last executing test programs: 5.39024935s ago: executing program 2 (id=45): r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'virt_wifi0\x00'}) ioctl$F2FS_IOC_ABORT_ATOMIC_WRITE(r0, 0xf505, 0x0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000380)={0x0, 0x2}, 0x8) (async) sendto$inet6(r1, &(0x7f0000000140)='U', 0x1, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000000)={0x0, 0x0, 0x5}, 0x8) 5.231144825s ago: executing program 2 (id=46): r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000012c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800718, &(0x7f0000000680)={[{@nodioread_nolock}, {@journal_dev={'journal_dev', 0x3d, 0xff}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5c}}, {@nouid32}, {@resgid}, {@acl}, {@init_itable_val={'init_itable', 0x3d, 0x8d55}}]}, 0x0, 0x473, &(0x7f0000000bc0)="$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") 4.803729207s ago: executing program 2 (id=49): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e22, @empty}, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r2) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r2, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x58, r3, 0x2, 0x70bd25, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_FRAME={0x1c, 0x33, @data_frame={@a_msdu=@type10={{0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1}, {0x5}, @from_mac=@broadcast, @device_b, @initial, {0x9, 0x9}}, @a_msdu}}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_FRAME={0x14, 0x33, @ctrl_frame=@cf_end={{}, {0xb}, @device_b, @random="80dd5ee91767"}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40000}, 0x10) sendmsg$DEVLINK_CMD_PORT_GET(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x14, r1, 0x1, 0x0, 0x0, {0x54}}, 0x14}, 0x1, 0x0, 0x0, 0x8001}, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000900)={0x0, 0x0, 0x2, 0x7, 0x1ffd, 0x2}, 0x14) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000020000000000000000ee000095"], &(0x7f00000002c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00}, 0x94) listen(r0, 0x1ff) r6 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r6, &(0x7f00000000c0)="ab", 0xffe0, 0xc1, &(0x7f0000000140)={0x2, 0x4e22, @loopback}, 0x10) 4.683404109s ago: executing program 2 (id=51): r0 = socket$inet6(0xa, 0x2, 0x3a) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=@newtaction={0x7c, 0x30, 0x1, 0x0, 0x0, {}, [{0x68, 0x1, [@m_vlan={0x64, 0x1, 0x0, 0x0, {{0x9}, {0x38, 0x2, 0x0, 0x1, [@TCA_VLAN_PARMS={0x1c, 0x2, {{0x0, 0x0, 0x0, 0xfffffffc}, 0x3}}, @TCA_VLAN_PUSH_VLAN_ID={0x6, 0x3, 0x63d}, @TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x8100}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x7c}}, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000080)={@mcast1, r1}, 0x14) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x13, 0x5, &(0x7f00000004c0)=ANY=[@ANYRES32], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x30, '\x00', r1, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) r4 = syz_io_uring_setup(0x4553, &(0x7f0000000400)={0x0, 0x59fc, 0x80, 0x3, 0xbd7f7fff}, &(0x7f0000000040)=0x0, &(0x7f00000001c0)=0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) syz_clone(0x4000000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)="a6") madvise(&(0x7f0000000000/0x600000)=nil, 0x60005f, 0x3) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101097, 0x0) mount$bind(&(0x7f0000000580)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x1b5008, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f00000002c0)=0x9, 0x0, 0x4) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000440)='kfree\x00', r8, 0x0, 0x5}, 0x18) timer_settime(0x0, 0x0, 0x0, 0x0) bind$qrtr(0xffffffffffffffff, 0x0, 0x0) r9 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_INIT(r0, 0x29, 0xc8, &(0x7f0000000340), 0x4) setsockopt$MRT6_ADD_MIF(r9, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x1}, 0xc) setsockopt$MRT6_FLUSH(r9, 0x29, 0xd4, &(0x7f0000000080)=0x6, 0x4) syz_io_uring_submit(r5, r6, &(0x7f0000000180)=@IORING_OP_MKDIRAT={0x25, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000037c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x1}) io_uring_enter(r4, 0x5535, 0x3acd, 0x22, 0x0, 0x0) r10 = socket$kcm(0x29, 0x5, 0x0) sendmsg(r10, &(0x7f0000003680)={0x0, 0x0, &(0x7f0000003140)=[{&(0x7f0000002d80)="0f", 0x1}, {0x0, 0x2}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0, 0x4d}, {0x0}], 0x9}, 0x0) connect$inet6(r9, &(0x7f0000000380)={0xa, 0x4e23, 0x1f2, @remote, 0x6}, 0x1c) 4.608823366s ago: executing program 2 (id=53): bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000940)={&(0x7f0000000540)=ANY=[@ANYBLOB="180000001600010000000000fddbdf250a78"], 0x18}}, 0x0) (async, rerun: 64) r1 = syz_io_uring_setup(0x4175, &(0x7f0000000180)={0x0, 0x136f, 0x10000, 0x2, 0x2d0}, &(0x7f0000000440), &(0x7f0000000400)) (rerun: 64) io_uring_enter(r1, 0x7b20, 0xe93c, 0x0, 0x0, 0x0) (async) io_uring_enter(r1, 0x1e61, 0x9296, 0x1, 0x0, 0x0) 3.897534226s ago: executing program 2 (id=60): r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty, 0x2}, 0x1c) r1 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r1, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4, 0x0, 0x3}}, 0x2e) syz_emit_ethernet(0x4c, &(0x7f0000000140)={@random="99177fa54f29", @random="ece65fbcee55", @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '\x00', 0x16, 0x11, 0xff, @remote, @local, {[], {0x0, 0xe22, 0x16, 0x0, @gue={{0x2, 0x0, 0x0, 0x3}, "30b00afe4e70"}}}}}}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6004, 0x1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r4}, 0x10) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x121602, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000003c0)=0x11) 3.896698516s ago: executing program 32 (id=60): r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty, 0x2}, 0x1c) r1 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r1, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4, 0x0, 0x3}}, 0x2e) syz_emit_ethernet(0x4c, &(0x7f0000000140)={@random="99177fa54f29", @random="ece65fbcee55", @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '\x00', 0x16, 0x11, 0xff, @remote, @local, {[], {0x0, 0xe22, 0x16, 0x0, @gue={{0x2, 0x0, 0x0, 0x3}, "30b00afe4e70"}}}}}}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6004, 0x1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r4}, 0x10) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x121602, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000003c0)=0x11) 2.567361277s ago: executing program 4 (id=73): gettid() r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000002c0), 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r0, 0x0) finit_module(r0, &(0x7f0000000080)='&\'/\\]*(\\\x00', 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x1, @tid=r1}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x1, &(0x7f0000000380)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) flock(r2, 0x2) r3 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) flock(r3, 0x2) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000208500000004"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x39) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='kmem_cache_free\x00', r5}, 0x18) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x10840, &(0x7f00000001c0)=ANY=[@ANYRES64=0x0, @ANYRESHEX=0x0, @ANYBLOB="2c73686f72746e616d653d77696e6e742c000000000000009e5fcf6469722c73687865d2068a008e48488cc8642c6e66733d6e6f73"], 0x1, 0x26c, &(0x7f0000000340)="$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") mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000440)='./file0\x00', 0x29c500a, 0x0, 0x4, 0x0, &(0x7f0000000000)) 1.699968992s ago: executing program 4 (id=82): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="b59d0000040000de200100000600ed0063bcffe54802000230b0d71c640ebadc7f0319afd62c810000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00'}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/raw6\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000800)=ANY=[@ANYRES16=r1, @ANYRES16=r4, @ANYBLOB="01002bbd8d0002dcdf35943711ffff316d0400000076f2cd71015e2fc3e786c10a986a8d55458f7aec84a6f036d0b2443952d3c82421a369f2cd7acf1701b3d56a75dfb84117ad5fc0760d5f99f3ebd4945a24529f360aadb31a371ad366d97b61c27d1cad11fd245a9ab321262019203a8da739781ffa552a571faa3468685aa5c0e1a3d7fd68888ede7e1d466af409f91c2909875fde9547ecb5b8b84574dd76b49122dee45cb90c0203866d353e96eb5c8111924acb2855af2880d2c64320e18191fcbf0890884a3eb297266b996a29821b4cbc6eb45064ff51230c90df6321eade961e87175900383ac8a6f96f9d07"], 0x14}, 0x1, 0x0, 0x0, 0x24001840}, 0x841) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000080)={'vcan0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f00000015c0)='dlm_lock_end\x00', r2, 0x0, 0x800000000000000}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) uname(0x0) epoll_pwait2(0xffffffffffffffff, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}], 0x6, &(0x7f0000000480), &(0x7f00000004c0)={[0x1b94]}, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3d, 0x3d, 0x4, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0xb3f0, [{0xd, 0x0, 0x7fff}]}, @datasec={0xf, 0x0, 0x0, 0xf, 0x1, [], "be"}, @fwd={0xb}, @typedef={0x4, 0x0, 0x0, 0x8, 0x4}]}, {0x0, [0x50, 0x5f]}}, 0x0, 0x5c, 0x0, 0x1, 0x2}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0xfffffffc, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) pipe2(0x0, 0x800) set_robust_list(0x0, 0x0) r5 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, 0x0) socket$netlink(0x10, 0x3, 0x0) gettid() r6 = gettid() timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x800000000004, @tid=r6}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r7 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000200), 0x100) readv(r7, &(0x7f0000000300)=[{&(0x7f0000000000)=""/47, 0x2f}], 0x1) 1.469078675s ago: executing program 3 (id=84): mknod(&(0x7f0000000280)='./file0\x00', 0x1ffa, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000280)='./bus\x00', 0x2029c1b, 0x0, 0x1, 0x0, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2a, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000200)='kfree\x00', r2, 0x0, 0x80}, 0x18) mkdirat(r1, &(0x7f0000000000)='./bus/file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000e02800850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000680)=ANY=[@ANYBLOB="600100001600010028bd7000fbdbdf25fe8000000000000000000000000000aaac1414aa0000000000000000000000004e23000f4e23000e0200a0b05e000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x160}, 0x1, 0x0, 0x0, 0x8000}, 0x24000004) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x1c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b40)={{r5}, &(0x7f0000000bc0), &(0x7f0000000c00)=r6}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400"], 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000d00)={'batadv0\x00', 0x0}) sendmmsg$inet(r1, &(0x7f0000000e00)=[{{&(0x7f0000000a40)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000b00)=[{&(0x7f0000000a80)="21273626ac821ba83e2eea98f71d2ec5e178c96a4ccf32ed269239a0deb43b9b7f38a250f2c1f6dad59fdd0a5f762fb3c063d5074157bc322467973cdc0d251bb84652c480a46ab1b36c91415642b907675020983a96e14c778d72dab777b2f2d41207d092e07a32ed61d176", 0x6c}], 0x1, &(0x7f0000000e80)=ANY=[@ANYBLOB="180000000000000000000000373253d7cd3c53aecfd93c3e50b824361bcb07a6f8f8474315d394081a74836b1351772260eff622c8b9610cd91794a331f86ce30aea886437ff77ce4703cec22cde8e4bb5c3307370f922f0fbe4190000000000000000000000001da749fa7d9bf36c3a423d9855d454145953230d455b289a9d8287903ca0066ff49634015445fe5d2b29e618c8e47c966b69bd6ca340c146a9d4a03f1eb5f4fde392f3"], 0x18}}, {{&(0x7f0000000b80)={0x2, 0x4e20, @multicast2}, 0x10, &(0x7f0000000cc0)=[{&(0x7f0000000c80)="407e557631768e70435832", 0xb}], 0x1, &(0x7f0000000d40)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @loopback, @dev={0xac, 0x14, 0x14, 0x6}}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_ttl={{0x14, 0x0, 0x2, 0xffff}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7f}}], 0xb0}}], 0x2, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='page_pool_release\x00', r3}, 0x10) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000900), r1) sendmsg$NL80211_CMD_LEAVE_IBSS(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r8, @ANYBLOB="000128bd7000fedbdf252c0000000c0000000000"], 0x20}, 0x1, 0x0, 0x0, 0x24004880}, 0x1) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='page_pool_release\x00', r9}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e"], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000400)={r1, &(0x7f0000000340)="a7dff56311e10de946062873d18404062fc99e5bc76a53caf8c506a4c2f538357c3ee57f069f490cfde256eb6877f9a4bc34942f6e654e123a00445863e4449e687e33811a8c2259e9726202f2efb98237042a527108c003a0166a664c6d771c0a1ae821e8590da5ebedb1a682c37068e255ade34214d09870bb10ce5ee732d814944ca4baecba45790ef8e3d2d2568545e1e631571fd9df96786cad", &(0x7f0000000800)=""/234, 0x4}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r11, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000300)="b9ff030768f1258c989e14f05c71", 0x0, 0x2, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) renameat2(r1, &(0x7f0000000080)='./bus/file0\x00', r1, &(0x7f00000001c0)='./file0\x00', 0x2) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x8003, &(0x7f0000000000)=0x9, 0x6, 0x0) mremap(&(0x7f00003c9000/0x2000)=nil, 0x2000, 0x2000, 0x4, &(0x7f00001de000/0x2000)=nil) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0xa, 0x2) 1.387110973s ago: executing program 3 (id=85): creat(&(0x7f00000002c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x1a00404, &(0x7f0000000080)={[{@grpquota}, {@noblock_validity}]}, 0x1, 0xbb6, &(0x7f0000000c00)="$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") r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0xc402, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000003bc0)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x94) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000c40)=ANY=[], 0x13) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000003c0)={r1, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000280)='./file0\x00', &(0x7f0000000300)=[0x5], &(0x7f0000000180)=[0x2], 0x0, 0x1, 0x1}}, 0x40) 1.2126041s ago: executing program 3 (id=89): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000014c0)=ANY=[@ANYRES64, @ANYRES8], 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000240)={0x6, 0x0}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') mount$9p_fd(0x0, &(0x7f00000000c0)='.\x00', &(0x7f0000000040), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='trans=fd0x0}}) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000080)=ANY=[@ANYBLOB="200000005e00dd00000000000000000008007600090000400800018004001200bbda9c8ed612eb92e0c04bae3cdc35"], 0x20}], 0x1}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000400)=ANY=[@ANYRESOCT, @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f00000002c0)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x2b, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xd, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r6, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095", @ANYBLOB="d6cdc0ab321994bd48f2466db81279809d4d890434f5017ec586dad90699cd28cf430c9ca4c3770fb3a400473330982411d9cb4855462c4127e650541d75859cb9805c131b21382ca0b32920b3643f163f7b25b619dd58b6cc1f818591cafb3513d6cc277878368fcf2e45448df82bdcfad4348ced832ea69cf6bb203cde444282d16d7d5fad778fc50c3d1c03ae8f1411863816472858f0e8352bb057ed0401c3791b6b4bb74f1f2706139186d61ca75fcedfb6ec5b04bb14caa2241787fa5c5036867df7dc3cfed83a4f73bd945a1c8b7c222502a1e5e5dd4450b13710f99846d65ec80a0cdbfa660b1ab6837ded8aeb8ec42220171d4b"], &(0x7f0000000480)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0xfffffddc, 0x0, 0x0, 0x0, 0xf75}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000000c0)='fsi_master_gpio_cmd_rel_addr\x00', r7, 0x0, 0xfffffffffffff006}, 0x49) r8 = openat$selinux_create(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) r9 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_SIOCINQ(r9, 0x541b, &(0x7f0000000200)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000001500)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYRES64=r4], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) getsockopt$CAN_RAW_RECV_OWN_MSGS(0xffffffffffffffff, 0x65, 0x4, &(0x7f0000000200), &(0x7f0000000280)=0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r11}, 0x10) syz_genetlink_get_family_id$smc(&(0x7f0000000000), 0xffffffffffffffff) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r13}, 0x10) r14 = socket$nl_generic(0x10, 0x3, 0x10) r15 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r14, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000680)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r15, @ANYBLOB='ya\x00\x00\x00\x00\x00\x00\x00\x00~'], 0x1c}}, 0x0) pwrite64(r8, &(0x7f0000000000)="3703c70f70e244b7878fedf0c0c6c2ff2f524255d61dbfb25921e3d3686454b93e5842722103c5c67b0da4173b9e63544ee1f32fc67080b7b83c0a31", 0x3c, 0x2) 1.210212981s ago: executing program 0 (id=90): syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0x101c0ca, &(0x7f0000000400)=ANY=[], 0x6, 0x2c0, &(0x7f0000000440)="$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") pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) pselect6(0x40, &(0x7f0000000100)={0x9, 0xd000001, 0x0, 0xfffffffffffffffc, 0x401, 0x0, 0x200, 0x7}, 0x0, 0x0, 0x0, 0x0) io_setup(0x3ff, &(0x7f0000000500)=0x0) io_submit(r2, 0x2, &(0x7f0000000300)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0xfffe, r1, &(0x7f00000001c0)='m', 0x1}]) r3 = open(&(0x7f0000000140)='./file2\x00', 0x147842, 0x126) preadv2(r3, &(0x7f00000000c0)=[{0x0}, {&(0x7f0000000a00)=""/4096, 0x1000}, {&(0x7f0000000000)=""/59, 0x3b}], 0x3, 0x9, 0x0, 0x1) 1.12144503s ago: executing program 0 (id=91): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x100202, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x27}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000240)='kfree\x00', r2}, 0x18) r3 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x4e8, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x418, 0xffffffff, 0xffffffff, 0x418, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'erspan0\x00'}, 0x0, 0x148, 0x190, 0x0, {}, [@common=@unspec=@helper={{0x48}}, @common=@inet=@hashlimit1={{0x58}, {'bond_slave_1\x00', {0x41, 0x1ff, 0x6, 0xb0e6, 0x10001, 0x84e, 0xfffffffb, 0x18, 0x8}, {0x1}}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x1, 0x66, 0x3, 0x9, 'snmp_trap\x00', {0x8}}}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev}, [0x0, 0x0, 0x0, 0xffffffff], [0x0, 0xffffffff], 'erspan0\x00', 'gre0\x00', {}, {}, 0x0, 0x7, 0x5}, 0x0, 0x258, 0x288, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x0, 0xaf53, 0x5, 0x0, 0x0, 0x7, 0x3ff}}}, @common=@inet=@policy={{0x158}, {[{@ipv4=@multicast1, [0x0, 0x0, 0xff000000], @ipv4=@multicast2, [0xffffffff, 0x0, 0xff000000, 0xffffffff], 0x4d5, 0x3500, 0x3a, 0x0, 0x13, 0xd}, {@ipv4=@local, [0xff000000, 0xff000000, 0xff], @ipv6=@private1, [0x100000100, 0xffffff00, 0xffffff00], 0x4d6, 0x3507, 0xf6, 0x0, 0x6, 0x1b}, {@ipv6=@rand_addr=' \x01\x00', [0xffffff, 0xff, 0xffffffff, 0xff000000], @ipv4=@local, [0x0, 0xffffffff, 0xff, 0xffffffff], 0x4d3, 0x3502, 0x6c, 0x1, 0xd, 0x15}, {@ipv4=@multicast2, [0xff000000, 0xff000000, 0xffffffff, 0xffffffff], @ipv4=@dev={0xac, 0x14, 0x14, 0xf}, [0x0, 0x0, 0xff000000], 0x4d6, 0x0, 0x6, 0x0, 0x6, 0x1a}], 0x1}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x548) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4000000) r5 = fsopen(&(0x7f0000000100)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r5, 0x6, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) 1.035993408s ago: executing program 0 (id=93): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000480)='kmem_cache_free\x00', r0}, 0x18) syz_emit_ethernet(0x46, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa1780c206050086dd6018232500102c"], 0x0) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x6, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000002000000000000000008082295"], &(0x7f00000002c0)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0xb68, 0xffffffffffffff62, &(0x7f0000000000)="ff", 0x0, 0x149c, 0x503, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffff80fe}, 0x48) (fail_nth: 2) 777.455744ms ago: executing program 0 (id=95): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000080), 0x10) sendmsg$can_bcm(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000400)={0x5, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "f8ca44dfaa00"}}, 0x48}, 0x1, 0x0, 0x0, 0x48850}, 0x0) sendmsg$can_bcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0500000015000000feffffff00000000", @ANYRES64=0x0, @ANYRES64=r1, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="0000000001000000020000000203150061bcf34b016813cf"], 0x48}, 0x1, 0x0, 0x0, 0x6686ae64641a9dd7}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002040)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = memfd_create(&(0x7f0000002bc0)='\xfb\"a&\x8fe\x11\x8c\xd64\xf9 \x00\x00\x00\x00\x00\x12\x1a\'<\xf5\xbeV\x12\xaal\xfa\xf0o\xd8\xb1,\xbd>M\xe3\x98?\xd9\x96\xab\xc7\x06\xfd\x9b\xab\xc8\x1e\x89]\x13bZ\x8d /#k\x95\x9eLV(\x8a\x0e\x93\x93Vc]mP\xbativ\xce\xa4K\xfb\xf2\xe0\xbf\x9d\xa1\xa2\xcd\xb39\xb4\x17a9\x1c\x82\x1aLT\xd0\xb9\x1a\xafB\x95\xb4\xcf\x91X\x8c\x87\xc2\xa1\x1b\xfe\xe7\xbc\xf7\xeb\xdeL\x1d\x98Zq\xcc%\x98\xb0Yc\xec\xb7\xb5m(9\xde\xd3\xefB\xd4\xee\xb5\xee\xe0\xaa\xdd\x00\xb1jOB\xdas\xe3\xb47}\xf3\xf8\xab\xbd\xf03L\xb0\xec\xdf\xbcW\xe0I\x0e\xa4\x1e}\x06\vK\xed\x11\x880\x0e\x9c\xae\x8dVU\x88\xb0\x842kgA]\x1e\x88\xecif\xee]\x8b\xc6\"\xcej\x84\x06\x8a\x99\x80\xd7\xcf\x1f\xed\x89\x1e6\x93+\xec#\x1d2\xb8\x80Z\xf7\x06\xbe\xc9[L\xc5\xc9\xb5\xd6{\xee\xce\x17\x89\xa6r\xc5j\xec\x1b\xaa\x996\x14e\xcf\x8axQ\x8fXeT\'0.\x85\xa2\xc8\xb3c\t\xe8\x1a\x89\xecL\xcf\xd8\xb5\xfb\xbc\tX\x88\xbe\xf49\xd2\xfb\x9e\xef\xabR\x88\x13\x9et\xcb\x82\x01\x91\xacH\xdb\xf9\xcb\x7fh\x83>\x8e\xe1=\xedR\xc9\xe68h\x19\xafLY\x94\x93\xebT\x15\x817\x9d#\xea\xd2\xa8\xfb^\x8c\x87#\x10\x00'/355, 0x5) r3 = syz_open_procfs$pagemap(0xffffffffffffffff, &(0x7f0000000080)) r4 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'veth0_virt_wifi\x00'}) r5 = gettid() process_vm_writev(r5, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0x7ffff000}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) ioctl$PAGEMAP_SCAN(r3, 0xc0606610, &(0x7f0000000100)={0x60, 0x0, &(0x7f00001c9000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0, &(0x7f0000000040)=[{}], 0xb3c, 0x0, 0x0, 0x0, 0x0, 0x2}) fallocate(r2, 0x10, 0x0, 0x80) pipe2(&(0x7f0000001cc0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000800), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r8, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)={0x30, r9, 0xc4fc9e906872338b, 0x70bd2a, 0x0, {{0x15}, {@void, @val={0xc, 0x99, {0xc7, 0x3a}}}}, [@NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x8, 0xd, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x4, 0x3, 0x0, 0x0}]}]}]}]}, 0x30}}, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r7, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x68, r9, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x3, 0x56}}}}, [@NL80211_ATTR_SCHED_SCAN_DELAY={0x8, 0xdc, 0x6}, @NL80211_ATTR_SCHED_SCAN_DELAY={0x8, 0xdc, 0x3}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x3}, @NL80211_ATTR_SCAN_FREQUENCIES={0x24, 0x2c, 0x0, 0x1, [{0x8, 0x0, 0x8}, {0x8, 0x0, 0x9}, {0x8, 0x0, 0x3}, {0x8, 0x0, 0xb781}]}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}]}, 0x68}, 0x1, 0x0, 0x0, 0x20004041}, 0x4000000) mount$9p_fd(0x0, &(0x7f0000000000)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@access_uid}]}}) 385.509542ms ago: executing program 1 (id=98): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000de0000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) clock_adjtime(0x5, &(0x7f00000001c0)={0x1ff, 0x8, 0x100000000, 0x1, 0x9, 0x0, 0xe, 0x13300000, 0x6871fca4, 0x0, 0x0, 0x80000000000000, 0x2, 0x5, 0x3, 0x1, 0x0, 0x9, 0x2, 0x8001, 0x5, 0x8000000000000001, 0x1, 0x1, 0xaa80000000000000, 0x2}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) fcntl$setlease(r1, 0x400, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file1\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="02000000010000000000f400040000000000000020"], 0x1c, 0x0) 385.091952ms ago: executing program 1 (id=99): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000080)=0x7, 0x4) syz_emit_ethernet(0x4a, &(0x7f00000000c0)={@local, @random="fad1cd480100", @void, {@ipv4={0x800, @udp={{0xd, 0x4, 0x0, 0x0, 0x3c, 0x1, 0x0, 0x0, 0x11, 0x0, @empty, @empty, {[@timestamp={0x44, 0x20, 0xdb, 0x0, 0x6, [0xa, 0xfff, 0x1, 0x7, 0x3059, 0xbae, 0x9]}]}}, {0x0, 0x4e20, 0x8}}}}}, 0x0) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f00000002c0)=0x3f7, 0x4) recvmmsg(r0, &(0x7f00000036c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2, 0x0) 384.706702ms ago: executing program 1 (id=100): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x2) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) setsockopt$packet_int(r1, 0x107, 0xc, &(0x7f0000000380)=0x8, 0x4) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c}}]}, 0x78}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newtfilter={0x5c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xd}}, [@filter_kind_options=@f_basic={{0xa}, {0x2c, 0x2, [@TCA_BASIC_EMATCHES={0x28, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xffff}}, @TCA_EMATCH_TREE_LIST={0x1c, 0x2, 0x0, 0x1, [@TCF_EM_META={0x18, 0x1, 0x0, 0x0, {{0x8, 0x4, 0x4}, [@TCA_EM_META_HDR={0xc, 0x1, {{0x7, 0x14, 0x1}, {0x8, 0x9, 0x2}}}]}}]}]}]}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x400c040}, 0x0) 380.204582ms ago: executing program 4 (id=101): r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x60442, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001080)={&(0x7f0000000080)=ANY=[@ANYBLOB="9399dbaaa0e6bb5200", @ANYRES16=0x0, @ANYBLOB="05072bbd7000ffdbdf2501000000"], 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000001c40)={0x0, 0x0}) setsockopt$inet6_int(r2, 0x29, 0x48, &(0x7f0000000000)=0x5, 0x4) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(0xffffffffffffffff, 0x89fb, &(0x7f0000001b40)={'sit0\x00', 0x0}) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20040000, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) r3 = dup(r0) ioctl$PTP_PEROUT_REQUEST2(r3, 0x40383d0c, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x3fffffffc}, 0x0, 0x2, 0x0, 0x3, 0xfff, 0x8001, 0x8000, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) inotify_init1(0x800) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x5, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xc94284a3061bb7fe, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) r4 = openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x189800, 0x0) setresuid(0x0, 0xee00, 0x0) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000014c0)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1a, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) recvmsg$unix(r3, 0x0, 0x2041) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r4, 0x40047211, &(0x7f00000000c0)) 333.718117ms ago: executing program 4 (id=102): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = syz_open_dev$usbfs(&(0x7f0000000240), 0xb, 0x101301) ioctl$USBDEVFS_SETCONFIGURATION(r2, 0x80045505, &(0x7f0000000000)=0x1) 286.705792ms ago: executing program 4 (id=103): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0xfc, 0x0, 0x7ffc0002}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb8500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0}, 0x10) move_pages(0x0, 0x20a0, &(0x7f0000000040), &(0x7f0000001180), &(0x7f0000000000), 0x0) 216.971379ms ago: executing program 0 (id=104): syz_clone3(&(0x7f0000001940)={0x100080080, 0x0, 0x0, 0x0, {0x2e}, 0x0, 0x20010, 0x0, 0x0}, 0x58) 216.331008ms ago: executing program 1 (id=105): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{}, &(0x7f00000000c0), &(0x7f0000000100)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0xa, [@int={0x9, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x32}]}, {0x0, [0x0, 0x61, 0x0, 0x30, 0x30, 0x5f, 0x30, 0x30]}}, &(0x7f0000001b40)=""/4096, 0x32, 0x1000, 0x0, 0x1, 0x10000}, 0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000400)={0x7}, 0x8) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000), 0x88c02, 0x0) write$cgroup_int(r1, 0x0, 0x2) 184.139012ms ago: executing program 3 (id=106): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{}, &(0x7f00000000c0), &(0x7f0000000100)}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0xa, [@int={0x9, 0x0, 0x0, 0x1, 0x0, 0xa, 0x0, 0x32}]}, {0x0, [0x0, 0x61, 0x0, 0x30, 0x30, 0x5f, 0x30, 0x30]}}, &(0x7f0000001b40)=""/4096, 0x32, 0x1000, 0x0, 0x1, 0x10000}, 0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000400)={0x7}, 0x8) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00'}, 0x10) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000), 0x88c02, 0x0) write$cgroup_int(r1, 0x0, 0x2) 183.844462ms ago: executing program 0 (id=107): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x100202, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x13, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r2 = socket$key(0xf, 0x3, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x27}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r3 = fsopen(&(0x7f0000000180)='proc\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) r4 = fsmount(r3, 0x0, 0xa) fchdir(r4) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000040)={0x0, 0x0, {0x0, 0x1, 0x0, 0x3, 0xc}, 0x8}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r6}, 0x10) syz_clone3(&(0x7f0000000340)={0x20220080, 0x0, 0x0, 0x0, {0x1f}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0x0], 0x1}, 0x58) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f0000000280)=0x0) sendmsg$sock(r2, &(0x7f00000005c0)={&(0x7f00000002c0)=@nfc_llcp={0x27, r7, 0xffffffffffffffff, 0x3, 0x10, 0x1, "c3c937c6595aab16fb948d0de3f7ccc44542725fb77dd1a0c9252df769ec272457e9a5bd7fe3fd3fcf942ca8c955cb6d9b30d561306e1ee33f9988f1fac59f", 0x37}, 0x80, &(0x7f0000000340)=[{&(0x7f00000004c0)="26f29cfdf52bacdf7962ce0ef7c443aac794b5c55eda33c3905393446358d2c41cb327a4f12b0642c21701c2c5601a6554a008a5715ec552cd6bb7400d89c9143ba79ee26a57977200ee81eb62daa2c10687f1529d4f976f76548f6c53ad6be93ffcded6da214b5700ec21b3d9ca634436ca266844318f2f84ab3396f4fb81073b8a403531190b8539f4d16fe1adaf3a1c38dd0b66356643697353f20133c1157413ffe25ca99cb675bd927ba2055d209b5c2963c33b6534f77f8b92557732431d7cbd0e55296e060fa4be06a117de3f74934c986c72b7083182927bfb9c8ec0e61b7b89f09fa47a8b9cc7dadbe58f2128eafbad7ed7b155da", 0xf9}], 0x1, &(0x7f00000006c0)=[@timestamping={{0x14, 0x1, 0x25, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x3ff}}, @timestamping={{0x14, 0x1, 0x25, 0xa}}], 0x60}, 0x4040) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, 0x0, 0x4000000) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0}, 0x94) r9 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r9, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0xbe, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x9c, 0x0, @wg=@initiation={0x1, 0x0, "7b4b143b7461fd777b1c012bd14efb9f49fcdb8f080c26a04883ad5c8c82b8af", "584cbf2649a50f2dbc43efa8698dfa871c51852e4451b57d037ad3c045942824251d7d17b5191584cdd4fbe40a27424d", "bcfd56f1373669caaa2f19935e6996c7096ffe4f3a4745a8f762b964", {"9a3bfbc1f39cb307b3472eb9cdb042d2", "643fcbb2c5a57df67d544af6e8dafe09"}}}}}}}, 0x0) r10 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x7}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r10, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) recvmmsg(r9, &(0x7f00000057c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x16}, 0x3}, {{0x0, 0x0, 0x0}, 0xa1}], 0x40000000000020a, 0x0, 0x0) 141.284686ms ago: executing program 1 (id=108): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xc, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x39, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="070000000400000008000000d9"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000008c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70300000088b000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r1}, 0x18) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = creat(&(0x7f00000000c0)='./file0\x00', 0xc9028ba210c11f8b) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000000)={'\x00', 0xc, 0x2, 0x803fd, 0x1, 0x800}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x24, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x18) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x401) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000040)={'\x00', 0x200, 0x2a2, 0x2, 0x8000000000000000, 0xffffffffffff}) ioctl$SG_BLKTRACETEARDOWN(r4, 0x1276, 0x0) 140.849646ms ago: executing program 3 (id=109): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = syz_open_dev$mouse(&(0x7f0000000180), 0x5aa7, 0x40) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{0x1, 0xffffffffffffffff}, &(0x7f0000000280), &(0x7f00000002c0)=r0}, 0x20) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@typedef={0x5}]}, {0x0, [0x0, 0x61]}}, 0x0, 0x28, 0x0, 0x0, 0x80}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="180000000000000200"/32], &(0x7f0000000040)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, 0xb, r5, 0x8, 0x0, 0x0, 0x14, 0x0, 0x14}, 0x94) r6 = openat2(0xffffffffffffffff, &(0x7f00000005c0)='./file2/file0\x00', &(0x7f0000000600)={0x505040, 0x40, 0x20}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x27, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9c7, 0x0, 0x0, 0x0, 0xfffffff9}, {}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @map_idx={0x18, 0x6, 0x5, 0x0, 0x4}, @alu={0x7, 0x1, 0x5, 0x8, 0x5, 0xef1e9feea375acca, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @exit, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xfffffffe}, @alu={0x4, 0x0, 0xdfaa38eb5316d288, 0x4, 0x7, 0xffffffffffffffc0, 0xffffffffffffffff}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000340)='GPL\x00', 0x8, 0x0, &(0x7f0000000380), 0x41000, 0x8, '\x00', 0x0, 0x25, r5, 0x8, &(0x7f00000003c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000580)={0x4, 0x4, 0x0, 0x7}, 0x10, 0x0, 0x0, 0x5, &(0x7f00000006c0)=[r6], &(0x7f0000000700)=[{0x4, 0x3, 0x3, 0x8}, {0x4, 0x3, 0x7, 0x9}, {0x1, 0x3, 0x5}, {0x4, 0x3, 0x8}, {0x5, 0x1, 0xe, 0x5}], 0x10, 0x5}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYRES64=r1, @ANYRESDEC=r0, @ANYBLOB='aMd4x'], 0x48) syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000080)='./file2\x00', 0x1808004, &(0x7f0000000000)=ANY=[@ANYRES16=0x0, @ANYRES64], 0x4, 0x7cc, &(0x7f0000002200)="$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") 99.78894ms ago: executing program 4 (id=110): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x80, &(0x7f0000000100)={[{@mblk_io_submit}, {@nouid32}, {@debug}]}, 0xfe, 0x244, &(0x7f0000000400)="$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") r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r4}, 0x10) close(r1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xf, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r7}, 0x10) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000500)={'veth1\x00', &(0x7f0000000200)=@ethtool_per_queue_op={0x4b, 0xf, [0x1, 0x1, 0x7fff, 0x1, 0x4, 0x9, 0xa4, 0xffb, 0x7, 0xb6b, 0xc1, 0x4, 0x1, 0x3, 0x5, 0x101, 0x1000, 0x9, 0x3, 0x3, 0x80000001, 0xfffffffa, 0x0, 0xfffffff9, 0x9, 0x4, 0x7, 0x5, 0x100000, 0x762, 0x3, 0x0, 0xe, 0x2b12, 0xfe, 0x6, 0x1c00, 0xb, 0x40, 0xbed4, 0x8, 0x8000100, 0x3, 0x0, 0x0, 0x8, 0x5, 0x79b, 0x2, 0x1, 0x7f, 0x4, 0xa, 0x7, 0xf, 0x101, 0xd7, 0x1fa0860a, 0x7, 0xaa, 0x81, 0x2, 0x180000, 0x4007, 0x8b, 0x5, 0x2af, 0xf7, 0x5, 0x2, 0x6, 0x9, 0x4, 0x7, 0x4009, 0x0, 0x4, 0x100002, 0x8, 0x752, 0x0, 0x3, 0x0, 0x10000, 0x2, 0xffffffff, 0x6, 0x6, 0x9, 0x80000000, 0x0, 0x2, 0xfffffffd, 0x84, 0x100, 0x5, 0x252, 0x10000081, 0xb, 0x5, 0x20006, 0x5, 0x2, 0xb, 0x2, 0xd9a, 0xd, 0x2a2, 0xfffffffd, 0x3, 0x2, 0x5, 0x8, 0x0, 0x4, 0x2, 0x40, 0x8, 0x4, 0x4, 0x401, 0x66cd, 0x8, 0x8, 0x1, 0x1fc, 0xc5c, 0xffffffff]}}) poll(&(0x7f0000000000), 0x20000000000000b5, 0x9) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f0000001f40)=ANY=[@ANYBLOB="000000004c900200290000000300010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000ffffffffffffffff000000000000000000000000000b0000000000000000000000000000000000000000000000000000ffffffff"]) clock_gettime(0x0, 0x0) pidfd_send_signal(0xffffffffffffffff, 0x3e, &(0x7f0000000b80)={0x11, 0x80000001, 0x6}, 0x0) 1.72748ms ago: executing program 1 (id=111): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) fsmount(0xffffffffffffffff, 0x1, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001300)={0x18, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x2e}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00', r3}, 0x10) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r4 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r4) ptrace$setregs(0xd, r4, 0x20000000002, &(0x7f0000000040)) ptrace$cont(0x21, r4, 0x80000001, 0x4) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/kexec_crash_size', 0x149a82, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYRESHEX=r5], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x35, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) pipe(&(0x7f0000000340)) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x200, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x10000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) r6 = io_uring_setup(0x118c, &(0x7f0000001280)={0x0, 0x200023d4, 0xc800, 0xfffffffc, 0x87}) r7 = eventfd2(0x0, 0x0) io_uring_register$IORING_REGISTER_EVENTFD(r6, 0x4, &(0x7f0000000000)=r7, 0x1) io_uring_register$IORING_REGISTER_BUFFERS2(r6, 0xf, &(0x7f0000001580)={0x3, 0x0, 0x0, &(0x7f00000014c0)=[{0x0}, {0x0}, {&(0x7f0000000280)=""/4094, 0xffe}], &(0x7f0000001540)=[0x0, 0x0, 0x4]}, 0x20) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x200000000000011, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) sendmsg$nl_route(r8, &(0x7f0000000200)={0x0, 0xa1, &(0x7f0000000540)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c000000100005ff00000000000000000000004a", @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b00010062618861647600000300028008000a00", @ANYRES32=r10, @ANYBLOB], 0x3c}}, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x19, &(0x7f00000001c0)=0x1, 0x4) r11 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r11}, &(0x7f0000bbdffc)) 0s ago: executing program 3 (id=112): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000240)=""/176, 0xb0, 0x6) r2 = syz_open_dev$vcsa(&(0x7f0000000440), 0x72a, 0x2400) perf_event_open$cgroup(&(0x7f00000003c0)={0x0, 0x80, 0xeb, 0x96, 0xf5, 0x0, 0x0, 0x754, 0x2a, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000380), 0x9}, 0x218000, 0xcf, 0x3, 0x3, 0x7, 0x2, 0x54cc, 0x0, 0x2}, r1, 0xf, r2, 0x1) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000080)='./file2\x00', 0x1808004, &(0x7f0000000000)=ANY=[@ANYRES16=0x0, @ANYRES64], 0x4, 0x7cc, &(0x7f0000002200)="$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") openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x800000, 0x0) prctl$PR_SET_MM_MAP(0x49, 0xe, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r3, &(0x7f0000000280)="5f5dde6894c601cc3dc1140bd2d2dfe2dcf10313064edd3e1da4b1948ca4755df84e2b8feba43a031169ba4e4a060e8c9845df4f9318367abedbf17fd3775c4e8684cdc5ad9781f4461ddcaa702d72868ee5b12a5b841826fbb911d8f7bfb34a37a6bf13bdcb178995adf808e99b5d1bd9d1bfce72cf4db504f640d55be34b665f61684743f0e925f80a02e97d01db50b77da5acd3817761c839be985cb95fd24d207fb1014f03a0b95b0b042a8736dd0b0bbd4c1114da020f6f629e9f3ab65b4739c9063b71ad7b479554c666cdcc3490c058", &(0x7f00000001c0)=@udp6=r4}, 0x20) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r3}, 0x38) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.57' (ED25519) to the list of known hosts. [ 34.877438][ T29] audit: type=1400 audit(1760394343.273:62): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 34.900455][ T29] audit: type=1400 audit(1760394343.293:63): avc: denied { mount } for pid=3301 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 34.901440][ T3301] cgroup: Unknown subsys name 'net' [ 34.928255][ T29] audit: type=1400 audit(1760394343.323:64): avc: denied { unmount } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 35.044032][ T3301] cgroup: Unknown subsys name 'cpuset' [ 35.050379][ T3301] cgroup: Unknown subsys name 'rlimit' [ 35.182090][ T29] audit: type=1400 audit(1760394343.573:65): avc: denied { setattr } for pid=3301 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 35.207459][ T29] audit: type=1400 audit(1760394343.573:66): avc: denied { create } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 35.228006][ T29] audit: type=1400 audit(1760394343.573:67): avc: denied { write } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 35.241644][ T3305] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 35.248421][ T29] audit: type=1400 audit(1760394343.573:68): avc: denied { read } for pid=3301 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 35.277384][ T29] audit: type=1400 audit(1760394343.573:69): avc: denied { mounton } for pid=3301 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 35.302204][ T29] audit: type=1400 audit(1760394343.573:70): avc: denied { mount } for pid=3301 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 35.319984][ T3301] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 35.325580][ T29] audit: type=1400 audit(1760394343.653:71): avc: denied { relabelto } for pid=3305 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 36.584584][ T3311] chnl_net:caif_netlink_parms(): no params data found [ 36.687751][ T3311] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.694995][ T3311] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.702213][ T3311] bridge_slave_0: entered allmulticast mode [ 36.708782][ T3311] bridge_slave_0: entered promiscuous mode [ 36.717424][ T3311] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.724567][ T3311] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.731788][ T3311] bridge_slave_1: entered allmulticast mode [ 36.738253][ T3311] bridge_slave_1: entered promiscuous mode [ 36.755334][ T3315] chnl_net:caif_netlink_parms(): no params data found [ 36.765821][ T3312] chnl_net:caif_netlink_parms(): no params data found [ 36.788725][ T3311] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 36.800722][ T3311] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 36.819414][ T3318] chnl_net:caif_netlink_parms(): no params data found [ 36.843334][ T3321] chnl_net:caif_netlink_parms(): no params data found [ 36.852866][ T3311] team0: Port device team_slave_0 added [ 36.872008][ T3311] team0: Port device team_slave_1 added [ 36.918122][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.925105][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.951242][ T3311] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.972644][ T3311] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.979640][ T3311] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.005628][ T3311] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.040518][ T3315] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.047667][ T3315] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.054991][ T3315] bridge_slave_0: entered allmulticast mode [ 37.061894][ T3315] bridge_slave_0: entered promiscuous mode [ 37.086410][ T3321] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.093517][ T3321] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.100672][ T3321] bridge_slave_0: entered allmulticast mode [ 37.107101][ T3321] bridge_slave_0: entered promiscuous mode [ 37.113833][ T3321] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.120921][ T3321] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.128210][ T3321] bridge_slave_1: entered allmulticast mode [ 37.134857][ T3321] bridge_slave_1: entered promiscuous mode [ 37.141060][ T3315] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.148228][ T3315] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.155400][ T3315] bridge_slave_1: entered allmulticast mode [ 37.161845][ T3315] bridge_slave_1: entered promiscuous mode [ 37.173718][ T3312] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.180823][ T3312] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.188083][ T3312] bridge_slave_0: entered allmulticast mode [ 37.194446][ T3312] bridge_slave_0: entered promiscuous mode [ 37.201792][ T3312] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.208893][ T3312] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.216111][ T3312] bridge_slave_1: entered allmulticast mode [ 37.222511][ T3312] bridge_slave_1: entered promiscuous mode [ 37.262137][ T3318] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.269308][ T3318] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.276556][ T3318] bridge_slave_0: entered allmulticast mode [ 37.283131][ T3318] bridge_slave_0: entered promiscuous mode [ 37.300330][ T3321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.310867][ T3315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.320128][ T3318] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.327286][ T3318] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.334436][ T3318] bridge_slave_1: entered allmulticast mode [ 37.340696][ T3318] bridge_slave_1: entered promiscuous mode [ 37.348934][ T3311] hsr_slave_0: entered promiscuous mode [ 37.355017][ T3311] hsr_slave_1: entered promiscuous mode [ 37.362183][ T3312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.372380][ T3321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.387528][ T3315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.402638][ T3312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.433514][ T3318] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 37.448368][ T3312] team0: Port device team_slave_0 added [ 37.454720][ T3321] team0: Port device team_slave_0 added [ 37.461177][ T3312] team0: Port device team_slave_1 added [ 37.477958][ T3318] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 37.492791][ T3321] team0: Port device team_slave_1 added [ 37.499267][ T3315] team0: Port device team_slave_0 added [ 37.530052][ T3315] team0: Port device team_slave_1 added [ 37.536471][ T3318] team0: Port device team_slave_0 added [ 37.549463][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.556599][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.582576][ T3312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.599043][ T3318] team0: Port device team_slave_1 added [ 37.611820][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.618870][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.644932][ T3312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.658625][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.665663][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.691570][ T3321] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.707751][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.714741][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.740658][ T3315] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.762156][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.769137][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.795138][ T3321] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.811088][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.818097][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.844026][ T3315] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 37.865507][ T3318] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 37.872522][ T3318] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.898513][ T3318] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 37.922243][ T3312] hsr_slave_0: entered promiscuous mode [ 37.928569][ T3312] hsr_slave_1: entered promiscuous mode [ 37.934477][ T3312] debugfs: 'hsr0' already exists in 'hsr' [ 37.940202][ T3312] Cannot create hsr debugfs directory [ 37.952980][ T3318] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 37.960020][ T3318] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 37.985975][ T3318] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 38.012484][ T3315] hsr_slave_0: entered promiscuous mode [ 38.018638][ T3315] hsr_slave_1: entered promiscuous mode [ 38.024642][ T3315] debugfs: 'hsr0' already exists in 'hsr' [ 38.030366][ T3315] Cannot create hsr debugfs directory [ 38.075978][ T3321] hsr_slave_0: entered promiscuous mode [ 38.082171][ T3321] hsr_slave_1: entered promiscuous mode [ 38.088223][ T3321] debugfs: 'hsr0' already exists in 'hsr' [ 38.093995][ T3321] Cannot create hsr debugfs directory [ 38.113565][ T3318] hsr_slave_0: entered promiscuous mode [ 38.119555][ T3318] hsr_slave_1: entered promiscuous mode [ 38.125514][ T3318] debugfs: 'hsr0' already exists in 'hsr' [ 38.131243][ T3318] Cannot create hsr debugfs directory [ 38.260250][ T3311] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 38.276142][ T3311] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 38.297063][ T3311] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 38.315177][ T3311] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 38.339595][ T3312] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 38.348435][ T3312] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 38.357620][ T3312] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 38.371141][ T3312] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 38.405697][ T3315] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 38.419204][ T3315] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 38.428054][ T3315] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 38.437593][ T3315] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 38.472865][ T3321] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 38.482200][ T3321] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 38.491534][ T3321] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 38.500784][ T3321] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 38.535207][ T3318] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 38.548014][ T3311] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.561360][ T3318] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 38.570798][ T3318] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 38.580416][ T3318] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 38.605104][ T3311] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.624395][ T1402] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.631493][ T1402] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.641121][ T1402] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.648192][ T1402] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.659764][ T3312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.693732][ T3312] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.702447][ T3315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.732777][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.740007][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.748797][ T52] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.755887][ T52] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.770656][ T3321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.789828][ T3315] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.806767][ T3321] 8021q: adding VLAN 0 to HW filter on device team0 [ 38.822147][ T3312] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 38.832657][ T3312] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 38.844896][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.852128][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.862857][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 38.869960][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 38.879731][ T52] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.886884][ T52] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.924317][ T52] bridge0: port 2(bridge_slave_1) entered blocking state [ 38.931422][ T52] bridge0: port 2(bridge_slave_1) entered forwarding state [ 38.961564][ T3311] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 38.973518][ T3318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 38.988084][ T3318] 8021q: adding VLAN 0 to HW filter on device team0 [ 39.006093][ T3315] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 39.016578][ T3315] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 39.043870][ T57] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.050964][ T57] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.059646][ T57] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.066777][ T57] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.085419][ T3312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 39.159993][ T3321] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 39.205241][ T3315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 39.248294][ T3318] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 39.279177][ T3312] veth0_vlan: entered promiscuous mode [ 39.322393][ T3312] veth1_vlan: entered promiscuous mode [ 39.361512][ T3311] veth0_vlan: entered promiscuous mode [ 39.379391][ T3315] veth0_vlan: entered promiscuous mode [ 39.395825][ T3311] veth1_vlan: entered promiscuous mode [ 39.403006][ T3321] veth0_vlan: entered promiscuous mode [ 39.409841][ T3312] veth0_macvtap: entered promiscuous mode [ 39.421514][ T3315] veth1_vlan: entered promiscuous mode [ 39.437253][ T3321] veth1_vlan: entered promiscuous mode [ 39.444133][ T3312] veth1_macvtap: entered promiscuous mode [ 39.457676][ T3321] veth0_macvtap: entered promiscuous mode [ 39.474135][ T3311] veth0_macvtap: entered promiscuous mode [ 39.485944][ T3321] veth1_macvtap: entered promiscuous mode [ 39.493098][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.500844][ T3318] veth0_vlan: entered promiscuous mode [ 39.516134][ T3315] veth0_macvtap: entered promiscuous mode [ 39.523673][ T3315] veth1_macvtap: entered promiscuous mode [ 39.531077][ T3311] veth1_macvtap: entered promiscuous mode [ 39.539983][ T3318] veth1_vlan: entered promiscuous mode [ 39.549349][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.567736][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.578296][ T37] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.589026][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.601547][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.608910][ T37] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.621061][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.631568][ T37] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.641900][ T37] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.651670][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.664995][ T37] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.676572][ T3311] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.692895][ T37] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.706338][ T3318] veth0_macvtap: entered promiscuous mode [ 39.723622][ T37] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.732472][ T37] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.743031][ T3312] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 39.760180][ T3318] veth1_macvtap: entered promiscuous mode [ 39.773415][ T37] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.785777][ T37] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.820621][ T37] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.836916][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 39.865817][ T3483] loop1: detected capacity change from 0 to 1024 [ 39.868820][ T3318] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 39.872990][ T3483] EXT4-fs: Ignoring removed orlov option [ 39.883272][ T37] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 39.916164][ T29] kauditd_printk_skb: 40 callbacks suppressed [ 39.916182][ T29] audit: type=1326 audit(1760394348.313:112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3486 comm="syz.3.4" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa0416aeec9 code=0x7ffc0000 [ 39.929779][ T3483] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 39.957304][ T29] audit: type=1326 audit(1760394348.353:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3486 comm="syz.3.4" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa0416aeec9 code=0x7ffc0000 [ 39.980809][ T29] audit: type=1326 audit(1760394348.353:114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3486 comm="syz.3.4" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa0416aeec9 code=0x7ffc0000 [ 39.984486][ T37] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.003997][ T29] audit: type=1326 audit(1760394348.353:115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3486 comm="syz.3.4" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa0416aeec9 code=0x7ffc0000 [ 40.035678][ T29] audit: type=1326 audit(1760394348.353:116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3486 comm="syz.3.4" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa0416aeec9 code=0x7ffc0000 [ 40.059866][ T29] audit: type=1326 audit(1760394348.353:117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3486 comm="syz.3.4" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa0416aeec9 code=0x7ffc0000 [ 40.083299][ T29] audit: type=1326 audit(1760394348.353:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3486 comm="syz.3.4" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa0416aeec9 code=0x7ffc0000 [ 40.106665][ T29] audit: type=1326 audit(1760394348.353:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3486 comm="syz.3.4" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa0416aeec9 code=0x7ffc0000 [ 40.117614][ T37] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.129807][ T29] audit: type=1326 audit(1760394348.353:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3486 comm="syz.3.4" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa0416aeec9 code=0x7ffc0000 [ 40.161764][ T29] audit: type=1326 audit(1760394348.353:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3486 comm="syz.3.4" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa0416aeec9 code=0x7ffc0000 [ 40.174000][ T3495] capability: warning: `syz.2.3' uses deprecated v2 capabilities in a way that may be insecure [ 40.228928][ T37] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.242477][ T3492] loop4: detected capacity change from 0 to 512 [ 40.263918][ T37] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.274618][ T31] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.274955][ T3492] ------------[ cut here ]------------ [ 40.290361][ T3492] EA inode 11 i_nlink=2 [ 40.290785][ T3492] WARNING: CPU: 1 PID: 3492 at fs/ext4/xattr.c:1058 ext4_xattr_inode_update_ref+0x36a/0x380 [ 40.293703][ T31] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.295105][ T3492] Modules linked in: [ 40.308312][ T31] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.313887][ T3492] [ 40.317939][ T31] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 40.326463][ T3492] CPU: 1 UID: 0 PID: 3492 Comm: syz.4.5 Not tainted syzkaller #0 PREEMPT(voluntary) [ 40.347175][ T3492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 40.357494][ T3492] RIP: 0010:ext4_xattr_inode_update_ref+0x36a/0x380 [ 40.364450][ T3492] Code: 90 49 8d 7e 40 e8 66 01 b9 ff 4d 8b 6e 40 4c 89 e7 e8 7a fc b8 ff 41 8b 56 48 48 c7 c7 b2 4d 55 86 4c 89 ee e8 c7 08 68 ff 90 <0f> 0b 90 90 e9 ff fe ff ff e8 08 77 b0 03 0f 1f 84 00 00 00 00 00 [ 40.384362][ T3492] RSP: 0018:ffffc9000211f5a0 EFLAGS: 00010246 [ 40.390460][ T3492] RAX: 478cf184f51c5700 RBX: ffff8881073f5308 RCX: 0000000000080000 [ 40.398546][ T3492] RDX: ffffc90002f05000 RSI: 000000000001d13d RDI: 000000000001d13e [ 40.406613][ T3492] RBP: 0000000000000002 R08: 0001c9000211f427 R09: 0000000000000000 [ 40.414827][ T3492] R10: 00000000ffffffff R11: 0000000000000002 R12: ffff8881073f52b8 [ 40.422927][ T3492] R13: 000000000000000b R14: ffff8881073f5270 R15: 0000000000000001 [ 40.431014][ T3492] FS: 00007f66b6d376c0(0000) GS:ffff8882aef3a000(0000) knlGS:0000000000000000 [ 40.440062][ T3492] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 40.446844][ T3492] CR2: 0000200000011000 CR3: 000000011ae12000 CR4: 00000000003506f0 [ 40.454898][ T3492] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 40.463421][ T3492] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 40.471526][ T3492] Call Trace: [ 40.474929][ T3492] [ 40.477904][ T3492] ext4_xattr_set_entry+0x77f/0x1020 [ 40.483293][ T3492] ext4_xattr_ibody_set+0x184/0x3c0 [ 40.488541][ T3492] ext4_expand_extra_isize_ea+0xcbb/0x11f0 [ 40.494511][ T3492] __ext4_expand_extra_isize+0x246/0x280 [ 40.500224][ T3492] __ext4_mark_inode_dirty+0x29d/0x3f0 [ 40.505820][ T3492] ext4_evict_inode+0x80e/0xd90 [ 40.510717][ T3492] ? __pfx_ext4_evict_inode+0x10/0x10 [ 40.516180][ T3492] evict+0x2e3/0x550 [ 40.520130][ T3492] ? __dquot_initialize+0x146/0x7c0 [ 40.525409][ T3492] iput+0x4ed/0x650 [ 40.529277][ T3492] ext4_process_orphan+0x1a9/0x1c0 [ 40.534489][ T3492] ext4_orphan_cleanup+0x6a8/0xa00 [ 40.539654][ T3492] ext4_fill_super+0x3483/0x3810 [ 40.544679][ T3492] ? snprintf+0x86/0xb0 [ 40.548899][ T3492] ? set_blocksize+0x1a8/0x310 [ 40.553712][ T3492] ? sb_set_blocksize+0xe3/0x100 [ 40.559062][ T3492] ? setup_bdev_super+0x30e/0x370 [ 40.564481][ T3492] ? __pfx_ext4_fill_super+0x10/0x10 [ 40.569800][ T3492] get_tree_bdev_flags+0x291/0x300 [ 40.575038][ T3492] ? __pfx_ext4_fill_super+0x10/0x10 [ 40.580400][ T3492] get_tree_bdev+0x1f/0x30 [ 40.584958][ T3492] ext4_get_tree+0x1c/0x30 [ 40.589421][ T3492] vfs_get_tree+0x57/0x1d0 [ 40.593904][ T3492] do_new_mount+0x24d/0x660 [ 40.598515][ T3492] path_mount+0x4a5/0xb70 [ 40.602890][ T3492] ? user_path_at+0x109/0x130 [ 40.607667][ T3492] __se_sys_mount+0x28c/0x2e0 [ 40.612381][ T3492] __x64_sys_mount+0x67/0x80 [ 40.617041][ T3492] x64_sys_call+0x2b51/0x3000 [ 40.621755][ T3492] do_syscall_64+0xd2/0x200 [ 40.626327][ T3492] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 40.632511][ T3492] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 40.638324][ T3492] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 40.644332][ T3492] RIP: 0033:0x7f66b82d066a [ 40.648768][ T3492] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb a6 e8 de 1a 00 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 40.669794][ T3492] RSP: 002b:00007f66b6d36e68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 40.678284][ T3492] RAX: ffffffffffffffda RBX: 00007f66b6d36ef0 RCX: 00007f66b82d066a [ 40.686391][ T3492] RDX: 0000200000000180 RSI: 00002000000001c0 RDI: 00007f66b6d36eb0 [ 40.694419][ T3492] RBP: 0000200000000180 R08: 00007f66b6d36ef0 R09: 0000000000800718 [ 40.702425][ T3492] R10: 0000000000800718 R11: 0000000000000246 R12: 00002000000001c0 [ 40.710517][ T3492] R13: 00007f66b6d36eb0 R14: 0000000000000473 R15: 0000200000000680 [ 40.718571][ T3492] [ 40.721604][ T3492] ---[ end trace 0000000000000000 ]--- [ 40.731393][ T3492] EXT4-fs (loop4): 1 orphan inode deleted [ 40.737688][ T3492] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 40.854288][ T3311] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.009828][ T3510] loop4: detected capacity change from 0 to 256 [ 41.035490][ T3510] ======================================================= [ 41.035490][ T3510] WARNING: The mand mount option has been deprecated and [ 41.035490][ T3510] and is ignored by this kernel. Remove the mand [ 41.035490][ T3510] option from the mount to silence this warning. [ 41.035490][ T3510] ======================================================= [ 41.138963][ T3513] loop3: detected capacity change from 0 to 4096 [ 41.157991][ T3312] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.197587][ T3513] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 41.223136][ T3518] loop1: detected capacity change from 0 to 512 [ 41.231283][ T3513] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.266406][ T3518] EXT4-fs (loop1): 1 orphan inode deleted [ 41.283304][ T3518] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 41.318416][ T3523] netlink: 52 bytes leftover after parsing attributes in process `syz.3.12'. [ 41.343899][ T3520] Illegal XDP return value 4294967274 on prog (id 10) dev N/A, expect packet loss! [ 41.356099][ T3312] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 41.418875][ T3528] blktrace: Concurrent blktraces are not allowed on sg0 [ 41.438998][ T3531] process 'syz.0.14' launched './file0' with NULL argv: empty string added [ 41.492377][ T3536] FAULT_INJECTION: forcing a failure. [ 41.492377][ T3536] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 41.505575][ T3536] CPU: 1 UID: 0 PID: 3536 Comm: syz.2.17 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 41.505639][ T3536] Tainted: [W]=WARN [ 41.505648][ T3536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 41.505664][ T3536] Call Trace: [ 41.505672][ T3536] [ 41.505679][ T3536] __dump_stack+0x1d/0x30 [ 41.505701][ T3536] dump_stack_lvl+0xe8/0x140 [ 41.505724][ T3536] dump_stack+0x15/0x1b [ 41.505746][ T3536] should_fail_ex+0x265/0x280 [ 41.505847][ T3536] should_fail+0xb/0x20 [ 41.505887][ T3536] should_fail_usercopy+0x1a/0x20 [ 41.505915][ T3536] _copy_to_user+0x20/0xa0 [ 41.506094][ T3536] simple_read_from_buffer+0xb5/0x130 [ 41.506119][ T3536] proc_fail_nth_read+0x10e/0x150 [ 41.506161][ T3536] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 41.506200][ T3536] vfs_read+0x1a8/0x770 [ 41.506291][ T3536] ? __rcu_read_unlock+0x4f/0x70 [ 41.506316][ T3536] ? __fget_files+0x184/0x1c0 [ 41.506353][ T3536] ksys_read+0xda/0x1a0 [ 41.506382][ T3536] __x64_sys_read+0x40/0x50 [ 41.506447][ T3536] x64_sys_call+0x27c0/0x3000 [ 41.506565][ T3536] do_syscall_64+0xd2/0x200 [ 41.506599][ T3536] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 41.506634][ T3536] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 41.506726][ T3536] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 41.506751][ T3536] RIP: 0033:0x7f89fca5d8dc [ 41.506798][ T3536] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 41.506822][ T3536] RSP: 002b:00007f89fb4bf030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 41.506855][ T3536] RAX: ffffffffffffffda RBX: 00007f89fccb5fa0 RCX: 00007f89fca5d8dc [ 41.506870][ T3536] RDX: 000000000000000f RSI: 00007f89fb4bf0a0 RDI: 0000000000000004 [ 41.506881][ T3536] RBP: 00007f89fb4bf090 R08: 0000000000000000 R09: 0000000000000000 [ 41.506897][ T3536] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 41.506912][ T3536] R13: 00007f89fccb6038 R14: 00007f89fccb5fa0 R15: 00007fffa5092d38 [ 41.506938][ T3536] [ 41.754306][ T3540] loop0: detected capacity change from 0 to 1024 [ 41.763483][ T3540] EXT4-fs: Ignoring removed orlov option [ 41.835340][ T3540] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 41.879918][ T3555] loop2: detected capacity change from 0 to 512 [ 41.904838][ T3555] EXT4-fs (loop2): 1 orphan inode deleted [ 41.911631][ T3555] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 41.938157][ T3315] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.102831][ T3568] usb usb1: usbfs: interface 0 claimed by hub while 'syz.2.27' sets config #1 [ 42.136634][ T3570] usb usb1: usbfs: interface 0 claimed by hub while 'syz.2.28' sets config #1 [ 42.175228][ T3571] netlink: 48 bytes leftover after parsing attributes in process `syz.3.22'. [ 42.184112][ T3571] tc_dump_action: action bad kind [ 42.203319][ T3573] netlink: 8 bytes leftover after parsing attributes in process `syz.2.29'. [ 42.246722][ T3573] netlink: 168 bytes leftover after parsing attributes in process `syz.2.29'. [ 42.255950][ T3573] FAULT_INJECTION: forcing a failure. [ 42.255950][ T3573] name failslab, interval 1, probability 0, space 0, times 1 [ 42.268739][ T3573] CPU: 0 UID: 0 PID: 3573 Comm: syz.2.29 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 42.268776][ T3573] Tainted: [W]=WARN [ 42.268783][ T3573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 42.268795][ T3573] Call Trace: [ 42.268800][ T3573] [ 42.268808][ T3573] __dump_stack+0x1d/0x30 [ 42.268829][ T3573] dump_stack_lvl+0xe8/0x140 [ 42.268869][ T3573] dump_stack+0x15/0x1b [ 42.268970][ T3573] should_fail_ex+0x265/0x280 [ 42.269054][ T3573] ? mac802154_llsec_key_add+0x364/0x8d0 [ 42.269150][ T3573] should_failslab+0x8c/0xb0 [ 42.269183][ T3573] __kmalloc_cache_noprof+0x4c/0x4a0 [ 42.269226][ T3573] mac802154_llsec_key_add+0x364/0x8d0 [ 42.269282][ T3573] ieee802154_add_llsec_key+0x4a/0x70 [ 42.269314][ T3573] nl802154_add_llsec_key+0x33a/0x420 [ 42.269413][ T3573] genl_family_rcv_msg_doit+0x143/0x1b0 [ 42.269445][ T3573] genl_rcv_msg+0x422/0x460 [ 42.269465][ T3573] ? __pfx_nl802154_pre_doit+0x10/0x10 [ 42.269493][ T3573] ? __pfx_nl802154_add_llsec_key+0x10/0x10 [ 42.269531][ T3573] ? __pfx_nl802154_post_doit+0x10/0x10 [ 42.269621][ T3573] netlink_rcv_skb+0x123/0x220 [ 42.269657][ T3573] ? __pfx_genl_rcv_msg+0x10/0x10 [ 42.269727][ T3573] genl_rcv+0x28/0x40 [ 42.269746][ T3573] netlink_unicast+0x5c0/0x690 [ 42.269774][ T3573] netlink_sendmsg+0x58b/0x6b0 [ 42.269897][ T3573] ? __pfx_netlink_sendmsg+0x10/0x10 [ 42.270010][ T3573] __sock_sendmsg+0x145/0x180 [ 42.270036][ T3573] ____sys_sendmsg+0x31e/0x4e0 [ 42.270080][ T3573] ___sys_sendmsg+0x17b/0x1d0 [ 42.270135][ T3573] __x64_sys_sendmsg+0xd4/0x160 [ 42.270223][ T3573] x64_sys_call+0x191e/0x3000 [ 42.270275][ T3573] do_syscall_64+0xd2/0x200 [ 42.270301][ T3573] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 42.270331][ T3573] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 42.270352][ T3573] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 42.270436][ T3573] RIP: 0033:0x7f89fca5eec9 [ 42.270456][ T3573] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 42.270480][ T3573] RSP: 002b:00007f89fb4bf038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 42.270577][ T3573] RAX: ffffffffffffffda RBX: 00007f89fccb5fa0 RCX: 00007f89fca5eec9 [ 42.270593][ T3573] RDX: 0000000000000000 RSI: 00002000000010c0 RDI: 000000000000000b [ 42.270610][ T3573] RBP: 00007f89fb4bf090 R08: 0000000000000000 R09: 0000000000000000 [ 42.270626][ T3573] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 42.270643][ T3573] R13: 00007f89fccb6038 R14: 00007f89fccb5fa0 R15: 00007fffa5092d38 [ 42.270735][ T3573] [ 42.567725][ T3318] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 42.568003][ T3575] loop1: detected capacity change from 0 to 128 [ 42.592487][ T3575] EXT4-fs: Ignoring removed mblk_io_submit option [ 42.619376][ T3580] netlink: 14 bytes leftover after parsing attributes in process `syz.0.30'. [ 42.631932][ T3575] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=16, mo=a842e018, mo2=0002] [ 42.643436][ T3580] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 42.652177][ T3575] System zones: 1-3, 19-19, 35-36 [ 42.660362][ T3575] EXT4-fs (loop1): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 42.674491][ T3580] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 42.719666][ T3580] bond0 (unregistering): Released all slaves [ 42.726863][ T3575] ext4 filesystem being mounted at /4/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 42.784015][ T3585] loop4: detected capacity change from 0 to 512 [ 42.934384][ T3595] unsupported nla_type 52263 [ 42.970794][ T3595] netlink: 'syz.2.35': attribute type 4 has an invalid length. [ 43.110514][ T3312] EXT4-fs (loop1): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 43.182899][ T3595] syz.2.35 (3595) used greatest stack depth: 10480 bytes left [ 43.219788][ C1] hrtimer: interrupt took 48071 ns [ 43.438502][ T3604] loop2: detected capacity change from 0 to 4096 [ 43.473147][ T3604] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 43.615629][ T3615] usb usb1: usbfs: interface 0 claimed by hub while 'syz.0.39' sets config #1 [ 43.661409][ T3617] pimreg: entered allmulticast mode [ 43.680210][ T3617] pimreg: left allmulticast mode [ 43.717074][ T3621] loop4: detected capacity change from 0 to 512 [ 43.726006][ T3617] netlink: 12 bytes leftover after parsing attributes in process `syz.1.40'. [ 43.858752][ T3621] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 43.873844][ T3621] ext4 filesystem being mounted at /5/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 43.890846][ T3621] EXT4-fs error (device loop4): ext4_do_update_inode:5624: inode #2: comm syz.4.43: corrupted inode contents [ 43.897806][ T3628] loop1: detected capacity change from 0 to 512 [ 43.954411][ T3621] EXT4-fs error (device loop4): ext4_dirty_inode:6509: inode #2: comm syz.4.43: mark_inode_dirty error [ 43.967380][ T3315] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 43.983699][ T3621] EXT4-fs error (device loop4): ext4_do_update_inode:5624: inode #2: comm syz.4.43: corrupted inode contents [ 44.003501][ T3628] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 44.016603][ T3628] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 44.055876][ T3628] EXT4-fs warning (device loop1): ext4_expand_extra_isize_ea:2853: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 44.063265][ T3621] EXT4-fs error (device loop4): __ext4_ext_dirty:206: inode #2: comm syz.4.43: mark_inode_dirty error [ 44.084460][ T3628] EXT4-fs (loop1): 1 truncate cleaned up [ 44.091115][ T3628] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 44.118311][ T3640] syz.2.45 (3640) used greatest stack depth: 10080 bytes left [ 44.187060][ T3312] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 44.220119][ T3642] loop2: detected capacity change from 0 to 512 [ 44.351948][ T3642] EXT4-fs (loop2): 1 orphan inode deleted [ 44.359053][ T3311] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 44.378174][ T3642] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 44.584845][ T3315] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 44.657893][ T3648] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 44.729079][ T3648] netlink: 'syz.4.48': attribute type 7 has an invalid length. [ 44.736776][ T3648] netlink: 8 bytes leftover after parsing attributes in process `syz.4.48'. [ 44.744131][ T3657] pim6reg: entered allmulticast mode [ 44.766137][ T3661] usb usb1: usbfs: interface 0 claimed by hub while 'syz.0.52' sets config #1 [ 44.885741][ T3669] FAULT_INJECTION: forcing a failure. [ 44.885741][ T3669] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 44.898945][ T3669] CPU: 1 UID: 0 PID: 3669 Comm: +}[@ Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 44.899018][ T3669] Tainted: [W]=WARN [ 44.899025][ T3669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 44.899038][ T3669] Call Trace: [ 44.899044][ T3669] [ 44.899051][ T3669] __dump_stack+0x1d/0x30 [ 44.899087][ T3669] dump_stack_lvl+0xe8/0x140 [ 44.899158][ T3669] dump_stack+0x15/0x1b [ 44.899175][ T3669] should_fail_ex+0x265/0x280 [ 44.899211][ T3669] should_fail+0xb/0x20 [ 44.899244][ T3669] should_fail_usercopy+0x1a/0x20 [ 44.899339][ T3669] _copy_from_user+0x1c/0xb0 [ 44.899364][ T3669] memdup_user+0x5e/0xd0 [ 44.899390][ T3669] strndup_user+0x68/0xb0 [ 44.899415][ T3669] __se_sys_mount+0x4d/0x2e0 [ 44.899486][ T3669] ? fput+0x8f/0xc0 [ 44.899587][ T3669] ? ksys_write+0x192/0x1a0 [ 44.899612][ T3669] __x64_sys_mount+0x67/0x80 [ 44.899635][ T3669] x64_sys_call+0x2b51/0x3000 [ 44.899658][ T3669] do_syscall_64+0xd2/0x200 [ 44.899710][ T3669] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 44.899738][ T3669] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 44.899761][ T3669] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 44.899784][ T3669] RIP: 0033:0x7feb2472eec9 [ 44.899864][ T3669] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 44.899883][ T3669] RSP: 002b:00007feb23197038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 44.899903][ T3669] RAX: ffffffffffffffda RBX: 00007feb24985fa0 RCX: 00007feb2472eec9 [ 44.899916][ T3669] RDX: 0000200000000080 RSI: 0000200000000000 RDI: 0000000000000000 [ 44.899952][ T3669] RBP: 00007feb23197090 R08: 0000200000000300 R09: 0000000000000000 [ 44.899964][ T3669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 44.899977][ T3669] R13: 00007feb24986038 R14: 00007feb24985fa0 R15: 00007ffd523914c8 [ 44.899996][ T3669] [ 45.115483][ T3673] loop4: detected capacity change from 0 to 256 [ 45.142794][ T29] kauditd_printk_skb: 623 callbacks suppressed [ 45.142814][ T29] audit: type=1326 audit(1760394353.503:745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3664 comm="syz.4.55" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f66b82ceec9 code=0x7ffc0000 [ 45.174355][ T29] audit: type=1326 audit(1760394353.503:746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3664 comm="syz.4.55" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f66b82ceec9 code=0x7ffc0000 [ 45.198618][ T29] audit: type=1326 audit(1760394353.503:747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3664 comm="syz.4.55" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f66b82ceec9 code=0x7ffc0000 [ 45.222005][ T29] audit: type=1326 audit(1760394353.503:748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3664 comm="syz.4.55" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f66b82ceec9 code=0x7ffc0000 [ 45.245643][ T29] audit: type=1326 audit(1760394353.503:749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3664 comm="syz.4.55" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f66b82ceec9 code=0x7ffc0000 [ 45.269397][ T29] audit: type=1326 audit(1760394353.503:750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3664 comm="syz.4.55" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f66b82ceec9 code=0x7ffc0000 [ 45.292662][ T29] audit: type=1326 audit(1760394353.503:751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3664 comm="syz.4.55" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f66b82ceec9 code=0x7ffc0000 [ 45.316832][ T29] audit: type=1326 audit(1760394353.503:752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3664 comm="syz.4.55" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f66b82ceec9 code=0x7ffc0000 [ 45.316880][ T29] audit: type=1326 audit(1760394353.503:753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3664 comm="syz.4.55" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f66b82ceec9 code=0x7ffc0000 [ 45.316914][ T29] audit: type=1326 audit(1760394353.503:754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3664 comm="syz.4.55" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f66b82ceec9 code=0x7ffc0000 [ 45.435425][ T3680] 9pnet_fd: Insufficient options for proto=fd [ 45.453742][ T3683] loop3: detected capacity change from 0 to 128 [ 45.466485][ T3683] EXT4-fs: Ignoring removed mblk_io_submit option [ 45.484401][ T3683] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=16, mo=a842e018, mo2=0002] [ 45.503480][ T3683] System zones: 1-3, 19-19, 35-36 [ 45.509391][ T3683] EXT4-fs (loop3): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 45.547179][ T3683] ext4 filesystem being mounted at /9/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 45.585999][ T3689] FAULT_INJECTION: forcing a failure. [ 45.585999][ T3689] name failslab, interval 1, probability 0, space 0, times 0 [ 45.598837][ T3689] CPU: 0 UID: 0 PID: 3689 Comm: syz.1.63 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 45.598875][ T3689] Tainted: [W]=WARN [ 45.598948][ T3689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 45.598965][ T3689] Call Trace: [ 45.598973][ T3689] [ 45.598981][ T3689] __dump_stack+0x1d/0x30 [ 45.599005][ T3689] dump_stack_lvl+0xe8/0x140 [ 45.599059][ T3689] dump_stack+0x15/0x1b [ 45.599081][ T3689] should_fail_ex+0x265/0x280 [ 45.599179][ T3689] should_failslab+0x8c/0xb0 [ 45.599257][ T3689] __kmalloc_cache_node_noprof+0x54/0x4a0 [ 45.599298][ T3689] ? __get_vm_area_node+0x106/0x1d0 [ 45.599415][ T3689] __get_vm_area_node+0x106/0x1d0 [ 45.599493][ T3689] __vmalloc_node_range_noprof+0x28c/0xed0 [ 45.599532][ T3689] ? bpf_prog_alloc_no_stats+0x47/0x3b0 [ 45.599580][ T3689] ? cred_has_capability+0x210/0x280 [ 45.599620][ T3689] ? bpf_prog_alloc_no_stats+0x47/0x3b0 [ 45.599706][ T3689] __vmalloc_noprof+0x83/0xc0 [ 45.599746][ T3689] ? bpf_prog_alloc_no_stats+0x47/0x3b0 [ 45.599847][ T3689] bpf_prog_alloc_no_stats+0x47/0x3b0 [ 45.599885][ T3689] ? bpf_prog_alloc+0x2a/0x150 [ 45.599924][ T3689] bpf_prog_alloc+0x3c/0x150 [ 45.600054][ T3689] bpf_prog_load+0x506/0x1100 [ 45.600169][ T3689] ? security_bpf+0x2b/0x90 [ 45.600273][ T3689] __sys_bpf+0x469/0x7c0 [ 45.600314][ T3689] __x64_sys_bpf+0x41/0x50 [ 45.600362][ T3689] x64_sys_call+0x2aee/0x3000 [ 45.600419][ T3689] do_syscall_64+0xd2/0x200 [ 45.600445][ T3689] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 45.600473][ T3689] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 45.600568][ T3689] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 45.600599][ T3689] RIP: 0033:0x7feb2472eec9 [ 45.600617][ T3689] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 45.600667][ T3689] RSP: 002b:00007feb23197038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 45.600694][ T3689] RAX: ffffffffffffffda RBX: 00007feb24985fa0 RCX: 00007feb2472eec9 [ 45.600711][ T3689] RDX: 0000000000000094 RSI: 0000200000000180 RDI: 0000000000000005 [ 45.600729][ T3689] RBP: 00007feb23197090 R08: 0000000000000000 R09: 0000000000000000 [ 45.600746][ T3689] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 45.600763][ T3689] R13: 00007feb24986038 R14: 00007feb24985fa0 R15: 00007ffd523914c8 [ 45.600849][ T3689] [ 45.600858][ T3689] syz.1.63: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null) [ 45.838682][ T3690] chnl_net:caif_netlink_parms(): no params data found [ 45.840564][ T3689] ,cpuset=/,mems_allowed=0 [ 45.868668][ T3689] CPU: 0 UID: 0 PID: 3689 Comm: syz.1.63 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 45.868822][ T3689] Tainted: [W]=WARN [ 45.868830][ T3689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 45.868847][ T3689] Call Trace: [ 45.868856][ T3689] [ 45.868866][ T3689] __dump_stack+0x1d/0x30 [ 45.868936][ T3689] dump_stack_lvl+0xe8/0x140 [ 45.868975][ T3689] dump_stack+0x15/0x1b [ 45.868993][ T3689] warn_alloc+0x12b/0x1a0 [ 45.869096][ T3689] __vmalloc_node_range_noprof+0x2b1/0xed0 [ 45.869148][ T3689] ? cred_has_capability+0x210/0x280 [ 45.869190][ T3689] ? bpf_prog_alloc_no_stats+0x47/0x3b0 [ 45.869234][ T3689] __vmalloc_noprof+0x83/0xc0 [ 45.869295][ T3689] ? bpf_prog_alloc_no_stats+0x47/0x3b0 [ 45.869327][ T3689] bpf_prog_alloc_no_stats+0x47/0x3b0 [ 45.869425][ T3689] ? bpf_prog_alloc+0x2a/0x150 [ 45.869463][ T3689] bpf_prog_alloc+0x3c/0x150 [ 45.869491][ T3689] bpf_prog_load+0x506/0x1100 [ 45.869595][ T3689] ? security_bpf+0x2b/0x90 [ 45.869618][ T3689] __sys_bpf+0x469/0x7c0 [ 45.869675][ T3689] __x64_sys_bpf+0x41/0x50 [ 45.869744][ T3689] x64_sys_call+0x2aee/0x3000 [ 45.869766][ T3689] do_syscall_64+0xd2/0x200 [ 45.869788][ T3689] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 45.869813][ T3689] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 45.869899][ T3689] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 45.869927][ T3689] RIP: 0033:0x7feb2472eec9 [ 45.869954][ T3689] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 45.869972][ T3689] RSP: 002b:00007feb23197038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 45.869989][ T3689] RAX: ffffffffffffffda RBX: 00007feb24985fa0 RCX: 00007feb2472eec9 [ 45.870000][ T3689] RDX: 0000000000000094 RSI: 0000200000000180 RDI: 0000000000000005 [ 45.870017][ T3689] RBP: 00007feb23197090 R08: 0000000000000000 R09: 0000000000000000 [ 45.870028][ T3689] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 45.870039][ T3689] R13: 00007feb24986038 R14: 00007feb24985fa0 R15: 00007ffd523914c8 [ 45.870057][ T3689] [ 45.870072][ T3689] Mem-Info: [ 46.088755][ T3689] active_anon:7859 inactive_anon:1 isolated_anon:0 [ 46.088755][ T3689] active_file:8703 inactive_file:8906 isolated_file:0 [ 46.088755][ T3689] unevictable:0 dirty:1548 writeback:0 [ 46.088755][ T3689] slab_reclaimable:3134 slab_unreclaimable:14129 [ 46.088755][ T3689] mapped:29169 shmem:250 pagetables:1174 [ 46.088755][ T3689] sec_pagetables:0 bounce:0 [ 46.088755][ T3689] kernel_misc_reclaimable:0 [ 46.088755][ T3689] free:1888163 free_pcp:10528 free_cma:0 [ 46.136466][ T3689] Node 0 active_anon:31436kB inactive_anon:4kB active_file:34812kB inactive_file:35624kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:116676kB dirty:6192kB writeback:0kB shmem:1000kB kernel_stack:3344kB pagetables:4696kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 46.165810][ T3689] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 46.195909][ T3689] lowmem_reserve[]: 0 2883 7862 7862 [ 46.201238][ T3689] Node 0 DMA32 free:2949156kB boost:0kB min:4132kB low:7064kB high:9996kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:3129332kB managed:2952688kB mlocked:0kB bounce:0kB free_pcp:3532kB local_pcp:3532kB free_cma:0kB [ 46.232729][ T3689] lowmem_reserve[]: 0 0 4978 4978 [ 46.237895][ T3689] Node 0 Normal free:4588136kB boost:0kB min:7184kB low:12280kB high:17376kB reserved_highatomic:0KB free_highatomic:0KB active_anon:31436kB inactive_anon:4kB active_file:34812kB inactive_file:35624kB unevictable:0kB writepending:6192kB zspages:0kB present:5242880kB managed:5098240kB mlocked:0kB bounce:0kB free_pcp:38584kB local_pcp:34716kB free_cma:0kB [ 46.273257][ T3689] lowmem_reserve[]: 0 0 0 0 [ 46.277825][ T3689] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 46.290682][ T3689] Node 0 DMA32: 3*4kB (M) 3*8kB (M) 6*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 3*1024kB (M) 3*2048kB (M) 717*4096kB (M) = 2949156kB [ 46.307004][ T3689] Node 0 Normal: 2*4kB (UE) 2*8kB (UM) 2*16kB (UE) 1*32kB (U) 2*64kB (UE) 3*128kB (UME) 0*256kB 2*512kB (ME) 3*1024kB (UM) 2*2048kB (ME) 1118*4096kB (UM) = 4588120kB [ 46.323878][ T3689] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 46.333275][ T3689] 17846 total pagecache pages [ 46.338052][ T3689] 1 pages in swap cache [ 46.342233][ T3689] Free swap = 124992kB [ 46.346557][ T3689] Total swap = 124996kB [ 46.350748][ T3689] 2097051 pages RAM [ 46.354585][ T3689] 0 pages HighMem/MovableOnly [ 46.359370][ T3689] 80479 pages reserved [ 46.387231][ T3706] usb usb1: usbfs: interface 0 claimed by hub while 'syz.4.64' sets config #1 [ 46.436622][ T3690] bridge0: port 1(bridge_slave_0) entered blocking state [ 46.444077][ T3690] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.451592][ T3690] bridge_slave_0: entered allmulticast mode [ 46.458436][ T3690] bridge_slave_0: entered promiscuous mode [ 46.465564][ T3690] bridge0: port 2(bridge_slave_1) entered blocking state [ 46.472676][ T3690] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.480152][ T3690] bridge_slave_1: entered allmulticast mode [ 46.486925][ T3690] bridge_slave_1: entered promiscuous mode [ 46.517623][ T3690] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 46.527165][ T3715] loop1: detected capacity change from 0 to 1024 [ 46.537663][ T3690] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 46.553976][ T3715] EXT4-fs: Ignoring removed orlov option [ 46.575207][ T3321] EXT4-fs (loop3): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 46.575635][ T3690] team0: Port device team_slave_0 added [ 46.594492][ T3715] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 46.604142][ T3690] team0: Port device team_slave_1 added [ 46.690460][ T3690] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 46.697640][ T3690] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 46.723651][ T3690] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 46.770707][ T3690] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 46.777811][ T3690] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 46.803761][ T3690] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 46.846760][ T3734] loop3: detected capacity change from 0 to 1024 [ 46.863773][ T3690] hsr_slave_0: entered promiscuous mode [ 46.869731][ T3734] EXT4-fs: Ignoring removed nobh option [ 46.870113][ T3690] hsr_slave_1: entered promiscuous mode [ 46.875440][ T3734] EXT4-fs: Ignoring removed nobh option [ 46.891674][ T3735] loop4: detected capacity change from 0 to 256 [ 46.898666][ T3690] debugfs: 'hsr0' already exists in 'hsr' [ 46.904475][ T3690] Cannot create hsr debugfs directory [ 46.909566][ T3734] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (62631!=20869) [ 46.920268][ T3734] EXT4-fs error (device loop3): ext4_get_journal_inode:5808: comm syz.3.74: inode #4294967295: comm syz.3.74: iget: illegal inode # [ 46.954325][ T3734] EXT4-fs (loop3): no journal found [ 46.960177][ T3734] EXT4-fs (loop3): can't get journal size [ 46.977779][ T3734] EXT4-fs (loop3): failed to initialize system zone (-22) [ 46.998526][ T3734] EXT4-fs (loop3): mount failed [ 47.042923][ T3734] loop3: detected capacity change from 0 to 512 [ 47.058037][ T3734] EXT4-fs (loop3): mounted filesystem 00800000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 47.095379][ T3690] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 47.105099][ T3690] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 47.112121][ T3734] EXT4-fs warning (device loop3): ext4_enable_quotas:7180: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 47.117418][ T3690] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 47.148747][ T3690] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 47.188587][ T3690] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.195742][ T3690] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.203220][ T3690] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.210372][ T3690] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.251155][ T382] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 47.266950][ T3321] EXT4-fs (loop3): unmounting filesystem 00800000-0000-0000-0000-000000000000. [ 47.288287][ T3690] 8021q: adding VLAN 0 to HW filter on device bond0 [ 47.300400][ T382] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 47.317346][ T3312] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 47.328426][ T3758] FAULT_INJECTION: forcing a failure. [ 47.328426][ T3758] name failslab, interval 1, probability 0, space 0, times 0 [ 47.333580][ T3690] 8021q: adding VLAN 0 to HW filter on device team0 [ 47.341235][ T3758] CPU: 1 UID: 0 PID: 3758 Comm: syz.3.78 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 47.341281][ T3758] Tainted: [W]=WARN [ 47.341325][ T3758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 47.341344][ T3758] Call Trace: [ 47.341352][ T3758] [ 47.341364][ T3758] __dump_stack+0x1d/0x30 [ 47.341394][ T3758] dump_stack_lvl+0xe8/0x140 [ 47.341420][ T3758] dump_stack+0x15/0x1b [ 47.341449][ T3758] should_fail_ex+0x265/0x280 [ 47.341498][ T3758] should_failslab+0x8c/0xb0 [ 47.341550][ T3758] __kmalloc_node_noprof+0xaa/0x580 [ 47.341593][ T3758] ? __vmalloc_node_range_noprof+0x410/0xed0 [ 47.341640][ T3758] __vmalloc_node_range_noprof+0x410/0xed0 [ 47.341717][ T3758] ? cred_has_capability+0x210/0x280 [ 47.341754][ T3758] ? bpf_prog_alloc_no_stats+0x47/0x3b0 [ 47.341870][ T3758] __vmalloc_noprof+0x83/0xc0 [ 47.341911][ T3758] ? bpf_prog_alloc_no_stats+0x47/0x3b0 [ 47.341995][ T3758] bpf_prog_alloc_no_stats+0x47/0x3b0 [ 47.342039][ T3758] ? bpf_prog_alloc+0x2a/0x150 [ 47.342084][ T3758] bpf_prog_alloc+0x3c/0x150 [ 47.342133][ T3758] bpf_prog_load+0x506/0x1100 [ 47.342173][ T3758] ? security_bpf+0x2b/0x90 [ 47.342269][ T3758] __sys_bpf+0x469/0x7c0 [ 47.342327][ T3758] __x64_sys_bpf+0x41/0x50 [ 47.342433][ T3758] x64_sys_call+0x2aee/0x3000 [ 47.342463][ T3758] do_syscall_64+0xd2/0x200 [ 47.342497][ T3758] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 47.342575][ T3758] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 47.342607][ T3758] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 47.342669][ T3758] RIP: 0033:0x7fa0416aeec9 [ 47.342693][ T3758] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 47.342718][ T3758] RSP: 002b:00007fa040117038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 47.342747][ T3758] RAX: ffffffffffffffda RBX: 00007fa041905fa0 RCX: 00007fa0416aeec9 [ 47.342765][ T3758] RDX: 0000000000000094 RSI: 00002000000001c0 RDI: 0000000000000005 [ 47.342784][ T3758] RBP: 00007fa040117090 R08: 0000000000000000 R09: 0000000000000000 [ 47.342801][ T3758] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 47.342819][ T3758] R13: 00007fa041906038 R14: 00007fa041905fa0 R15: 00007ffe82190798 [ 47.342870][ T3758] [ 47.414478][ T3760] FAULT_INJECTION: forcing a failure. [ 47.414478][ T3760] name failslab, interval 1, probability 0, space 0, times 0 [ 47.593333][ T3760] CPU: 1 UID: 0 PID: 3760 Comm: syz.3.80 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 47.593371][ T3760] Tainted: [W]=WARN [ 47.593377][ T3760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 47.593404][ T3760] Call Trace: [ 47.593410][ T3760] [ 47.593417][ T3760] __dump_stack+0x1d/0x30 [ 47.593504][ T3760] dump_stack_lvl+0xe8/0x140 [ 47.593522][ T3760] dump_stack+0x15/0x1b [ 47.593596][ T3760] should_fail_ex+0x265/0x280 [ 47.593677][ T3760] should_failslab+0x8c/0xb0 [ 47.593757][ T3760] kmem_cache_alloc_noprof+0x50/0x480 [ 47.593782][ T3760] ? __anon_vma_prepare+0x70/0x2f0 [ 47.593892][ T3760] __anon_vma_prepare+0x70/0x2f0 [ 47.593998][ T3760] do_wp_page+0x18ee/0x2510 [ 47.594018][ T3760] ? __rcu_read_lock+0x37/0x50 [ 47.594038][ T3760] ? css_rstat_updated+0xb7/0x240 [ 47.594069][ T3760] ? __rcu_read_lock+0x37/0x50 [ 47.594092][ T3760] handle_mm_fault+0x77d/0x2be0 [ 47.594201][ T3760] ? vma_start_read+0x141/0x1f0 [ 47.594239][ T3760] do_user_addr_fault+0x630/0x1080 [ 47.594319][ T3760] ? fpregs_assert_state_consistent+0xb4/0xe0 [ 47.594349][ T3760] exc_page_fault+0x62/0xa0 [ 47.594367][ T3760] asm_exc_page_fault+0x26/0x30 [ 47.594450][ T3760] RIP: 0033:0x7fa041570c03 [ 47.594465][ T3760] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 47.594481][ T3760] RSP: 002b:00007fa0401164a0 EFLAGS: 00010202 [ 47.594534][ T3760] RAX: 0000000000000400 RBX: 00007fa040116540 RCX: 00007fa037cf7000 [ 47.594545][ T3760] RDX: 00007fa0401166e0 RSI: 0000000000000000 RDI: 00007fa0401165e0 [ 47.594570][ T3760] RBP: 00000000000000f9 R08: 0000000000000008 R09: 00000000000000a8 [ 47.594580][ T3760] R10: 00000000000000c0 R11: 00007fa040116540 R12: 0000000000000001 [ 47.594591][ T3760] R13: 00007fa04174db80 R14: 0000000000000020 R15: 00007fa0401165e0 [ 47.594608][ T3760] [ 47.594627][ T3760] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 47.797300][ T3760] loop3: detected capacity change from 0 to 512 [ 47.807257][ T382] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 47.820226][ T3760] EXT4-fs (loop3): failed to initialize system zone (-117) [ 47.846477][ T382] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 47.856956][ T3760] EXT4-fs (loop3): mount failed [ 47.907163][ T3690] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 47.915850][ T3777] netlink: 104 bytes leftover after parsing attributes in process `syz.3.84'. [ 47.978738][ T382] bridge_slave_1: left allmulticast mode [ 47.984651][ T382] bridge_slave_1: left promiscuous mode [ 47.990347][ T382] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.013325][ T382] bridge_slave_0: left allmulticast mode [ 48.019053][ T382] bridge_slave_0: left promiscuous mode [ 48.024874][ T382] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.097758][ T3782] loop3: detected capacity change from 0 to 4096 [ 48.108252][ T3788] netlink: 12 bytes leftover after parsing attributes in process `syz.1.87'. [ 48.121615][ T3782] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 48.138754][ T3782] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 48.183673][ T382] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 48.192388][ T3795] 9pnet: Could not find request transport: fd [ 48.410202][ T3815] __dump_stack+0x1d/0x30 [ 48.410233][ T3815] dump_stack_lvl+0xe8/0x140 [ 48.410262][ T3815] dump_stack+0x15/0x1b [ 48.410302][ T3815] should_fail_ex+0x265/0x280 [ 48.410418][ T3815] should_failslab+0x8c/0xb0 [ 48.410456][ T3815] __kmalloc_noprof+0xa5/0x570 [ 48.410561][ T3815] ? bpf_test_init+0x86/0x140 [ 48.410602][ T3815] bpf_test_init+0x86/0x140 [ 48.410639][ T3815] bpf_prog_test_run_xdp+0x392/0x970 [ 48.410727][ T3815] ? __rcu_read_unlock+0x4f/0x70 [ 48.410769][ T3815] ? __pfx_bpf_prog_test_run_xdp+0x10/0x10 [ 48.410816][ T3815] bpf_prog_test_run+0x22a/0x390 [ 48.410858][ T3815] __sys_bpf+0x4c0/0x7c0 [ 48.410914][ T3815] __x64_sys_bpf+0x41/0x50 [ 48.410979][ T3815] x64_sys_call+0x2aee/0x3000 [ 48.411011][ T3815] do_syscall_64+0xd2/0x200 [ 48.411046][ T3815] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 48.411092][ T3815] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 48.411123][ T3815] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 48.411155][ T3815] RIP: 0033:0x7f887be1eec9 [ 48.411175][ T3815] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 48.411201][ T3815] RSP: 002b:00007f887a87f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 48.411228][ T3815] RAX: ffffffffffffffda RBX: 00007f887c075fa0 RCX: 00007f887be1eec9 [ 48.411298][ T3815] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 48.411316][ T3815] RBP: 00007f887a87f090 R08: 0000000000000000 R09: 0000000000000000 [ 48.411333][ T3815] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 48.411417][ T3815] R13: 00007f887c076038 R14: 00007f887c075fa0 R15: 00007fffdc067798 [ 48.411444][ T3815] [ 48.441535][ T3819] loop1: detected capacity change from 0 to 256 [ 48.448589][ T382] veth1_vlan: left promiscuous mode [ 48.633606][ T382] veth0_vlan: left promiscuous mode [ 48.718191][ T3834] FAULT_INJECTION: forcing a failure. [ 48.718191][ T3834] name failslab, interval 1, probability 0, space 0, times 0 [ 48.730911][ T3834] CPU: 1 UID: 0 PID: 3834 Comm: syz.1.97 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 48.730996][ T3834] Tainted: [W]=WARN [ 48.731005][ T3834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 48.731021][ T3834] Call Trace: [ 48.731029][ T3834] [ 48.731039][ T3834] __dump_stack+0x1d/0x30 [ 48.731106][ T3834] dump_stack_lvl+0xe8/0x140 [ 48.731200][ T3834] dump_stack+0x15/0x1b [ 48.731221][ T3834] should_fail_ex+0x265/0x280 [ 48.731263][ T3834] ? audit_log_d_path+0x8d/0x150 [ 48.731283][ T3834] should_failslab+0x8c/0xb0 [ 48.731316][ T3834] __kmalloc_cache_noprof+0x4c/0x4a0 [ 48.731363][ T3834] audit_log_d_path+0x8d/0x150 [ 48.731389][ T3834] audit_log_d_path_exe+0x42/0x70 [ 48.731415][ T3834] audit_log_task+0x1e9/0x250 [ 48.731456][ T3834] audit_seccomp+0x61/0x100 [ 48.731488][ T3834] ? __seccomp_filter+0x82d/0x1250 [ 48.731555][ T3834] __seccomp_filter+0x83e/0x1250 [ 48.731599][ T3834] __secure_computing+0x82/0x150 [ 48.731624][ T3834] syscall_trace_enter+0xcf/0x1e0 [ 48.731679][ T3834] do_syscall_64+0xac/0x200 [ 48.731788][ T3834] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 48.731868][ T3834] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 48.731895][ T3834] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 48.731993][ T3834] RIP: 0033:0x7feb2472d8dc [ 48.732013][ T3834] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 48.732037][ T3834] RSP: 002b:00007feb23197030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 48.732062][ T3834] RAX: ffffffffffffffda RBX: 00007feb24985fa0 RCX: 00007feb2472d8dc [ 48.732079][ T3834] RDX: 000000000000000f RSI: 00007feb231970a0 RDI: 0000000000000003 [ 48.732095][ T3834] RBP: 00007feb23197090 R08: 0000000000000000 R09: 0000000000000000 [ 48.732133][ T3834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 48.732145][ T3834] R13: 00007feb24986038 R14: 00007feb24985fa0 R15: 00007ffd523914c8 [ 48.732164][ T3834] [ 48.933849][ T382] pim6reg (unregistering): left allmulticast mode [ 49.008991][ T3840] netlink: 12 bytes leftover after parsing attributes in process `syz.1.100'. [ 49.021629][ T382] team0 (unregistering): Port device team_slave_1 removed [ 49.032656][ T382] team0 (unregistering): Port device team_slave_0 removed [ 49.060007][ T3844] usb usb1: usbfs: interface 0 claimed by hub while 'syz.4.102' sets config #1 [ 49.079314][ T3795] faux_driver regulatory: loading /lib/firmware/regulatory.db failed with error -4 [ 49.088767][ T3795] faux_driver regulatory: Direct firmware load for regulatory.db failed with error -4 [ 49.261807][ T3690] veth0_vlan: entered promiscuous mode [ 49.289904][ T3870] loop3: detected capacity change from 0 to 764 [ 49.295921][ T3690] veth1_vlan: entered promiscuous mode [ 49.314343][ T3873] loop4: detected capacity change from 0 to 128 [ 49.350523][ T3873] EXT4-fs: Ignoring removed mblk_io_submit option [ 49.356044][ T3690] veth0_macvtap: entered promiscuous mode [ 49.386039][ T3876] netlink: 4 bytes leftover after parsing attributes in process `syz.1.111'. [ 49.415382][ T3690] veth1_macvtap: entered promiscuous mode [ 49.452104][ T3882] loop3: detected capacity change from 0 to 764 [ 49.484210][ T3873] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=16, mo=a842e018, mo2=0002] [ 49.492081][ T3690] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 49.517995][ T3873] System zones: 1-3, 19-19, 35-36 [ 49.525890][ T3304] ================================================================== [ 49.534022][ T3304] BUG: KCSAN: data-race in generic_fillattr / shmem_symlink [ 49.541099][ T3873] EXT4-fs (loop4): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 49.541365][ T3304] [ 49.541374][ T3304] write to 0xffff8881090df818 of 8 bytes by task 3493 on cpu 1: [ 49.555908][ T3690] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 49.555937][ T3304] shmem_symlink+0x37a/0x3d0 [ 49.555963][ T3304] vfs_symlink+0xd4/0x1e0 [ 49.555985][ T3304] do_symlinkat+0xc7/0x3c0 [ 49.556005][ T3304] __x64_sys_symlink+0x50/0x60 [ 49.589391][ T3304] x64_sys_call+0x23d0/0x3000 [ 49.594114][ T3304] do_syscall_64+0xd2/0x200 [ 49.598649][ T3304] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 49.604559][ T3304] [ 49.606895][ T3304] read to 0xffff8881090df818 of 8 bytes by task 3304 on cpu 0: [ 49.614632][ T3304] generic_fillattr+0x201/0x340 [ 49.619516][ T3304] shmem_getattr+0x181/0x200 [ 49.624122][ T3304] vfs_getattr_nosec+0x146/0x1e0 [ 49.629085][ T3304] vfs_statx+0x113/0x390 [ 49.633362][ T3304] vfs_fstatat+0x115/0x170 [ 49.637809][ T3304] __se_sys_newfstatat+0x55/0x260 [ 49.642876][ T3304] __x64_sys_newfstatat+0x55/0x70 [ 49.647962][ T3304] x64_sys_call+0x135a/0x3000 [ 49.653182][ T3304] do_syscall_64+0xd2/0x200 [ 49.657714][ T3304] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 49.663638][ T3304] [ 49.665968][ T3304] value changed: 0x0000000068ed7c73 -> 0x0000000068ed7c75 [ 49.673086][ T3304] [ 49.675428][ T3304] Reported by Kernel Concurrency Sanitizer on: [ 49.681593][ T3304] CPU: 0 UID: 0 PID: 3304 Comm: udevd Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 49.692490][ T3304] Tainted: [W]=WARN [ 49.696304][ T3304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 49.706377][ T3304] ================================================================== [ 49.744983][ T12] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.754088][ T12] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.786887][ T3873] ext4 filesystem being mounted at /17/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 49.861667][ T12] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.877754][ T12] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 49.975986][ T3311] EXT4-fs (loop4): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09.