225 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1700.961100][ T3979] Tainted: [W]=WARN [ 1700.961173][ T3979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1700.961181][ T3979] Call Trace: [ 1700.961185][ T3979] [ 1700.961190][ T3979] __dump_stack+0x1d/0x30 [ 1700.961206][ T3979] dump_stack_lvl+0xe8/0x140 [ 1700.961219][ T3979] dump_stack+0x15/0x1b [ 1700.961229][ T3979] should_fail_ex+0x265/0x280 [ 1700.961241][ T3979] should_failslab+0x8c/0xb0 [ 1700.961303][ T3979] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 1700.961385][ T3979] ? __alloc_skb+0x101/0x320 [ 1700.961425][ T3979] __alloc_skb+0x101/0x320 [ 1700.961441][ T3979] netlink_alloc_large_skb+0xbf/0xf0 [ 1700.961460][ T3979] netlink_sendmsg+0x3cf/0x6b0 [ 1700.961472][ T3979] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1700.961543][ T3979] __sock_sendmsg+0x145/0x180 [ 1700.961559][ T3979] ____sys_sendmsg+0x31e/0x4e0 [ 1700.961618][ T3979] ___sys_sendmsg+0x17b/0x1d0 [ 1700.961643][ T3979] __x64_sys_sendmsg+0xd4/0x160 [ 1700.961656][ T3979] x64_sys_call+0x191e/0x3000 [ 1700.961669][ T3979] do_syscall_64+0xd2/0x200 [ 1700.961689][ T3979] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 1700.961720][ T3979] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 1700.961738][ T3979] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1700.961859][ T3979] RIP: 0033:0x7fe53420efc9 [ 1700.961870][ T3979] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1700.961961][ T3979] RSP: 002b:00007fe532c6f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1700.961973][ T3979] RAX: ffffffffffffffda RBX: 00007fe534465fa0 RCX: 00007fe53420efc9 [ 1700.961981][ T3979] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000004 [ 1700.961989][ T3979] RBP: 00007fe532c6f090 R08: 0000000000000000 R09: 0000000000000000 [ 1700.962033][ T3979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1700.962041][ T3979] R13: 00007fe534466038 R14: 00007fe534465fa0 R15: 00007ffc6cd04e88 [ 1700.962052][ T3979] [ 1701.016785][ T3986] netlink: 8 bytes leftover after parsing attributes in process `syz.2.23227'. [ 1701.386183][ T4021] netlink: 8 bytes leftover after parsing attributes in process `syz.0.23239'. [ 1701.387496][ T4012] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1547 sclass=netlink_route_socket pid=4012 comm=syz.3.23237 [ 1701.415269][ T4022] netlink: 12 bytes leftover after parsing attributes in process `syz.2.23240'. [ 1701.424034][T15103] netdevsim netdevsim3 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 1701.433597][T15119] netdevsim netdevsim3 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 1701.449411][T15119] netdevsim netdevsim3 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 1701.474639][T15119] netdevsim netdevsim3 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 1701.494542][ T4024] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(7) [ 1701.501071][ T4024] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 1701.508605][ T4024] vhci_hcd vhci_hcd.0: Device attached [ 1701.524891][ T3595] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 1701.531277][T10394] Bluetooth: hci0: command 0x1003 tx timeout [ 1701.574259][ T4024] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=4024 comm=syz.0.23241 [ 1701.599208][ T4040] ================================================================== [ 1701.607412][ T4040] BUG: KCSAN: data-race in __d_instantiate / path_openat [ 1701.614449][ T4040] [ 1701.616769][ T4040] write to 0xffff888106e58c30 of 8 bytes by task 4039 on cpu 1: [ 1701.624386][ T4040] __d_instantiate+0x1f8/0x3b0 [ 1701.629171][ T4040] d_instantiate+0x59/0x80 [ 1701.633587][ T4040] shmem_mknod+0x153/0x180 [ 1701.638005][ T4040] shmem_create+0x34/0x50 [ 1701.642326][ T4040] path_openat+0x1105/0x2170 [ 1701.646911][ T4040] do_filp_open+0x109/0x230 [ 1701.651408][ T4040] do_sys_openat2+0xa6/0x110 [ 1701.655988][ T4040] __x64_sys_creat+0x65/0x90 [ 1701.660568][ T4040] x64_sys_call+0x2da3/0x3000 [ 1701.665327][ T4040] do_syscall_64+0xd2/0x200 [ 1701.669820][ T4040] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1701.675789][ T4040] [ 1701.678096][ T4040] read to 0xffff888106e58c30 of 8 bytes by task 4040 on cpu 0: [ 1701.685713][ T4040] path_openat+0x45e/0x2170 [ 1701.690729][ T4040] do_filp_open+0x109/0x230 [ 1701.695246][ T4040] do_sys_openat2+0xa6/0x110 [ 1701.700002][ T4040] __x64_sys_creat+0x65/0x90 [ 1701.704587][ T4040] x64_sys_call+0x2da3/0x3000 [ 1701.709274][ T4040] do_syscall_64+0xd2/0x200 [ 1701.713765][ T4040] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1701.719649][ T4040] [ 1701.721955][ T4040] value changed: 0x0000000000000000 -> 0xffff888129d67aa0 [ 1701.729044][ T4040] [ 1701.731352][ T4040] Reported by Kernel Concurrency Sanitizer on: [ 1701.737491][ T4040] CPU: 0 UID: 0 PID: 4040 Comm: syz.4.23246 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 1701.748855][ T4040] Tainted: [W]=WARN [ 1701.752642][ T4040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1701.762690][ T4040] ================================================================== [ 1701.791389][ T4027] vhci_hcd: connection closed [ 1701.793351][ T7538] vhci_hcd: stop threads [ 1701.802318][ T7538] vhci_hcd: release socket [ 1701.806378][ T29] kauditd_printk_skb: 211 callbacks suppressed [ 1701.806395][ T29] audit: type=1326 audit(1701.662:86806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4033 comm="syz.8.23245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd00a6efc9 code=0x7ffc0000 [ 1701.806750][ T7538] vhci_hcd: disconnect device [ 1701.812909][ T29] audit: type=1326 audit(1701.662:86807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4033 comm="syz.8.23245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd00a6efc9 code=0x7ffc0000 [ 1701.863827][ T29] audit: type=1326 audit(1701.662:86808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4033 comm="syz.8.23245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fbd00a6efc9 code=0x7ffc0000 [ 1701.887054][ T29] audit: type=1326 audit(1701.662:86809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4033 comm="syz.8.23245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd00a6efc9 code=0x7ffc0000 [ 1701.910161][ T29] audit: type=1326 audit(1701.662:86810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4033 comm="syz.8.23245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd00a6efc9 code=0x7ffc0000 [ 1701.933386][ T29] audit: type=1326 audit(1701.842:86811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4033 comm="syz.8.23245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fbd00a6efc9 code=0x7ffc0000 [ 1701.956637][ T29] audit: type=1326 audit(1701.852:86812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4033 comm="syz.8.23245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd00a6efc9 code=0x7ffc0000 [ 1701.979759][ T29] audit: type=1326 audit(1701.852:86813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4033 comm="syz.8.23245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd00a6efc9 code=0x7ffc0000 [ 1702.002901][ T29] audit: type=1326 audit(1701.852:86814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4033 comm="syz.8.23245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=118 compat=0 ip=0x7fbd00a6efc9 code=0x7ffc0000 [ 1702.026153][ T29] audit: type=1326 audit(1701.852:86815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4033 comm="syz.8.23245" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbd00a6efc9 code=0x7ffc0000