last executing test programs: 5m27.20533049s ago: executing program 2 (id=78): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff47}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x9, 0x4, 0x7ffc0002}]}) r3 = getpid() process_vm_readv(r3, 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f0000000100), 0xffffffffffffffff) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) r5 = syz_clone(0x4200000, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x200000}, 0x1c) listen(r6, 0x9) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f0000000d40)=@nat={'nat\x00', 0x1b, 0x5, 0x578, 0x180, 0x270, 0xffffffff, 0x380, 0x180, 0x4a8, 0x4a8, 0xffffffff, 0x4a8, 0x4a8, 0x5, &(0x7f0000000540), {[{{@uncond, 0x0, 0x138, 0x180, 0x0, {}, [@common=@srh1={{0x90}, {0x3a, 0xbe, 0x8, 0x3, 0x6, @remote, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, @private2={0xfc, 0x2, '\x00', 0xf}, [0xff, 0xffffffff, 0xffffff00, 0xff000000], [0xff, 0x0, 0xff, 0xffffff00], [0xffffffff, 0x0, 0xff000000, 0xffffff00], 0x1001}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x9, @ipv6=@empty, @ipv6=@loopback, @icmp_id=0x66, @icmp_id=0x67}}}, {{@ipv6={@mcast2, @loopback, [0xff000000, 0xffffff00, 0xff000000, 0xffffff00], [0xff000000, 0xffffffff, 0xffffff00, 0xff], 'vlan0\x00', 'vcan0\x00', {0xff}, {0xff}, 0x4, 0x6, 0x2, 0x1}, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x2, @ipv4=@rand_addr=0x64010102, @ipv4=@dev={0xac, 0x14, 0x14, 0x1c}, @gre_key=0x9, @port=0x4e24}}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @remote}, @dev={0xfe, 0x80, '\x00', 0x27}, [0x0, 0xffffff00, 0xffffff00, 0xff], [0xff, 0xffff00, 0xff, 0xffffff00], 'syzkaller1\x00', 'veth0\x00', {}, {}, 0x2b, 0x9, 0x4, 0x36}, 0x0, 0xd0, 0x110, 0x0, {}, [@common=@eui64={{0x28}}]}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0xd6, 0x1, "804a86bc8053352e1caf252273bea8179924a37cdb3801a4d9655e6c2086"}}}, {{@uncond, 0x0, 0xe0, 0x128, 0x0, {}, [@common=@unspec=@quota={{0x38}, {0x1, 0x0, 0x10001, {0xfffffffffffffff8}}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x3, @ipv4=@local, @ipv4=@local, @gre_key=0x4, @gre_key=0x7}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x5d8) wait4(r5, 0x0, 0x40000000, 0x0) 5m26.693870233s ago: executing program 2 (id=88): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x2c, 0x24, 0x4ee4e6a52ff56541, 0x70bd26, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0x6}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_qfg={0x8}]}, 0x2c}}, 0x24040084) r4 = socket(0x400000000010, 0x3, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0xb}, 0x110d41, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r7}, &(0x7f0000000180), &(0x7f00000001c0)=r6}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8, 0x0, 0x3}, 0x18) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)=@newtfilter={0x38, 0x2c, 0xd27, 0x30bd29, 0x25dfdc00, {0x0, 0x0, 0x0, r9, {0x0, 0x2}, {}, {0x8}}, [@filter_kind_options=@f_matchall={{0xd}, {0x4}}]}, 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x0) 5m26.571954234s ago: executing program 2 (id=93): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000980)='\xff\x00\x00\x00\x00\x00\x000`\x14\x99\x06\xc0\x7fs\x00\t\x14\x17\xc3\xf5\xc9\v\x85\xe7\x00\x00\x18\x88\x06\x94\x98\xa9\xe7\x1c\x8a\x89\xdc\xcc\xf7L\xbd%\xc3!\x0e\x91S\xb2~8\"\xe2\xed\xbf\x12\x1a\\6p\'p\xef\x1a\n\x99\x12\xe8\'\x1c\x97M\xa5N\xd9\xbeV&\x1c2K?\x95\xd9\"\xbe\x050+\xca\xea\'\xe9)\xfe\xeb\x9c\xb5\xa0F`\xe4D\x10F\x831\xec\\v\xf0\xab_M\b\x03\xc3\n\x89\x01E`\xd35Q2\xecZz\xdc\x065p\x1c\x8f\x9b\x99IGXO\x00\x00\v\xed\xb0\xc5\xd4\xc7,\x1a\xb3}CMOO\x8a\xa8kh\x7f\x05c\xfc\xebb\xc8\xa2\xa9\xbf\xb3\x9b\xafE\xbd\xc5\xdc\xde\xbe_') r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x118}}, 0x0) 5m26.543519714s ago: executing program 2 (id=95): syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, &(0x7f00000012c0), 0xfe, 0x244, &(0x7f0000000400)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000002c0)=0x10) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101842, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x143041, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000040)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) syz_mount_image$ext4(&(0x7f0000000540)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x88, &(0x7f0000000300)={[{@nogrpid}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6a}}, {@errors_remount}, {@nodiscard}, {@noblock_validity}]}, 0x3, 0x438, &(0x7f0000000580)="$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") connect$inet6(0xffffffffffffffff, 0x0, 0x0) r6 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000100)={@dev, 0x0}, &(0x7f0000000140)=0x14) bind$can_raw(r6, &(0x7f0000000240)={0x1d, r7}, 0x10) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e24, 0x4f, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x3a}}}, 0x1c) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(0xffffffffffffffff, 0x0, 0x24000010) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(r8, 0x8008f513, &(0x7f00000003c0)) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 5m23.048589878s ago: executing program 2 (id=138): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18020000ffffffff00000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0, 0x2) r1 = perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x6, 0x40, 0x6, 0x0, 0x4000000000, 0xd4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x8}, 0x100082, 0x7ff, 0x6, 0x7, 0xb, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002b2000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) pipe(&(0x7f0000005880)) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="aa", 0x1, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x6}, 0x3}, 0x1c) shutdown(0xffffffffffffffff, 0x1) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x2000077d, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='ip_vti0\x00', 0x10) sendmsg$inet(r2, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f00000000c0)="d2", 0x200000c1}], 0x1}, 0x60) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x12011, r1, 0x0) mbind(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4005, 0x0, 0x6, 0x2) perf_event_open(&(0x7f00000005c0)={0x2, 0x80, 0x44, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x8, 0x81}, 0x1149f1, 0x0, 0x2, 0x2, 0x2, 0x100002, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r4, &(0x7f00000004c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x70, 0x3, 0x6, 0x401, 0x0, 0x0, {0x0, 0x0, 0x8}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x70}, 0x1, 0x0, 0x0, 0x40080}, 0x800) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000080)='9p_client_res\x00', r0}, 0x10) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX]) 5m22.79734269s ago: executing program 2 (id=140): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000980)='\xff\x00\x00\x00\x00\x00\x000`\x14\x99\x06\xc0\x7fs\x00\t\x14\x17\xc3\xf5\xc9\v\x85\xe7\x00\x00\x18\x88\x06\x94\x98\xa9\xe7\x1c\x8a\x89\xdc\xcc\xf7L\xbd%\xc3!\x0e\x91S\xb2~8\"\xe2\xed\xbf\x12\x1a\\6p\'p\xef\x1a\n\x99\x12\xe8\'\x1c\x97M\xa5N\xd9\xbeV&\x1c2K?\x95\xd9\"\xbe\x050+\xca\xea\'\xe9)\xfe\xeb\x9c\xb5\xa0F`\xe4D\x10F\x831\xec\\v\xf0\xab_M\b\x03\xc3\n\x89\x01E`\xd35Q2\xecZz\xdc\x065p\x1c\x8f\x9b\x99IGXO\x00\x00\v\xed\xb0\xc5\xd4\xc7,\x1a\xb3}CMOO\x8a\xa8kh\x7f\x05c\xfc\xebb\xc8\xa2\xa9\xbf\xb3\x9b\xafE\xbd\xc5\xdc\xde\xbe_') r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x118}}, 0x0) 5m22.79719586s ago: executing program 32 (id=140): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000980)='\xff\x00\x00\x00\x00\x00\x000`\x14\x99\x06\xc0\x7fs\x00\t\x14\x17\xc3\xf5\xc9\v\x85\xe7\x00\x00\x18\x88\x06\x94\x98\xa9\xe7\x1c\x8a\x89\xdc\xcc\xf7L\xbd%\xc3!\x0e\x91S\xb2~8\"\xe2\xed\xbf\x12\x1a\\6p\'p\xef\x1a\n\x99\x12\xe8\'\x1c\x97M\xa5N\xd9\xbeV&\x1c2K?\x95\xd9\"\xbe\x050+\xca\xea\'\xe9)\xfe\xeb\x9c\xb5\xa0F`\xe4D\x10F\x831\xec\\v\xf0\xab_M\b\x03\xc3\n\x89\x01E`\xd35Q2\xecZz\xdc\x065p\x1c\x8f\x9b\x99IGXO\x00\x00\v\xed\xb0\xc5\xd4\xc7,\x1a\xb3}CMOO\x8a\xa8kh\x7f\x05c\xfc\xebb\xc8\xa2\xa9\xbf\xb3\x9b\xafE\xbd\xc5\xdc\xde\xbe_') r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x118}}, 0x0) 4m41.061513551s ago: executing program 4 (id=938): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000100), &(0x7f0000000240)=0x4) r2 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x7) ioctl$TCFLSH(r0, 0x400455c8, 0x0) r3 = syz_usb_connect(0x2, 0xfffffffffffffe86, 0x0, 0x0) r4 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000280), &(0x7f00000002c0)=0x10, 0x0) setsockopt(r4, 0xc493, 0x9, &(0x7f0000000300)="7571e9261d8b4d74174ed15a254a52f09ec92cd0911c7ab3c0e828c4b34d4dd883f88ce9901e993c81a5035944898d762a4b45c66e6806729e0a19ba1c2f6a8e512c3d3b9f1ca587f897e5bb273dbd6e4292accf6cbc90aab238eb71cbf034d21db6250b8558866aa1", 0x69) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYRES64=r3], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@base={0x7, 0x4, 0x80, 0xe, 0x28}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r5}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7, 0x0, 0x4}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="190000000400000008000000"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x18) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x11, &(0x7f00000003c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@alu={0x4, 0x1, 0x2, 0xf891c254a5ac873f, 0x3, 0x80, 0x1}, @exit], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000480)='GPL\x00', 0x8, 0x1000, &(0x7f0000000b80)=""/4096, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x4, 0xd, 0x3ff, 0x8}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000540)=[{0x2, 0x1, 0x10, 0x6}, {0x4, 0x1, 0x0, 0x3}, {0x4, 0x3, 0x5}, {0x4, 0x2, 0x8, 0x5}]}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x17, 0x16, &(0x7f0000000740)=ANY=[@ANYBLOB="61124c000000000061138c0000000000bf200000000000000703000008ff0200ad0301000000000095000000000000006916000000000000bf67000000000000170600000fff07006706000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070500000419311f2d3001000000000095000000000000000500000000000000950000000000000032ed3c5be95e76b67754bb12dc8c27df8ecf264e0f84f9f17d3c30e3c72fe9751f008554bb4f2278af6d71d79a5e12810a089dc1d4681d295c45a674f888a08034b7dd399703d6c4f633a9a4f16d0a3e1282ee45a010fb94fa9de56c9d8a814261bdb94a65f78238b89dc6c60bf70d742a81b72bab8395fa64810b5b1bfd3782519518c505000000b8fab4d4d897db2c544c0e0895a9044f50c50b8eac8c63d2b1cd06a39702bd547f5ebaa69520bbb15f4f01cef3c9bacec15e2e3b2bd352e93a22adfe8efe33ff2f8ee5476d4ef7a6f0c4704403b9bad2b648e90fff24f69a5ef05f5408ea197ed09a9510ee6063229de2984abdd46ea3ec78e3127002ed37c2564bd98a621483fb2a5ff221e0d831f24759d17b8c59d0f2b0727f6b7958fb5b939af4be5e55a95f8c6d785a91c7c3f0c17ae7f9ac5ff05f5ecddf0cef90d50e763be96496661c749e21ab63a1f50b30a65a9027ba357bf8c614497ee59b68bf6a5d45c81c567e347d54574164bbea3e7b7f8a13cce7014137f250370b8a70ae3eaf6d6f17759c3886871e97d063b7f26eed3226bb0b9ee6320a2b02fea7a06a0e37182adf4b1be6f29358d4f5dfec405bde000000000000000000000000000000902e647cc5962eccaad64429335f3ce2a10ce72da82875427c1d16db24dca08487ba41a3fb337f8432d8176a515229e32ee11a1dd23dac038f989eafdd67f60b63f7be4d1bf325b57335b9973c73bfa89517a98b1fc15f8a2713718feb01059d570a0000e3b2a93bd745a74f9bf7f7abc5d15d56331055cc0820c5c9d676d92557c4e47cfbe27f91e0eb18e21dfdab3c84ec11377fbb00000000848060962bcbc47cefd1a2a7bd3b646614bf7cd3495663de5b63f6b5910daee8ebb7ba84a8b5b6f2d1fbc22a51a500f94c871d5e1d31ab5d7a89965bbdbf355a8544e1688a61f459f3618b3a5416eb143180d3d2c5f4e0b1a556422038801703e109e23944e53f230a3537a5412c7d0bf278c6c1684dd8de90aaa33f47dc2c7b5e4f73784fd31aa2f9d1b1623734f9cf84718b2bad31f651e3607f3ac6c427cb6c0652d21ecd4b29e96c0a3781ee820faab71040768f6b08a69fdfd0b2b7be25f19500c1b8330994efb57a53c1a67bda909630f75738ab40e7ab63d527d6c1e8cf611f05c1b6d0da1ba84d405b4d834162c88022a4625a5f7c431c39f3f9a7789f9b668ec4da9f1a981086dcf4c5a940691f9638ce34dba904483f2ed4e7a713b7eac29c5e122f1b6acd6f1da2"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r8}, 0x94) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000280)={r9, 0xffffffffffffffff, 0x2e, 0x4608, @void}, 0x10) close_range(r9, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x1f87, &(0x7f0000000080)={0x0, 0x0, 0x13580, 0x0, 0x358}, &(0x7f0000000100), 0x0) unshare(0x20060480) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r10 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r10, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x7}, 0x4) semget$private(0x0, 0x4000, 0x0) unshare(0x8000000) semget$private(0x0, 0x4000, 0x0) 4m40.313970136s ago: executing program 4 (id=950): fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='ext4_da_write_pages\x00'}, 0x18) r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x2082) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x40505330, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=ANY=[@ANYRES64=r1], 0x100}, 0x1, 0x7}, 0x14) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x200000b, 0x204031, 0xffffffffffffffff, 0xffffd000) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000040000000404000009"], 0x50) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', 0xffffffffffffffff, 0x0, 0x39}, 0x18) r3 = syz_open_dev$usbfs(&(0x7f0000000180), 0x205, 0x2581) r4 = fcntl$dupfd(r3, 0x0, r3) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) socket$nl_xfrm(0x10, 0x3, 0x6) socket$igmp(0x2, 0x3, 0x2) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000880)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @generic={0x35, 0x1, 0x5, 0x8aff, 0x9}, @cb_func, @cb_func={0x18, 0x6, 0x4, 0x0, 0x7}, @ldst={0x0, 0x3, 0x0, 0x7, 0x4, 0x1, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0x7d}], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xed41d0969ec4053c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r5}, 0x10) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f0000000280)='./bus\x00', 0x2000844, &(0x7f00000041c0)={[{@dots}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x10}}, {@fat=@quiet}, {@fat=@nfs_nostale_ro}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x4}}, {@dots}, {@nodots}, {@fat=@check_normal}, {@nodots}, {@fat=@umask={'umask', 0x3d, 0x4}}, {@fat=@showexec}, {@dots}, {@fat=@sys_immutable}]}, 0x1, 0x24c, &(0x7f0000000500)="$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") r6 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x0, r6, 0x0, 0x41000004, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000ebff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r8}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r9, &(0x7f0000000180)}, 0x20) ioctl$USBDEVFS_SUBMITURB(r4, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0x80, 0xf, 0x0, 0x0, 0x7995}, 0x10007, 0x0, 0x0, 0x48000000, 0x0, 0x40000000, 0x0}) ioctl$USBDEVFS_REAPURB(r3, 0x4008550c, &(0x7f00000034c0)) 4m40.019166918s ago: executing program 4 (id=960): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000740)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000000b00010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000200)=@newlink={0x3c, 0x10, 0x503, 0x2000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x15a08}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_FAIL_OVER_MAC={0x5, 0xd, 0xf}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x0) add_key(&(0x7f0000000280)='rxrpc\x00', 0x0, &(0x7f0000000100)="01000000020000000000006bb55a2a630bf7c045f94cd977", 0x18, 0xffffffffffffffff) 4m39.838681699s ago: executing program 4 (id=966): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f00000000c0)=[{0x0}], 0x1, 0x1) close(r0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x512, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x2000000020000006}, 0x0, 0xfffffffffffffffc, r0, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000780)=[{0x200000000006, 0xf, 0x6, 0x7ffc1ffb}]}) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f0000000080), 0x67, 0x52e, &(0x7f0000000480)="$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") r1 = fspick(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0) r2 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) write$binfmt_register(r2, &(0x7f0000000440)={0x3a, 'syz2', 0x3a, 'M', 0x3a, 0x0, 0x3a, 'usrjquota=', 0x3a, '', 0x3a, './file2', 0x3a, [0x46]}, 0x32) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed074479000000000000009818000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0xc, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x18) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000000, &(0x7f00000006c0), 0x1, 0x512, &(0x7f0000000c40)="$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") mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x40010, r4, 0x2000) 4m39.565057941s ago: executing program 4 (id=974): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000900)=ANY=[@ANYBLOB="140000001000040000000000000000000000000a20000000000a05000000000000000000070000000900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000021940000000c0a01030000000000000000070000000900020073797a31000000000900010073797a30000000006800"], 0x118}}, 0x0) 4m39.080514564s ago: executing program 4 (id=986): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x1, 0x28}, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x18) renameat2(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000380)={'bond0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000001c0)=@newqdisc={0x2c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xb}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) 4m39.046095184s ago: executing program 33 (id=986): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x1, 0x28}, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x18) renameat2(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000380)={'bond0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000001c0)=@newqdisc={0x2c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xb}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mq={0x7}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) 1.71129194s ago: executing program 1 (id=6443): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f000000c300)={{0x14}, [@NFT_MSG_DELRULE={0x20, 0x8, 0xa, 0x5, 0x0, 0x0, {0xa}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x48}}, 0x0) 1.61577354s ago: executing program 1 (id=6444): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0xaf1}, 0x8) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000200)=[{{&(0x7f00000000c0)={0xa, 0x4e23, 0x1, @loopback, 0x1}, 0x1c, &(0x7f0000000580)=[{&(0x7f0000001680)='\t', 0x1}], 0x1}}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000001c0)={0x0, 0xffff}, 0x1000f) 1.475560241s ago: executing program 1 (id=6446): bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000640)={'batadv_slave_1\x00'}) r0 = memfd_create(0x0, 0x1) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x18, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000910000f97a55b1eadbfbfdf9f8d2a19b0000000000"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00', r1}, 0x10) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r3, r2, 0x0, 0x0, 0xfffffffffffffffe}, 0x30) fsetxattr$security_selinux(r0, &(0x7f0000000480), &(0x7f00000004c0)='system_u:object_r:hwdata_t:s0\x00', 0x1a, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r4, 0x0, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0x1f, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x3, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x68, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000300)='kfree\x00', r5, 0x0, 0x8}, 0x18) r6 = io_uring_setup(0x330b, &(0x7f0000000640)={0x0, 0xddae, 0x1, 0x503fc, 0x310}) r7 = socket$rds(0x15, 0x5, 0x0) bind$rds(r7, &(0x7f0000000040)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x2b) sendmsg$rds(r7, &(0x7f0000000080)={&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) close_range(r6, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0xfffffffffffffec4, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) r11 = dup(0xffffffffffffffff) syz_read_part_table(0x593, &(0x7f00000005c0)="$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") clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) ppoll(&(0x7f0000000240)=[{r11, 0x20}, {r8, 0xa059}], 0x2, &(0x7f0000000300)={r12, r13+60000000}, &(0x7f0000000340), 0x8) utimes(&(0x7f0000000380)='./file0\x00', 0x0) shutdown(r4, 0x1) 1.440483091s ago: executing program 5 (id=6447): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x10001) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000700)={{r0}, &(0x7f0000000680), &(0x7f00000006c0)='%pB \x00'}, 0x20) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000018c0), r2) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f00000004c0)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01002abd7000ffdbdf25090000006400038008000100010000000800030004000000140002007665744e315f6d616376746170000000060004000200000008000500e0000000140002006970766c616e31"], 0x78}, 0x1, 0x0, 0x0, 0x4885}, 0x0) 1.302296372s ago: executing program 5 (id=6448): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000027"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x11, 0x14, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8ab8ff00000000bfa200000000000007"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@deltaction={0x48, 0x18, 0x1, 0x70bd2a, 0x25dfdc00, {0xa}, [@TCA_ACT_TAB={0x34, 0x1, [{0xc, 0x8f, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x14, 0x5, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0x10, 0x8, 0x0, 0x0, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x44000}, 0x20040844) 1.280405012s ago: executing program 5 (id=6449): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001480)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='kfree\x00', r2, 0x0, 0x20000000002}, 0x18) r3 = syz_io_uring_setup(0x49a, &(0x7f00000000c0)={0x0, 0x79af, 0x3180, 0x8000, 0x400251}, &(0x7f0000000180)=0x0, &(0x7f0000000300)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f0000000500)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x33, 0x4000, @fd_index=0x1, 0x5, 0x0, 0x0, 0x2, 0x1, {0x2}}) io_uring_enter(r3, 0x627, 0x4c1, 0x43, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0, 0x0, 0x7fff}, 0x18) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="2e0000001000818807b62aa73f72cc9f0ba1f8483a0000005e120602000300000e000a0010000000028000001294", 0x2e}], 0x1}, 0x20008800) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$ETHTOOL_MSG_RINGS_SET(r8, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x10, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0xa7}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x7ff}]}, 0x24}}, 0x800) r9 = syz_genetlink_get_family_id$smc(&(0x7f0000000340), r8) sendmsg$SMC_PNETID_GET(r7, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x20, r9, 0xd18, 0x70bd25, 0x25dfdbff, {}, [@SMC_PNETID_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x20}}, 0x24800) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r10, &(0x7f0000000080)={0x0, 0x12, &(0x7f0000000000)={&(0x7f0000000240)={0x38, 0x1403, 0x1, 0x70bd29, 0x25dfdbff, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'veth0_to_bridge\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x8081}, 0x20000010) 1.235038023s ago: executing program 1 (id=6451): r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x1a2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0xacd42, 0x108) fallocate(r0, 0x0, 0xbf5, 0x2000402) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r3, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x5c, 0x24, 0xf0b, 0x70bd2e, 0x0, {0x0, 0x0, 0x12, 0x0, {0x0, 0x7}, {0xffff, 0xffff}, {0x2}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x2c, 0x2, {{0x3, 0x0, 0x3, 0xe, 0x2, 0xff}, [@TCA_NETEM_DELAY_DIST={0xe, 0x2, "80d3898fbb602d80a88f"}]}}}]}, 0x5c}}, 0x4000010) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000001c0)={'sit0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x25dfdbfc, {0x0, 0x0, 0x0, r6, {0x0, 0xffe0}, {0xffff, 0xffff}, {0x0, 0x7}}, [@qdisc_kind_options=@q_gred={{0x9}, {0x14, 0x2, [@TCA_GRED_DPS={0x10, 0x3, {0x10, 0x1, 0xa}}]}}, @TCA_RATE={0x6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x48801}, 0x4) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001000)={'syztnl0\x00', &(0x7f0000000f80)={'syztnl2\x00', 0x0, 0x2f, 0x8, 0x8, 0xc342, 0x40, @remote, @private2, 0x20, 0x20, 0x4, 0x285}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000001040)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000001200)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000011c0)={&(0x7f0000001480)={0x178, 0x0, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xc0410c690edd0066}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x178}, 0x1, 0x0, 0x0, 0x4000}, 0x810) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x4e102, 0x0) 1.071753373s ago: executing program 5 (id=6457): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f000000c300)={{0x14}, [@NFT_MSG_NEWRULE={0x5c, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @immediate={{0xe}, @val={0x18, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DATA={0xc, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x5, 0x1, "c4"}]}, @NFTA_IMMEDIATE_DREG={0x8, 0x1, 0x1, 0x0, 0x9}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}, @NFT_MSG_DELRULE={0x14, 0x8, 0xa, 0x5, 0x0, 0x0, {0xa}}], {0x14}}, 0x98}}, 0x0) 997.228764ms ago: executing program 0 (id=6462): syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) io_setup(0x2, &(0x7f0000000000)=0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r1) r2 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$PPPIOCGL2TPSTATS(r2, 0x40047452, 0x0) set_mempolicy(0x6005, &(0x7f0000000080)=0xfffffffffffffffd, 0x4) r3 = socket$tipc(0x1e, 0x5, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) bind$tipc(r3, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000380)={0x43, 0x4, 0x3, 0x3}, 0x10) sendmsg$tipc(r3, &(0x7f0000000400)={&(0x7f00000008c0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x3}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x4008030) unshare(0x8000000) timer_create(0xfffffffffffffffd, 0x0, &(0x7f00000000c0)=0x0) timer_settime(r6, 0x0, &(0x7f0000000080)={{0x77359400}, {0x0, 0x989680}}, 0x0) syz_read_part_table(0x407c, &(0x7f0000008140)="$eJzs079KemEYB/BHh98ParHoAt4tAqnjnySnqGhoMAenxgoLQQzSwqWlu+mSuoCuw8AM5FSDFgTx+UzPOd/3efku7+rL00FEFHbuBr1x5BQjYjKd9osRhYioz5JC/ujwutc/v+j237aK+ZiFlb74//A4G/4tfufmWsRpioiV0fPG0Xfa8Uf83zqb/5xMfXzfyzk5bKX2cStljUa1U6mmd7VUyz7fyLJsLvmhGktZL3Wuxum+ezvs3QzS7natnNqXo1TZK6dKs1n/xWYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPDKDhwIAAAAAAD5vzZCVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVFXbgQAAAAAAAyP+1EaqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqwA8cCAAAAAML8rZPo3AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAG4FAAD//xQHINw=") bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYRES64=r6, @ANYRESHEX=r0, @ANYRES64=r4, @ANYRESOCT=r5, @ANYRES16=r6], 0x48) r7 = syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101301) ioctl$USBDEVFS_DROP_PRIVILEGES(r7, 0x4004551e, &(0x7f0000000040)=0x101) bpf$PROG_LOAD(0x5, &(0x7f0000000e80)={0xf, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) timer_gettime(r6, 0x0) 979.764204ms ago: executing program 5 (id=6463): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000240)={0x0, r1}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfa, 0x0, 0xe4}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000640)="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", 0x1a2}, {&(0x7f0000000180)}], 0x2}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001040)="cc5a4dbac0affd0a979c63ea8352d608a51fc8625318716ddf62b7752be4540c4ac7d344c53a3ad28313abc2437b60b03c0e587cafcf9a435bf90c618351f70a828238fdf90bc5d36c7d614b82552649954e0185662defd28f78449f073bad544f586136c5076a6f0f1b6fc9adf80557eb44db1b41824e9ef104c95e999766bbf27d74ad5d8fa63210cde65d384dd3e87c3fedaec3144d1ee66a0eb0750363e346cb930dae6109df6b9955bf8af119b5c9a86622af4ff8b5949fb90f8edbde416d046d61512fe4", 0xc7}], 0x1}}], 0x2, 0x480e0) syz_emit_ethernet(0x86, &(0x7f0000000540)={@broadcast, @random="80cc03df2bac", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x64, 0x0, 0x0, 0x29, 0x0, @empty, @multicast1}, {0x8, 0x0, 0x64, 0x0, @wg=@response={0x220, 0x0, 0x0, "bfd8a5dd2002c0214201001100005efefd7f1afca8f60ffc0e896f38da00", "0b3d22b336984ffb47476e10c3ae64b1", {"bb3b2195c4b058706558a70864bef1f0", "524a72fc660b8cd26e095f24ab642591"}}}}}}}, 0x0) 932.261504ms ago: executing program 5 (id=6465): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100001180000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000005c0)={r0}, 0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @initdev, @initdev}, &(0x7f0000000100)=0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007"], &(0x7f00000001c0)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newtaction={0x14, 0x1d, 0x1, 0x70bd2c, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x2400085d}, 0x24048040) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x19, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', 0xffffffffffffffff, 0x0, 0xb}, 0x18) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800700, &(0x7f0000000000)={[{@errors_remount}, {@bsdgroups}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x40}}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}, {@bsdgroups}, {@oldalloc}, {@resuid}]}, 0x2, 0x44a, &(0x7f0000000400)="$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") 832.458075ms ago: executing program 1 (id=6469): gettid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b7030000000000008500000073000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0, r0}, 0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="30000000100001082bbd70000400000000000000", @ANYRES32=0x0, @ANYBLOB="0000000089f5e8dd08000a00", @ANYRES32=0x0, @ANYBLOB="358e1fefb0b91874e2f39e599c47bf71400c0009bb03ab9807a7d5284753d61a2b476e04fbe2345172fb0800000000000000a7bec58d20b16b74ff090fac0f522e293bff"], 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x13, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x18, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1802000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x41}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) lsm_list_modules(&(0x7f0000000440)=[0x0, 0x0], &(0x7f0000000480)=0x10, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000200)={0x5, {{0xa, 0xfffb, 0x3, @mcast1={0xff, 0x7}, 0x9}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000040000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x15, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="17ffffffffffffdf080000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70809000000e7057b8af807020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x20780, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r6}, &(0x7f0000000800), &(0x7f0000000840)=r7}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r8}, 0x10) flock(r4, 0x5) sendmsg$inet6(r5, &(0x7f0000002280)={&(0x7f0000001e40)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="b0050000000000002900000036"], 0x5b0}, 0x20008001) r9 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r9, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) close_range(r3, 0xffffffffffffffff, 0x0) 786.372715ms ago: executing program 3 (id=6470): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180200000020702500000000002020207b1af8ff00000000bfa100000000000007010000dbffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fffffffffffffff, 0x3}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="c0020000100063d10000000000000000fe8000000000000000000000000000bbfe8000000000000000000000000000aa0000000000000000000000003a000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fc01000000000000000000000000000000000000330000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000b000000000000000000000000000000ffffffffffffffff00000000000000000300"/136], 0x2c0}, 0x1, 0x0, 0x0, 0x40000}, 0x4004) 785.651735ms ago: executing program 6 (id=6471): bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000bf080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b7040000000000008500000001000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0x3}, 0x18) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r3 = openat$selinux_policy(0xffffff9c, &(0x7f0000000180), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r3, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@ip_retopts={{0x14, 0x0, 0x7, {[@timestamp_addr={0x44, 0x4, 0xbc, 0x1, 0x3}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}], 0x30}}], 0x1, 0x1) write$selinux_load(r2, &(0x7f0000000000)=ANY=[], 0xfd44) 736.467086ms ago: executing program 3 (id=6472): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='net_dev_xmit\x00', r1, 0x0, 0x4}, 0x18) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r2, &(0x7f0000000a40)=[{{&(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="ac1414aaffffffff000000001000"/24], 0x30}}], 0x1, 0x4000804) 699.757056ms ago: executing program 3 (id=6473): r0 = socket$key(0xf, 0x3, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)=0xffffff7e, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) timer_settime(0x0, 0x1, &(0x7f0000000880)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000200)={{}, {0x0, 0x3938700}}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r1}, &(0x7f0000000000), &(0x7f00000005c0)=r2}, 0x20) ioctl$USBDEVFS_FREE_STREAMS(0xffffffffffffffff, 0x8008551d, &(0x7f0000000640)=ANY=[@ANYBLOB="3d97000001"]) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000580)={0x2, 0x400000000000003, 0x20, 0x0, 0x13, 0x0, 0x0, 0x0, [@sadb_lifetime={0x4, 0x3, 0x0, 0x0, 0x100000000000000}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @rand_addr=0x64010100}}, @sadb_lifetime={0x4, 0x4, 0x0, 0xfffffffffffffffe}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x4}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @broadcast}}, @sadb_x_sec_ctx={0x1, 0x18, 0x5, 0x5f}]}, 0x98}}, 0x0) 651.397176ms ago: executing program 6 (id=6474): r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4048001) modify_ldt$write2(0x11, &(0x7f0000000040)={0xd, 0x20001000, 0x400, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="07000000040000"], 0x48) pipe2$watch_queue(&(0x7f0000000340)={0xffffffffffffffff}, 0x80) read$watch_queue(r1, &(0x7f00000007c0)=""/247, 0xf7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x8, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000000000000000000007000000181200", @ANYBLOB="0000000000000000b703000000000000850000001b000000b7"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$INCFS_IOC_CREATE_FILE(r2, 0xc058671e, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000300)='kmem_cache_free\x00', r2}, 0x18) sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={0x0, 0x28}, 0x1, 0x7}, 0x0) socket(0x10, 0x3, 0x0) r3 = socket$inet(0x2, 0x5, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x7d, &(0x7f0000000000)=@assoc_value, &(0x7f0000000140)=0x8) 615.851817ms ago: executing program 6 (id=6475): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f000000c300)={{0x14}, [@NFT_MSG_NEWRULE={0x14, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}}, @NFT_MSG_DELRULE={0x20, 0x8, 0xa, 0x5, 0x0, 0x0, {0xa}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x5c}}, 0x0) 615.345957ms ago: executing program 3 (id=6476): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000240)={0x0, r1}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfa, 0x0, 0xe4}]}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000980)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000640)="985e44efeabe001cabcf3d8673c3a254a9a2d3197970cb347b70a243bf77139a94bc3ae91684aaf7b7dff691deb8f8aef2d915fb3a0794a9a9b431a819bca6122c350637808dde804a048fd8696e524b2934126c443ce93d82e931eb9918e6c0827686e59209d2e02c9210fd8048f04ad6c42200fd9232f5aa6a361816bf21afb8473a064f1988536d4b5888807b3aaafaf59f53121782a0a9370dc0feae13c8c2a1dcc8a3122aaa3dcd5b9247a915378e6492e5b94073dcdc87e7c794fb262a7e9ee0b9432f74331c6e9412ac6557c54c6ac72bc24ff70ca2f8ef53773c5cbdf4a583f81fdc8719dbe967b0690a3ed3f314c3e2ceebb3e29d00c2c1053d1e8b32d8a8be1bb9786746e0ee564306c80d7045747165005fa3528b5ac1e35e03b69cb54111dfcebc6d585aacdd57c351ef1aa8050274b122a21b47432f17a0cacfd9524d9cb09029e4daefaea47f8cd5a4f1dee71093ebc076363e14f78dd3b129b4b3ae5a7a085297416f1f1a8aeefa517ed1525ec76469b8b469851cc56c6016d9067dac3de3818856014c98ce8f36dac4d8cdb1f25e3c5de7bdab78066d2418c12e", 0x1a2}, {&(0x7f0000000180)}], 0x2}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001040)="cc5a4dbac0affd0a979c63ea8352d608a51fc8625318716ddf62b7752be4540c4ac7d344c53a3ad28313abc2437b60b03c0e587cafcf9a435bf90c618351f70a828238fdf90bc5d36c7d614b82552649954e0185662defd28f78449f073bad544f586136c5076a6f0f1b6fc9adf80557eb44db1b41824e9ef104c95e999766bbf27d74ad5d8fa63210cde65d384dd3e87c3fedaec3144d1ee66a0eb0750363e346cb930dae6109df6b9955bf8af119b5c9a86622af4ff8b5949fb90f8edbde416d046d61512fe4", 0xc7}], 0x1}}], 0x2, 0x480e0) syz_emit_ethernet(0x86, &(0x7f0000000540)={@broadcast, @random="80cc03df2bac", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x64, 0x0, 0x0, 0x29, 0x0, @empty, @multicast1}, {0x8, 0x0, 0x64, 0x0, @wg=@response={0x220, 0x0, 0x0, "bfd8a5dd2002c0214201001100005efefd7f1afca8f60ffc0e896f38da00", "0b3d22b336984ffb47476e10c3ae64b1", {"bb3b2195c4b058706558a70864bef1f0", "524a72fc660b8cd26e095f24ab642591"}}}}}}}, 0x0) 591.692886ms ago: executing program 6 (id=6477): gettid() r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b7030000000000008500000073000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0, r0}, 0x18) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="30000000100001082bbd70000400000000000000", @ANYRES32=0x0, @ANYBLOB="0000000089f5e8dd08000a00", @ANYRES32=0x0, @ANYBLOB="358e1fefb0b91874e2f39e599c47bf71400c0009bb03ab9807a7d5284753d61a2b476e04fbe2345172fb0800000000000000a7bec58d20b16b74ff090fac0f522e293bff"], 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x13, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x18, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1802000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x41}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) lsm_list_modules(&(0x7f0000000440)=[0x0, 0x0], &(0x7f0000000480)=0x10, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000200)={0x5, {{0xa, 0xfffb, 0x3, @mcast1={0xff, 0x7}, 0x9}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1900000004000000040000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r6}, &(0x7f0000000800), &(0x7f0000000840)}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r7}, 0x10) flock(r4, 0x5) sendmsg$inet6(r5, &(0x7f0000002280)={&(0x7f0000001e40)={0xa, 0x4e24, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="b0050000000000002900000036"], 0x5b0}, 0x20008001) r8 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r8, 0x29, 0x2a, &(0x7f0000000080)={0x5, {{0xa, 0x0, 0xfffffffe, @mcast1={0xff, 0x7}, 0x10}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r8, 0x29, 0x2b, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) setsockopt$inet6_group_source_req(r8, 0x29, 0x2b, 0x0, 0x0) close_range(r3, 0xffffffffffffffff, 0x0) 578.408057ms ago: executing program 3 (id=6478): bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0x8, &(0x7f00000001c0)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000500000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d80)={&(0x7f0000000d40)='mmap_lock_acquire_returned\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000500)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0x32600) bpf$MAP_CREATE_TAIL_CALL(0x1800, &(0x7f0000000600)=ANY=[], 0xaf) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) r3 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f0000000000)={0x5, 0xc, 0x8009, 0x0, 0x9}) r4 = socket$l2tp6(0xa, 0x2, 0x73) fstat(r3, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f00000014c0)={{{@in6=@private1={0xfc, 0x1, '\x00', 0x1}, @in=@loopback, 0x4e22, 0x4, 0x4e24, 0x6, 0x2, 0x80, 0x80, 0x3a, 0x0, r5}, {0x4, 0x8, 0x5, 0x4096, 0x4d1f, 0x4, 0x0, 0xfffffffffffffff9}, {0x87, 0x6, 0x9, 0x9}, 0x7, 0x6e6bc0, 0x0, 0x0, 0x1, 0x1}, {{@in6=@mcast1, 0x4d2, 0x32}, 0xa, @in=@multicast1, 0x3501, 0x0, 0x2, 0x6, 0xb, 0x4, 0xfffff800}}, 0xe8) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0x10080, &(0x7f0000000580)={[{@noload}], [{@seclabel}, {@obj_user={'obj_user', 0x3d, '{-%3-'}}, {@smackfshat}, {@fowner_eq={'fowner', 0x3d, r5}}, {@flag='silent'}]}, 0xee, 0x486, &(0x7f0000001840)="$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") r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000050b6850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r6}, 0x10) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r7, 0x0}, 0x20) syz_io_uring_setup(0x7322, &(0x7f00000003c0)={0x0, 0xa9de, 0x80, 0x1, 0x1dd, 0x0, r2}, &(0x7f0000000080), &(0x7f00000002c0)) timer_create(0x0, 0x0, &(0x7f0000000300)=0x0) timer_delete(r8) syz_read_part_table(0x5da, &(0x7f0000000a00)="$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") shmget(0x1, 0x3000, 0x80, &(0x7f0000ffc000/0x3000)=nil) r9 = socket$netlink(0x10, 0x3, 0x0) writev(r9, &(0x7f00000000c0)=[{&(0x7f0000000040)="3700000013000318680907070000000f0000ff3f13000000170a001700000000040037000d00030001362564aa58b9a6c011f6bbf44dc4", 0x37}], 0x1) mq_notify(r2, &(0x7f00000004c0)={0x0, 0x3c, 0x2}) 525.628157ms ago: executing program 6 (id=6479): r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x1a2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file2\x00', 0xacd42, 0x108) fallocate(r0, 0x0, 0xbf5, 0x2000402) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r3, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000000c0)=@newqdisc={0x5c, 0x24, 0xf0b, 0x70bd2e, 0x0, {0x0, 0x0, 0x12, 0x0, {0x0, 0x7}, {0xffff, 0xffff}, {0x2}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x2c, 0x2, {{0x3, 0x0, 0x3, 0xe, 0x2, 0xff}, [@TCA_NETEM_DELAY_DIST={0xe, 0x2, "80d3898fbb602d80a88f"}]}}}]}, 0x5c}}, 0x4000010) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000001c0)={'sit0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x25dfdbfc, {0x0, 0x0, 0x0, r6, {0x0, 0xffe0}, {0xffff, 0xffff}, {0x0, 0x7}}, [@qdisc_kind_options=@q_gred={{0x9}, {0x14, 0x2, [@TCA_GRED_DPS={0x10, 0x3, {0x10, 0x1, 0xa}}]}}, @TCA_RATE={0x6}]}, 0x4c}, 0x1, 0x0, 0x0, 0x48801}, 0x4) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001000)={'syztnl0\x00', &(0x7f0000000f80)={'syztnl2\x00', 0x0, 0x2f, 0x8, 0x8, 0xc342, 0x40, @remote, @private2, 0x20, 0x20, 0x4, 0x285}}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000001040)={'batadv0\x00', 0x0}) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000001200)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000011c0)={&(0x7f0000001480)={0x178, 0x0, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0xc0410c690edd0066}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x178}, 0x1, 0x0, 0x0, 0x4000}, 0x810) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x4e102, 0x0) 487.377757ms ago: executing program 1 (id=6480): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000180), 0x20075, r0, 0x4}, 0x38) write(0xffffffffffffffff, 0x0, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x50) r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0xfe, 0x0, 0x7ffc0002}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x2f, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) syz_usb_connect(0x4, 0x24, &(0x7f00000000c0)=ANY=[], 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 423.742537ms ago: executing program 0 (id=6481): socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x101400, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x9}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r2}, 0x18) socket$kcm(0x10, 0x2, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000040), 0x800002, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) ioctl$EVIOCGRAB(r3, 0x40044590, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)=@newtfilter={0x24, 0x11, 0x1, 0x691522ea, 0x0, {0x0, 0x0, 0x74, 0x0, {0x10, 0x4}, {}, {0x5, 0xc}}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x4000010) 310.656748ms ago: executing program 3 (id=6482): bpf$MAP_CREATE(0x0, 0x0, 0x8e) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x18, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0, r0}, 0x18) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x40) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x10) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x200000000000008b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x8) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r7}, 0x10) sendto$inet6(r3, &(0x7f0000000000)="aa", 0xffe0, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x6}, 0x3}, 0x1c) 284.198788ms ago: executing program 0 (id=6483): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='net_dev_xmit\x00', r1, 0x0, 0x4}, 0x18) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r2, &(0x7f0000000a40)=[{{&(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="ac1414aaffffffff000000001000"/24], 0x30}}], 0x1, 0x4000804) 201.031939ms ago: executing program 6 (id=6484): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000280)={r0}, 0x4) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000bf080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b7040000000000008500000001"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r3, 0x0, 0x3}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x9, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40e00, 0x10, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="4c00000002060108000034e40000000000000000050001000600000005000400080000000900020073797a3100000000050005000a00000012000300686173683a6e65742c706f7274"], 0x4c}}, 0x2) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000c80)=ANY=[@ANYBLOB="5c000000090601080000000000000000070000000900020073797a310000000005000100ecffffff330007801800018014000240fe8000000000000080000000000000bb060004400e1f00000500070088000000060005404e"], 0x5c}, 0x1, 0x0, 0x0, 0x10000042}, 0x90) sendmsg$RDMA_NLDEV_CMD_GET(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x40, 0x1401, 0x100, 0x70bd28, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r7 = socket(0x1d, 0x2, 0x6) epoll_create(0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) bind$can_j1939(r7, &(0x7f0000000380)={0x1d, r8, 0x1, {0x0, 0x0, 0x3}, 0xff}, 0x18) sendmsg$nl_route_sched_retired(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000032680)=@newchain={0x22a8, 0x64, 0x8, 0x70bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0xa, 0xf}, {0xc, 0x8}, {0xffe0, 0x8}}, [@f_tcindex={{0xc}, {0x2278, 0x2, [@TCA_TCINDEX_POLICE={0x408, 0x6, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x800, 0xe, 0x2, 0x8, 0x8, 0xa, 0x4, 0x1, 0x145, 0x8, 0x3, 0x5, 0x0, 0x5, 0x7, 0x1, 0x1, 0x5, 0x7, 0x8, 0xca, 0xa, 0x5, 0x100, 0xbc5, 0x7, 0x6, 0x7, 0x4, 0x1142, 0x5, 0xfffffffd, 0xffff, 0xf6, 0x80, 0x4, 0x1ff, 0x7f, 0x4, 0x6, 0x949c, 0x7fffffff, 0x5, 0x53, 0xff, 0xffffffff, 0x6, 0x4, 0x2, 0x1, 0x7, 0x80000000, 0x0, 0x0, 0x9, 0x0, 0x0, 0x5, 0x0, 0x80000000, 0x8, 0x3, 0x5, 0xff, 0x9, 0x8dc, 0xf, 0x7ff, 0x6, 0x8, 0xfffffff8, 0x1, 0x8, 0x0, 0x3, 0x2900, 0xff, 0x10001, 0x0, 0x8, 0xc2, 0x497b, 0x10001, 0x8, 0x1, 0xfffffffd, 0x0, 0x8, 0x7ff, 0x8000, 0x7, 0x3, 0x9, 0x100, 0x9, 0x200, 0xcba5, 0xa5, 0x5, 0xd51, 0x7, 0x5, 0x1, 0xffffffff, 0xe79, 0x5, 0x5, 0xf57, 0x1, 0x24, 0x7, 0x0, 0x797, 0x8000, 0x1, 0x0, 0x9, 0x8, 0x1, 0x2, 0x5, 0x80, 0x5, 0x5, 0x8009, 0x8a, 0x7fff, 0xffffffff, 0xfffffbee, 0x1bbe, 0xff8, 0x10001, 0x9, 0x80, 0x4, 0x7, 0x1ff, 0x6, 0x400, 0x5, 0x70ba, 0xa9e, 0x9, 0x6, 0x2, 0x3, 0x7fffffff, 0x3, 0xf, 0xfdc, 0x1, 0x320c8ab8, 0x7ff, 0x96, 0x1, 0x2, 0x20000000, 0x3, 0x401, 0x8, 0x2, 0x3, 0x7f, 0x200, 0x9, 0x2, 0x5, 0x0, 0x0, 0x2, 0x0, 0xd2, 0x1, 0x5, 0x6, 0x3, 0x4, 0x0, 0x8, 0x8, 0xfffffe00, 0x5, 0x9, 0x1ff, 0xa, 0x3a, 0x10, 0x9, 0x7, 0x8, 0x5, 0x4, 0x3ff, 0x1, 0x4, 0xffffffff, 0xe, 0x0, 0x7fff, 0x1, 0x6, 0x1, 0x6, 0x1000, 0x100, 0xff, 0x7, 0x7, 0x7ced, 0x7f, 0x0, 0x2f91, 0x9, 0x4, 0x3, 0xfffffffd, 0x1000, 0x3, 0x0, 0x576a0ed5, 0x0, 0x2, 0x3, 0x0, 0x5, 0x6a9b, 0x3ff, 0x8, 0x80, 0x2, 0x3, 0x6, 0x7, 0x3, 0x5, 0x7fff, 0x1, 0x5, 0x6c, 0xa, 0x120b, 0xd, 0x7, 0x9, 0x3, 0x5b02, 0x3800000, 0x1, 0x0, 0x7, 0x6, 0x6, 0xd816, 0x2, 0x3, 0x80000000]}]}, @TCA_TCINDEX_POLICE={0xc10, 0x6, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x7ff, 0x3, 0x6, 0x5dc, 0xcd30, 0x6, 0x9, 0xbbec, 0xb, 0x2, 0x9, 0xe1, 0xff, 0x23, 0x1, 0x9, 0x5, 0x0, 0xb, 0x7b, 0xfffffff9, 0x36, 0xfffffffc, 0x8, 0xffff1d3d, 0xa2, 0x800000, 0x6, 0xb9, 0x7, 0x7fff, 0x9, 0xf, 0x8, 0x7, 0x8, 0x9, 0x9, 0xffffeffb, 0x400, 0x2, 0x5839, 0xc8, 0x1, 0x5, 0x10000, 0xffb7, 0x681d, 0x3ff, 0x5, 0x3, 0x1000, 0xcb0, 0x2, 0x5, 0xffffffff, 0x7fff, 0x900000, 0xf, 0x0, 0x3, 0x0, 0x6687a1c8, 0x7, 0x7ff, 0xa, 0x5, 0x5, 0x8, 0x0, 0x3, 0x3, 0xcb3, 0x200, 0x8, 0x4, 0x200, 0x8, 0x10001, 0x7, 0x8000, 0xfe000000, 0x8, 0xfffffff8, 0x5, 0xffffffff, 0xb, 0x2, 0x37, 0x800, 0x4, 0x5, 0x4, 0x2, 0x8, 0x2fa, 0x0, 0x6, 0x8, 0x5, 0x0, 0x67, 0x100, 0x3, 0x2d303edb, 0x4, 0x1, 0x2, 0x1, 0x5, 0xeb5, 0xfffffffe, 0x2, 0x0, 0x9, 0x6c41, 0x8, 0x3, 0x0, 0x7, 0x7, 0x80000000, 0x0, 0x7, 0x1, 0x4, 0x6, 0x5, 0x4, 0xc03, 0xe021, 0x2, 0x6, 0x8, 0x6, 0x8, 0x0, 0x1000, 0x10, 0x9, 0x22, 0x7f, 0x3, 0x5, 0x8, 0x2, 0x7, 0xf954, 0x65, 0x5, 0x7fff, 0x0, 0x0, 0x6, 0x2, 0x1ff, 0x5, 0x800, 0x24, 0x4, 0x2, 0x7, 0x149f, 0x8, 0x3, 0x6, 0x4, 0x81, 0x1, 0x6, 0x5, 0x2, 0xa2c, 0x1, 0x2, 0xd777, 0x1e0, 0xfffff800, 0x4, 0x9, 0x6, 0x0, 0x7ff, 0x2, 0x800, 0x1, 0x3, 0x80, 0x0, 0x5, 0x1, 0x5, 0xb, 0x2, 0x0, 0x7fff, 0x3, 0x7fffffff, 0x8, 0x7, 0xfff, 0x10000, 0x6, 0x7, 0x9, 0xfffffffb, 0x100, 0x2, 0x5, 0x8, 0x0, 0x9, 0x1000, 0xad, 0x0, 0x0, 0xf3, 0xfffffffb, 0x2, 0x7f, 0x0, 0x47e, 0xfffffffc, 0x0, 0x73c, 0x100, 0x1ad, 0x9, 0x7, 0x3, 0x2, 0x0, 0x3, 0x8e251b60, 0xfffff3b9, 0x68, 0xb601, 0x4, 0x1ff, 0xf76, 0x800, 0x0, 0x8, 0x0, 0x6, 0x9, 0x81, 0x1e77, 0x6, 0x0, 0x2, 0x8, 0x1ff, 0xd, 0x8, 0x4]}, @TCA_POLICE_RATE={0x404, 0x2, [0x512, 0x3, 0x81, 0x1656e018, 0x2, 0x3febaad8, 0x7, 0xf3, 0x5, 0xffffffff, 0x2, 0xfff, 0xfff, 0x1, 0x354a, 0x60000, 0xfffff200, 0x0, 0x80000001, 0x7, 0x1, 0x8, 0x5, 0x2, 0xe72, 0x7, 0x5, 0x6, 0x0, 0x6, 0x9, 0x5, 0x47a, 0x9, 0x7, 0x3981f74, 0x7, 0x4, 0xc3e, 0x3, 0x60, 0x7, 0x9, 0xfffffffb, 0x6, 0x400, 0xfb28, 0x80000001, 0x9, 0x10, 0x28000000, 0x6, 0x401, 0x3, 0x100, 0x7c0f, 0x5, 0x5, 0x8, 0x10001, 0xff, 0x0, 0x1, 0x4, 0x0, 0x7, 0xa36, 0x2, 0x2, 0xc, 0xc337, 0x1, 0xfffffffc, 0x577, 0x0, 0x5, 0x530, 0xfffffffc, 0x9, 0x1, 0x5, 0x0, 0x7fff, 0x80000001, 0x0, 0x0, 0x100, 0x4, 0x98, 0x4, 0x6, 0x1, 0x38000000, 0x9, 0x2, 0x1, 0x3830044d, 0x5, 0xd9, 0x400, 0x0, 0xfffffffd, 0x4, 0x48000, 0x3, 0xfffffff6, 0x7fffffff, 0xf6, 0x5, 0x9, 0x6acf, 0x3, 0x7, 0x9, 0xfffffffc, 0x6, 0x6, 0x10, 0x7, 0x3, 0x9, 0x75c9fe1d, 0xffffff86, 0x0, 0x7f, 0x80000000, 0x6, 0x7ff, 0x1, 0x6, 0xffff72fa, 0x80000000, 0x9, 0x2, 0x0, 0x0, 0x80, 0x4, 0xfff, 0x5, 0x1, 0x200, 0x9, 0x80000001, 0x6, 0x8, 0x6, 0x93, 0x709, 0x7, 0xb3, 0x8, 0x3, 0x1, 0x5, 0x40, 0x4, 0x374f, 0x3, 0x3, 0xa75, 0x8, 0xffffe7e1, 0x0, 0x3, 0x3, 0x1, 0x10000, 0xd516, 0x2, 0xbe6, 0x7f, 0x6, 0xc9, 0x1, 0x3ff, 0xc5, 0x313, 0x3, 0x81, 0x5, 0x800, 0xd10, 0x3, 0x0, 0x8, 0x6, 0x9, 0xe63, 0x71, 0x100, 0xffffffff, 0x38000000, 0x800, 0xb42, 0x6, 0x2, 0x8000, 0xfffffffd, 0x3, 0xfffffffa, 0x2, 0x3, 0x2, 0xe, 0x9, 0x100000, 0x7, 0x7, 0x3762, 0x7, 0x7ff, 0x8, 0xfffffff8, 0x5, 0x2, 0x3, 0x27, 0x2, 0x200, 0x7, 0x6, 0xff8, 0x9, 0x9, 0x6, 0x5, 0x2, 0x7ff, 0x100, 0x6, 0x1ff, 0x2, 0x4, 0xfffff001, 0x1, 0x5, 0x1, 0x0, 0x5, 0x3, 0x9, 0xd, 0x7, 0x8000, 0x9, 0x4, 0x7fff, 0x1, 0x1000, 0x1000, 0x8, 0x7, 0x7, 0xa73a, 0x4]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x4, 0x7, 0x8, 0x6, 0x5, 0x1ff, 0xd, 0x7, 0x3b48, 0x5, 0x5, 0x8866, 0x9fa9, 0x8, 0x7, 0x8, 0x6, 0x2, 0x7fffffff, 0x9, 0x0, 0x8000, 0x10, 0x6, 0x101, 0x3, 0x73, 0x2, 0x7fffffff, 0xd, 0x1, 0x8001, 0x9e4, 0xfff, 0x7, 0x80000001, 0x3, 0x92, 0x9, 0x1dae0bd1, 0x8001, 0x3, 0x1, 0x400, 0x2, 0xfffff50e, 0x4, 0x9b0e, 0x0, 0x100, 0x6, 0x10001, 0x187, 0x10, 0x8, 0x8, 0x5b, 0x80000001, 0x8001, 0x10001, 0x1, 0x2, 0x9, 0x5, 0xb7a, 0x5, 0x5, 0x7fff, 0x7, 0x10000, 0x7, 0xfffffff8, 0x9a, 0x5, 0xffff7fff, 0x99, 0x2, 0x8, 0x1, 0x200, 0x4, 0x8, 0x8, 0x6, 0x15, 0x4, 0xb26e, 0x9, 0x18000, 0x7, 0x4, 0x2, 0x10000, 0x3, 0x7, 0xff, 0x6c1, 0xfff, 0x3ff, 0x23, 0x517, 0x6, 0x2, 0x3, 0x1ff, 0x3, 0x5a2, 0x8001, 0x5, 0xffff, 0x9, 0x80000001, 0x5, 0x5, 0x2, 0x2, 0x1, 0x48000000, 0x8, 0x5, 0x0, 0x9, 0xfff, 0x4, 0x6, 0x4, 0x0, 0xfffffffc, 0x5, 0x6, 0xe, 0xffffffff, 0x100, 0x8, 0x9, 0x2, 0x583, 0x8, 0x7fffffff, 0x8000, 0x8, 0x5, 0x7, 0x4ba9, 0x4, 0xd, 0x8, 0x1, 0x9, 0x7, 0x2, 0xffff, 0x1, 0x60, 0x5, 0x9578, 0x6, 0xffff0001, 0x7fffffff, 0x80000001, 0x2, 0x1, 0x2, 0x9, 0xb1, 0x1400000, 0xa63, 0x6, 0x3, 0x1, 0x2, 0x3, 0xc, 0x0, 0x8, 0x8, 0x1, 0x1, 0x5, 0x2, 0x6, 0x0, 0x318, 0x0, 0x180000, 0x8, 0x5, 0x2, 0x2, 0x80, 0x6, 0x40000, 0x5edb, 0x7fffffff, 0x8, 0xcc2c, 0x6, 0x1ff, 0x0, 0xffff1476, 0xd, 0x7, 0x6, 0x1000, 0xe, 0x88, 0x2, 0x4, 0xe1, 0x3, 0x1, 0x3, 0x3, 0x9a45, 0x0, 0x7, 0x9, 0x80000000, 0x2, 0xffff899f, 0x0, 0x6, 0x5, 0x6, 0x3, 0x7, 0x401, 0x8, 0x4e07, 0x1cf, 0x81, 0x7, 0x6, 0x3ff, 0x9fa, 0x9, 0x6, 0x94, 0x2, 0xc, 0x55e6, 0x10000, 0x67, 0x1ff, 0xfff, 0x4, 0x4, 0x36a, 0xb443, 0xb2, 0x80000001, 0x3, 0x800, 0x7, 0x3, 0x4]}]}, @TCA_TCINDEX_POLICE={0x408, 0x6, [@TCA_POLICE_RATE={0x404, 0x2, [0x1, 0xb, 0x8, 0x6, 0x4f, 0x5, 0xb5, 0x6, 0x1, 0x9, 0x2, 0x6, 0x9, 0x4, 0x533, 0x8, 0x1, 0xf, 0x1, 0x7, 0x80000000, 0x5, 0x4a, 0x4, 0x40, 0x5a1, 0x3, 0x8, 0x5, 0x0, 0x7, 0x7, 0x0, 0x595, 0x1000, 0x6, 0x4, 0x8, 0x79bc, 0x4, 0x4, 0x3, 0x1, 0x4, 0xc, 0x2, 0x80000001, 0x4, 0xc5a6, 0xfffffffb, 0x5, 0x10001, 0x0, 0x1, 0x6, 0xffffffff, 0x7, 0x4, 0xc, 0xadbb, 0x3, 0xffffd602, 0x5, 0x3, 0x7, 0x81, 0x10000, 0x100, 0x7, 0x5, 0x10, 0x5, 0x6, 0x9, 0x1, 0x1, 0x7, 0x7, 0x4, 0x1e7, 0x9, 0x1, 0xa, 0xfff, 0xa, 0x9, 0x40, 0x2, 0x8, 0x80, 0x8, 0x800, 0x4166, 0xffffffff, 0x69, 0x7f, 0x10000, 0x5, 0x7, 0x0, 0x1f, 0x1, 0x4, 0x183, 0x0, 0x1, 0x9, 0x2, 0x9, 0x6, 0x4, 0x6, 0x8, 0xb, 0x4, 0x2, 0x2, 0x10000, 0x8, 0xfffff000, 0xa0, 0x9, 0xc, 0xffff, 0x0, 0xa86b, 0xffffffff, 0x40, 0x6, 0x7, 0x4, 0xfe000000, 0x7, 0x0, 0x1, 0xd7, 0x1, 0x7, 0x88e1, 0xc, 0x2, 0x7, 0xff, 0xfa, 0x4, 0x51, 0xb7e, 0x0, 0x2, 0x91be, 0x800, 0x2, 0x8, 0xffff, 0x7fffffff, 0x6, 0x7, 0x1, 0xc, 0x8, 0x40000, 0x3, 0x3, 0x5, 0x2, 0x3, 0x4286, 0x3, 0xc, 0x7, 0x0, 0xd, 0x5, 0x100, 0x2d, 0x7fffffff, 0x66a4, 0x3, 0x9, 0x0, 0x7, 0x80000001, 0x80, 0x1, 0x6, 0x9, 0x8, 0x5, 0x7, 0x4, 0x40, 0x10001, 0x8, 0xd, 0x3, 0x38, 0x10001, 0xbd4, 0xc3, 0x5, 0x7f, 0x81, 0x9, 0x2, 0x7fff, 0xfffffffa, 0x1ff, 0x0, 0x1, 0xbd, 0x9, 0x5, 0x3, 0x9, 0xb, 0x7, 0x6, 0x8, 0x9, 0xa80, 0x1, 0xfffffffb, 0x123eac57, 0x5612, 0x13c, 0x7ff, 0x6, 0xfffffff9, 0x6, 0x6, 0x6, 0x6, 0x6, 0x4, 0x8, 0x5, 0x79, 0x8, 0x4, 0x8, 0x9, 0x1c9ea2f, 0x2, 0x3ff, 0xda6c, 0x200, 0x1, 0x5, 0x5, 0xa, 0x7, 0xfffffffe, 0xb0, 0x3, 0x2, 0x5]}]}, @TCA_TCINDEX_ACT={0xe54, 0x7, [@m_pedit={0xe50, 0x0, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{{0xad40, 0x7, 0x5, 0xd, 0x8}, 0x1, 0xff}, [{0x8000, 0x6, 0x2, 0x2, 0x8, 0x8}, {0x5, 0xffffff4f, 0x7, 0x1, 0x84, 0xeee}, {0x7, 0xedf, 0x1, 0x2, 0x8000, 0x1034}, {0xe44, 0x3ff, 0x8, 0x7451, 0x10001, 0x40}, {0xf1c0, 0x5, 0x3, 0x2, 0x0, 0x2}, {0x5, 0x3ff, 0xf, 0xffffff6e, 0x1, 0x6}, {0x7fffffff, 0xfffffffc, 0xffff, 0x7fff, 0x9, 0x401}, {0xf, 0x7, 0x5, 0x3, 0x7, 0x6}, {0x2, 0x6, 0x2, 0x3ff, 0xefc, 0x5dd}, {0x1, 0x0, 0x2, 0xfffffff6, 0x5, 0x4}, {0x6, 0xb70, 0xfffffe00, 0x7, 0x2, 0xfffffff8}, {0x41ff, 0x8, 0x6, 0x5c3235b9, 0x8, 0x80000001}, {0x80000000, 0xf0000000, 0xc5f4, 0x4, 0x4, 0xc8f8}, {0xfffffffa, 0x3, 0x5, 0x2, 0x40, 0x3ff}, {0x7, 0x8, 0xfffffff9, 0x2, 0x4, 0x7}, {0x5, 0x2a3, 0x4, 0xfffffffa, 0x3, 0x3}, {0xa1e7, 0xd, 0xc, 0x7fffffff, 0x0, 0x9}, {0xffff968b, 0x1, 0x44b, 0xfff, 0x8, 0x2}, {0x4, 0x4, 0x5, 0xe, 0x7, 0xfffffff8}, {0x400, 0xb, 0x1000, 0x6, 0x0, 0x4}, {0x13b, 0xfffffffd, 0xcd, 0x7, 0xffff8000, 0x2}, {0xc6779e4, 0xfa8, 0x2db8617f, 0x2, 0x4, 0x482f}, {0x9, 0x7, 0x44, 0x10001, 0x95d6, 0x4}, {0x34b, 0x6, 0x80, 0xcc08, 0x22de, 0x9}, {0xadc, 0x9, 0x2, 0x5, 0x81, 0x4d}, {0x2, 0x8000, 0x6, 0x80, 0x3, 0x7}, {0x5, 0x2, 0x10001, 0x80, 0x4, 0x81}, {0xfff, 0xddf, 0x800, 0x0, 0x6, 0x2}, {0x4, 0x13c, 0x4, 0x2, 0xffffa85f, 0x6}, {0x4, 0x4, 0x0, 0x9, 0x2, 0x4d3d1172}, {0x3e6c036a, 0x7e, 0xc275, 0xff, 0x10000, 0x6}, {0x8, 0x6edad0e6, 0x2, 0x6, 0x10000, 0x3}, {0x586f, 0x2, 0x8000, 0x3, 0x0, 0x6}, {0x0, 0x2, 0x3, 0xaa, 0x9, 0x4}, {0x5, 0x5, 0x9, 0x2, 0x1b400, 0x23a2}, {0x769db70e, 0x2174, 0x0, 0x4, 0x0, 0x97}, {0x40, 0x0, 0x3, 0x81, 0x1, 0x2}, {0xf837, 0x80000000, 0x2, 0xa7e14f9, 0x1000, 0x2}, {0x4, 0x200, 0x3, 0x1, 0x1, 0x5}, {0x9, 0x7, 0xbd3, 0x5, 0xfffffff7, 0x8a}, {0x7, 0x2, 0x8e74, 0x2de6, 0x0, 0xc}, {0xfffffff9, 0x80000000, 0x8, 0x9, 0x10001, 0xca}, {0x6, 0x6, 0x4, 0x10000, 0x2ef9, 0x4}, {0x10001, 0xffffffff, 0x1, 0xc7b, 0x5, 0x9c2}, {0x6fd, 0x2, 0xc, 0x1, 0x1980000, 0x6}, {0x6, 0x1, 0x9ce, 0x3, 0x9, 0x80000001}, {0x0, 0x7, 0x8, 0x3ff, 0x1, 0x4}, {0x5, 0x9, 0x9, 0x2, 0x3, 0x7f}, {0x7, 0x7fff, 0x7, 0x3, 0x9, 0xffff}, {0x0, 0x7, 0x5, 0x1, 0x4, 0x9}, {0xd8e, 0x5, 0x2da, 0x8001, 0x4, 0xb7}, {0xe, 0x9, 0x5, 0x0, 0x8, 0xd}, {0xffffffff, 0x5, 0xfffffb69, 0x3, 0xfffffe00, 0x8}, {0x6, 0x3, 0x9, 0x1000, 0x0, 0x7f}, {0xffff, 0x80000000, 0xcf5, 0x6, 0x0, 0x2}, {0xeb, 0x8, 0x8001, 0x1000, 0xf0, 0x6}, {0x1000, 0x69d6, 0x10001, 0xb9, 0x7e5c, 0x7}, {0x2, 0x7, 0x3, 0x6, 0x6, 0x1}, {0x80000001, 0x1ff, 0x1000, 0x3, 0x800, 0x1ff}, {0xb994, 0x3, 0x6, 0x36d8, 0x8726, 0x5f0}, {0x4, 0xed1, 0x0, 0x5, 0x4, 0xffffffff}, {0xa, 0x0, 0xe, 0x7ff, 0x8, 0x2}, {0x2, 0x100, 0x5, 0x4, 0x1, 0x81}, {0x5, 0x7, 0x7, 0xfffffffa, 0xbf3d, 0xffff}, {0x9, 0x3, 0x80, 0xa84f, 0x7, 0xc0}, {0x4, 0x400, 0x2, 0x6, 0x8, 0x7}, {0xc1, 0xb66c, 0x2, 0x6, 0x9, 0xb}, {0x5, 0xe9, 0x8d3e, 0x7, 0x1, 0xfd7f}, {0x9, 0x8, 0x1, 0xa0000000, 0xfffffffe}, {0x6, 0x3d0, 0x6, 0xc, 0x3, 0x6}, {0x5, 0x3, 0xfffffff8, 0x5, 0x6}, {0x7, 0x7fff, 0x17, 0xd3, 0x5, 0x197}, {0x3, 0x2, 0xffffff2c, 0xc0000, 0x7, 0x5}, {0x3, 0x7, 0x7, 0xf52c, 0x1, 0x6}, {0x9, 0x4, 0xfffffd13, 0x3, 0x6, 0x1}, {0x4, 0x7, 0x5, 0xdf8, 0x6, 0x78f6}, {0x1, 0x0, 0x0, 0x4, 0x2, 0x6}, {0x8, 0x3, 0xfffffffc, 0x5, 0x4, 0x7}, {0x1, 0x6, 0xffffffc0, 0xd, 0x3, 0x9}, {0x8, 0x8, 0x6f1b, 0x9, 0x3, 0x68}, {0x39f, 0x0, 0xfffffffb, 0x10000, 0x7, 0x6}, {0xb1, 0x6, 0x100, 0x62, 0x2, 0x85d}, {0x4, 0x7fff, 0x9, 0x2, 0x4, 0x2}, {0xffff, 0x2, 0x380, 0x1, 0x5, 0x7}, {0x3, 0x2, 0x1000, 0xf9, 0x6, 0x9}, {0x0, 0x0, 0xfffffff9, 0x2, 0x3, 0x3}, {0x3, 0x80000001, 0x3, 0x7f, 0xdc}, {0x3800, 0x6, 0x7, 0x5, 0x8, 0x40000000}, {0xffff, 0x1, 0x7, 0x7, 0xfffffff9, 0x64}, {0x40, 0x8, 0x320c20e5, 0x5, 0x7f, 0x80000}, {0x2, 0xf, 0x3ff, 0x7, 0x8001, 0xe}, {0x40, 0xffff, 0xe, 0x1, 0x1ff, 0x6}, {0x3ff, 0xfffffffc, 0x8, 0x4, 0x93, 0xff}, {0x7, 0x3, 0x7, 0x3, 0x7, 0x7}, {0x10000, 0x0, 0xffffffff, 0x46041e18, 0x401, 0x3f}, {0x9, 0x7, 0x1, 0x30000000, 0x10, 0xb33}, {0x100000, 0x28, 0x70208365, 0x80, 0x80000000, 0x255af3a3}, {0x4, 0x1, 0x8, 0x1, 0x101, 0x2}, {0x401, 0x2, 0x8, 0x5, 0x6}, {0x7, 0x7, 0x2, 0x1, 0x7, 0x7}, {0x8, 0x0, 0x0, 0x54e0e3e4, 0x7, 0x5}, {0x5, 0x4, 0x6, 0xc, 0x4, 0xa71}, {0x3, 0x8e3d, 0x1, 0x55de, 0xfffffff8, 0xffffffff}, {0x6e, 0x146, 0x9, 0x4, 0x5c0f, 0x4}, {0xfffffffb, 0x405, 0xf, 0xfd07, 0xe2f, 0x8}, {0x83, 0x8, 0x3, 0x0, 0x5, 0x4}, {0x9, 0x1, 0x1, 0x4, 0x2, 0x100}, {0xffff, 0x1, 0x8001, 0x4, 0x80000001, 0x4}, {0xfffffff8, 0x50, 0xa, 0x9, 0x80000001, 0x3}, {0x7, 0xc, 0x3, 0x5, 0x8, 0x6}, {0x1, 0x7, 0xffffa703, 0xa, 0x1, 0xac}, {0x6, 0x0, 0x31ca, 0xdc65, 0x2, 0xe}, {0x4, 0xf, 0x5, 0x6, 0x5, 0x2}, {0x4437, 0x80, 0x5, 0x9, 0x401, 0x23}, {0x5, 0x6, 0x9, 0x5, 0x0, 0x8}, {0x0, 0x3, 0xfffffff9, 0x1, 0x6, 0x1}, {0x3, 0x10, 0x7, 0x1, 0x0, 0x1}, {0x800000, 0x3, 0x5, 0x5, 0x90}, {0x0, 0x7, 0x3, 0x6, 0x2, 0x9}, {0x8d, 0x81, 0xffffffff, 0x13, 0xff, 0x43}, {0x5, 0x8, 0xf, 0x2, 0x6, 0x9b04}, {0x6, 0xf0, 0x4, 0x5, 0x6, 0x400}, {0x7fff, 0x8, 0x6, 0x8, 0xffff, 0x80}, {0xfffffff7, 0x9, 0xef1ad73, 0x5, 0x6, 0x6}, {0x9, 0x0, 0x9, 0x8000, 0x6, 0x5}, {0x800, 0x6, 0x2, 0xd, 0x5, 0x5}, {0x64, 0xfffffff9, 0xfffffffc, 0x5, 0x4, 0x80}, {0x9, 0x5, 0x3, 0x3, 0x2, 0x8}], [{0x5}, {0x0, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x3}, {}, {0x1, 0x9ab527242f37187a}, {0x3}, {0x0, 0x1}, {0x3}, {0x2, 0x1}, {0x3}, {0x2, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x3}, {0x7, 0x1}, {}, {0x3}, {0x5}, {0x1, 0x1}, {0x5, 0x1}, {0x2}, {0x5}, {0x1, 0x1}, {0x5}, {0x3}, {0x3}, {0x2, 0x1}, {0x0, 0x1}, {0x5}, {0x3, 0x1}, {0x2}, {}, {0x2, 0x1}, {0x3, 0x1}, {}, {}, {0x2}, {0x4}, {0x2, 0x1}, {0x2}, {0x0, 0x1}, {}, {0x3, 0x1}, {0x1, 0x1}, {0xf}, {0x5, 0x1}, {0x1}, {}, {0x2}, {0x1}, {0x4}, {}, {0x1, 0x1}, {0x5}, {0x0, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x2}, {0x4, 0x1}, {0x2}, {}, {0x4, 0x1}, {0x3, 0x1}, {0x1}, {0x5}, {0x2}, {0x2}, {}, {0x2}, {0x1}, {0x2}, {0x2, 0x1}, {0x2, 0x1}, {}, {0x2}, {0x3, 0x1}, {0x2, 0x1}, {0x2}, {0x4}, {0x0, 0x1}, {0x0, 0x1}, {0x5}, {0x4}, {0x5}, {0x0, 0x1}, {0x7}, {}, {0x0, 0x1}, {}, {0x4}, {0x7, 0x1}, {0x4, 0x1}, {0x2}, {0x2}, {0x4}, {0x1, 0x1}, {0x5}, {0x7}, {0x1}, {0x5, 0x1}, {0x4}, {}, {0x5, 0x1}, {0x1}, {0x5, 0x1}, {0x4}, {0x4, 0x1}, {0x1, 0x1}, {0x1}, {0x3, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x1}, {0x0, 0x1}, {0x1}, {0x5, 0x1}, {0x2, 0x1}, {0x0, 0xb86fe457a7131220}], 0x1}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x2, 0x3}}}}]}]}}]}, 0x22a8}, 0x1, 0x0, 0x0, 0x80}, 0x4811) r9 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$MRT6_DEL_MIF(r9, 0x29, 0xcb, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0xe, 0x0, 0x6}, 0xc) r10 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r11 = openat$selinux_policy(0xffffff9c, &(0x7f0000000180), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r11, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002480)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@ip_retopts={{0x14, 0x0, 0x7, {[@timestamp_addr={0x44, 0x4, 0xbc, 0x1, 0x3}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}], 0x30}}], 0x1, 0x1) write$selinux_load(r10, &(0x7f0000000000)=ANY=[], 0xfd44) r12 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r12) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="57e122ec2befc967fa072159dbd69d577c0d05e775e5bc7538bce58fffdc6641b7e8109ba79d2fe69825a8d7028f988f0d58c6f0dc27ff3ae1885e2a9679a77bd9916b8f9fabdfba7223a0e594f1e582c4bbde0bfed425638757f2c052799d05d8cb2992424385c8a24835b524a5ac957a5b46bf4ad7cc5d537073161d704a473f5e9e4b42035d8df1f945d36aeb5e76eb2590c9bf75f746776caad16ffcf3be48f2be216231c61c1fb81dba04112f00c905842120277c57abfed82c79b3d65e8faddcac895d31c7c2635313f6aba9a215", @ANYRES64=r12, @ANYRES8, @ANYRES8=r6, @ANYRES32=r6, @ANYRES64=r6], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) 181.991499ms ago: executing program 0 (id=6485): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0x4, &(0x7f0000000300)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000001c0)='kfree\x00', r0}, 0x10) r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x20) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0700000004000000080000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="04000000000000000400"/28], 0x48) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x1, 0xa}, 0x1184c, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_getres(0xffffffea, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r2}, 0x4) timer_getoverrun(0x0) 80.994369ms ago: executing program 0 (id=6486): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000000000000001000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000280)='netlink_extack\x00', r0}, 0x10) r1 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00'}) socket$netlink(0x10, 0x3, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x800, &(0x7f0000000100)={[{@rodir}, {@shortname_mixed}, {@shortname_winnt}, {@uni_xlate}, {@fat=@showexec}, {@fat=@discard}, {@rodir}, {@iocharset={'iocharset', 0x3d, 'koi8-ru'}}, {@shortname_mixed}, {@utf8no}, {@rodir}, {@uni_xlate}]}, 0x1, 0x26c, &(0x7f0000000340)="$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") r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_START_AP(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="80000000", @ANYRES16, @ANYBLOB="050000000000000000000f00000008000300", @ANYRES32=0x0, @ANYBLOB="0c009900040000005300000057000e0048"], 0x80}}, 0x0) 0s ago: executing program 0 (id=6487): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f000000c300)={{0x14}, [@NFT_MSG_NEWRULE={0x14, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}}, @NFT_MSG_DELRULE={0x20, 0x8, 0xa, 0x5, 0x0, 0x0, {0xa}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0x5c}}, 0x0) kernel console output (not intermixed with test programs): ll=202 compat=0 ip=0x7fa09183f6c9 code=0x7ffc0000 [ 313.617536][ T29] audit: type=1326 audit(6294967349.708:24187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19102 comm="syz.1.5597" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa09183f6c9 code=0x7ffc0000 [ 313.642422][ T29] audit: type=1326 audit(6294967349.708:24188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19102 comm="syz.1.5597" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa09183f6c9 code=0x7ffc0000 [ 313.667586][ T29] audit: type=1326 audit(6294967349.708:24189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19102 comm="syz.1.5597" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa09183f6c9 code=0x7ffc0000 [ 313.692431][ T29] audit: type=1326 audit(6294967349.708:24190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19102 comm="syz.1.5597" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fa09183f6c9 code=0x7ffc0000 [ 313.858262][T19115] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5601'. [ 313.946087][T19118] lo speed is unknown, defaulting to 1000 [ 314.053016][T19117] SELinux: failed to load policy [ 314.172057][T19124] netlink: 8 bytes leftover after parsing attributes in process `syz.6.5605'. [ 314.297707][T19129] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5607'. [ 314.562653][T19135] netlink: 'syz.6.5610': attribute type 10 has an invalid length. [ 314.618078][T19135] siw: device registration error -23 [ 314.864509][T19145] netlink: 8 bytes leftover after parsing attributes in process `syz.3.5614'. [ 315.228278][T19152] netlink: 24 bytes leftover after parsing attributes in process `syz.3.5615'. [ 315.250010][T19152] IPVS: Error connecting to the multicast addr [ 315.532945][T19162] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5620'. [ 315.576799][T19141] syz.6.5613 invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=1000 [ 315.588943][T19141] CPU: 0 UID: 0 PID: 19141 Comm: syz.6.5613 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 315.589055][T19141] Tainted: [W]=WARN [ 315.589062][T19141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 315.589077][T19141] Call Trace: [ 315.589089][T19141] [ 315.589096][T19141] __dump_stack+0x1d/0x30 [ 315.589158][T19141] dump_stack_lvl+0xe8/0x140 [ 315.589181][T19141] dump_stack+0x15/0x1b [ 315.589201][T19141] dump_header+0x81/0x220 [ 315.589222][T19141] oom_kill_process+0x342/0x400 [ 315.589292][T19141] out_of_memory+0x979/0xb80 [ 315.589325][T19141] try_charge_memcg+0x610/0xa10 [ 315.589382][T19141] charge_memcg+0x51/0xc0 [ 315.589406][T19141] mem_cgroup_swapin_charge_folio+0xcc/0x150 [ 315.589547][T19141] __read_swap_cache_async+0x17b/0x2d0 [ 315.589569][T19141] swap_cluster_readahead+0x262/0x3c0 [ 315.589596][T19141] swapin_readahead+0xde/0x6f0 [ 315.589619][T19141] ? search_extable+0x53/0x80 [ 315.589644][T19141] ? strncpy_from_kernel_nofault+0x78/0x130 [ 315.589679][T19141] ? strncpy_from_kernel_nofault+0x78/0x130 [ 315.589742][T19141] ? css_rstat_updated+0xb7/0x240 [ 315.589763][T19141] ? __rcu_read_unlock+0x4f/0x70 [ 315.589791][T19141] ? __rcu_read_unlock+0x4f/0x70 [ 315.589857][T19141] ? swap_cache_get_folio+0x277/0x280 [ 315.589881][T19141] do_swap_page+0x2ae/0x2370 [ 315.589907][T19141] ? _raw_spin_unlock+0x26/0x50 [ 315.589935][T19141] ? finish_task_switch+0xad/0x2b0 [ 315.589984][T19141] ? __pfx_default_wake_function+0x10/0x10 [ 315.590081][T19141] handle_mm_fault+0x9a5/0x2be0 [ 315.590110][T19141] ? vma_start_read+0x141/0x1f0 [ 315.590177][T19141] do_user_addr_fault+0x630/0x1080 [ 315.590197][T19141] ? fpregs_restore_userregs+0xe2/0x1d0 [ 315.590278][T19141] ? switch_fpu_return+0xe/0x20 [ 315.590308][T19141] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 315.590337][T19141] exc_page_fault+0x62/0xa0 [ 315.590371][T19141] asm_exc_page_fault+0x26/0x30 [ 315.590456][T19141] RIP: 0033:0x7f0b43a3120e [ 315.590483][T19141] Code: e9 47 cf 12 00 0f 1f 80 00 00 00 00 48 83 c4 28 48 c7 c0 ff ff ff ff 5b 5d c3 66 90 41 57 41 56 41 55 41 54 55 53 48 83 ec 38 <80> 3d eb 0d 38 00 00 89 7c 24 0c 88 54 24 10 48 89 74 24 28 0f 85 [ 315.590530][T19141] RSP: 002b:00007ffea1e8f100 EFLAGS: 00010206 [ 315.590548][T19141] RAX: 00007f0b43db5fa0 RBX: 00007f0b43db5fa0 RCX: 0000000000000026 [ 315.590561][T19141] RDX: 0000000000000001 RSI: 00007f0b43db6038 RDI: 0000000000000000 [ 315.590647][T19141] RBP: 00007f0b43db7da0 R08: 0000000000000000 R09: 0000000000000026 [ 315.590659][T19141] R10: 3fffffffffffffff R11: 0000000000000293 R12: 000000000005020c [ 315.590671][T19141] R13: 00007f0b43db6090 R14: ffffffffffffffff R15: 00007ffea1e8f280 [ 315.590688][T19141] [ 315.590694][T19141] memory: usage 307200kB, limit 307200kB, failcnt 2414 [ 315.886541][T19141] memory+swap: usage 46812kB, limit 9007199254740988kB, failcnt 0 [ 315.895379][T19141] kmem: usage 40408kB, limit 9007199254740988kB, failcnt 0 [ 315.903638][T19141] Memory cgroup stats for /syz6: [ 315.914056][T19141] cache 0 [ 315.923052][T19141] rss 4096 [ 315.926071][T19141] shmem 0 [ 315.929685][T19141] mapped_file 0 [ 315.933133][T19141] dirty 0 [ 315.936056][T19141] writeback 4096 [ 315.940560][T19141] workingset_refault_anon 1419 [ 315.945318][T19141] workingset_refault_file 72 [ 315.949974][T19141] swap 667648 [ 315.954445][T19141] swapcached 4096 [ 315.959084][T19141] pgpgin 309255 [ 315.962718][T19141] pgpgout 309240 [ 315.967385][T19141] pgfault 311693 [ 315.970957][T19141] pgmajfault 257 [ 315.974498][T19141] inactive_anon 4096 [ 315.979392][T19141] active_anon 0 [ 315.982854][T19141] inactive_file 57344 [ 315.987820][T19141] active_file 0 [ 315.991280][T19141] unevictable 0 [ 315.995802][T19141] hierarchical_memory_limit 314572800 [ 316.001243][T19141] hierarchical_memsw_limit 9223372036854771712 [ 316.008367][T19141] total_cache 0 [ 316.011820][T19141] total_rss 4096 [ 316.016323][T19141] total_shmem 0 [ 316.019777][T19141] total_mapped_file 0 [ 316.025034][T19141] total_dirty 0 [ 316.028708][T19141] total_writeback 4096 [ 316.031023][T19173] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5622'. [ 316.032893][T19141] total_workingset_refault_anon 1419 [ 316.042948][T19172] netlink: 'syz.5.5623': attribute type 10 has an invalid length. [ 316.047958][T19141] total_workingset_refault_file 72 [ 316.055802][T19172] ipvlan0: entered allmulticast mode [ 316.060017][T19141] total_swap 667648 [ 316.067045][T19172] team0: Device ipvlan0 failed to register rx_handler [ 316.069944][T19141] total_swapcached 4096 [ 316.069954][T19141] total_pgpgin 309255 [ 316.069962][T19141] total_pgpgout 309240 [ 316.069970][T19141] total_pgfault 311693 [ 316.095776][T19141] total_pgmajfault 257 [ 316.100521][T19141] total_inactive_anon 4096 [ 316.105123][T19141] total_active_anon 0 [ 316.109733][T19141] total_inactive_file 57344 [ 316.114254][T19141] total_active_file 0 [ 316.118217][T19141] total_unevictable 0 [ 316.122836][T19141] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz6,task_memcg=/syz6,task=syz.6.5613,pid=19141,uid=0 [ 316.134003][T19174] siw: device registration error -23 [ 316.137829][T19141] Memory cgroup out of memory: Killed process 19141 (syz.6.5613) total-vm:93956kB, anon-rss:1136kB, file-rss:22312kB, shmem-rss:0kB, UID:0 pgtables:128kB oom_score_adj:1000 [ 316.190966][T19178] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5625'. [ 316.334532][T19197] netlink: 'syz.1.5634': attribute type 10 has an invalid length. [ 316.361547][T19197] ipvlan0: entered allmulticast mode [ 316.377424][T19197] team0: Device ipvlan0 failed to register rx_handler [ 316.559081][T19241] netlink: 'syz.6.5652': attribute type 10 has an invalid length. [ 316.571460][T19241] siw: device registration error -23 [ 316.595716][T19243] netlink: 'syz.0.5653': attribute type 1 has an invalid length. [ 316.610701][T19243] 8021q: adding VLAN 0 to HW filter on device bond1 [ 316.625180][T19243] bond1 (unregistering): Released all slaves [ 316.751815][T19267] FAULT_INJECTION: forcing a failure. [ 316.751815][T19267] name failslab, interval 1, probability 0, space 0, times 0 [ 316.765385][T19267] CPU: 0 UID: 0 PID: 19267 Comm: syz.0.5663 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 316.765431][T19267] Tainted: [W]=WARN [ 316.765437][T19267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 316.765518][T19267] Call Trace: [ 316.765524][T19267] [ 316.765532][T19267] __dump_stack+0x1d/0x30 [ 316.765552][T19267] dump_stack_lvl+0xe8/0x140 [ 316.765632][T19267] dump_stack+0x15/0x1b [ 316.765649][T19267] should_fail_ex+0x265/0x280 [ 316.765672][T19267] should_failslab+0x8c/0xb0 [ 316.765733][T19267] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 316.765769][T19267] ? __alloc_skb+0x101/0x320 [ 316.765800][T19267] __alloc_skb+0x101/0x320 [ 316.765860][T19267] netlink_alloc_large_skb+0xbf/0xf0 [ 316.765893][T19267] netlink_sendmsg+0x3cf/0x6b0 [ 316.765918][T19267] ? __pfx_netlink_sendmsg+0x10/0x10 [ 316.765939][T19267] __sock_sendmsg+0x145/0x180 [ 316.765996][T19267] ____sys_sendmsg+0x31e/0x4e0 [ 316.766020][T19267] ___sys_sendmsg+0x17b/0x1d0 [ 316.766049][T19267] __x64_sys_sendmsg+0xd4/0x160 [ 316.766073][T19267] x64_sys_call+0x191e/0x3000 [ 316.766134][T19267] do_syscall_64+0xd2/0x200 [ 316.766156][T19267] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 316.766226][T19267] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 316.766306][T19267] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 316.766325][T19267] RIP: 0033:0x7f23d5eaf6c9 [ 316.766340][T19267] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 316.766454][T19267] RSP: 002b:00007f23d4917038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 316.766474][T19267] RAX: ffffffffffffffda RBX: 00007f23d6105fa0 RCX: 00007f23d5eaf6c9 [ 316.766488][T19267] RDX: 0000000000000014 RSI: 0000200000000280 RDI: 0000000000000009 [ 316.766501][T19267] RBP: 00007f23d4917090 R08: 0000000000000000 R09: 0000000000000000 [ 316.766564][T19267] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 316.766577][T19267] R13: 00007f23d6106038 R14: 00007f23d6105fa0 R15: 00007ffc8c0030b8 [ 316.766597][T19267] [ 317.005896][T19272] sd 0:0:1:0: device reset [ 317.149487][T19292] block device autoloading is deprecated and will be removed. [ 317.304753][T19298] netlink: 'syz.6.5675': attribute type 4 has an invalid length. [ 317.977386][T19344] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 318.095374][T19344] hub 6-0:1.0: USB hub found [ 318.106981][T19344] hub 6-0:1.0: 8 ports detected [ 318.223606][ T29] kauditd_printk_skb: 758 callbacks suppressed [ 318.223621][ T29] audit: type=1326 audit(6294967354.736:24949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19354 comm="syz.5.5698" exe="/root/syz-executor" sig=0 arch=c000003e syscall=60 compat=0 ip=0x7fd1fadcf6c9 code=0x7ffc0000 [ 318.457783][T19364] SELinux: failed to load policy [ 318.476434][ T29] audit: type=1326 audit(6294967354.988:24950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19355 comm="syz.6.5699" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f0b43b56567 code=0x7ffc0000 [ 318.524556][T19388] __nla_validate_parse: 10 callbacks suppressed [ 318.524571][T19388] netlink: 8 bytes leftover after parsing attributes in process `syz.3.5710'. [ 318.542448][T19390] netlink: 8 bytes leftover after parsing attributes in process `syz.5.5711'. [ 318.549682][ T29] audit: type=1326 audit(6294967354.988:24951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19355 comm="syz.6.5699" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f0b43afb779 code=0x7ffc0000 [ 318.574982][ T29] audit: type=1326 audit(6294967354.988:24952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19355 comm="syz.6.5699" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0b43b5f6c9 code=0x7ffc0000 [ 318.598623][ T29] audit: type=1326 audit(6294967354.988:24953): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19355 comm="syz.6.5699" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0b43b5f6c9 code=0x7ffc0000 [ 318.624379][ T29] audit: type=1326 audit(6294967355.072:24954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19389 comm="syz.5.5711" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd1fadcf6c9 code=0x7ffc0000 [ 318.627852][T19369] lo speed is unknown, defaulting to 1000 [ 318.648187][ T29] audit: type=1326 audit(6294967355.072:24955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19389 comm="syz.5.5711" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd1fadcf6c9 code=0x7ffc0000 [ 318.648224][ T29] audit: type=1326 audit(6294967355.072:24956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19389 comm="syz.5.5711" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd1fadcf6c9 code=0x7ffc0000 [ 318.648261][ T29] audit: type=1326 audit(6294967355.072:24957): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19389 comm="syz.5.5711" exe="/root/syz-executor" sig=0 arch=c000003e syscall=461 compat=0 ip=0x7fd1fadcf6c9 code=0x7ffc0000 [ 318.648359][ T29] audit: type=1326 audit(6294967355.072:24958): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19389 comm="syz.5.5711" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd1fadcf6c9 code=0x7ffc0000 [ 318.779541][ T9622] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 318.827818][T19369] chnl_net:caif_netlink_parms(): no params data found [ 318.860064][T19402] netlink: 16 bytes leftover after parsing attributes in process `syz.0.5715'. [ 318.902221][ T9622] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 318.986178][T19419] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5723'. [ 319.002914][ T9622] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 319.038397][T19369] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.039088][T19425] netlink: 8 bytes leftover after parsing attributes in process `syz.5.5724'. [ 319.045523][T19369] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.052528][T19369] bridge_slave_0: entered allmulticast mode [ 319.068681][T19369] bridge_slave_0: entered promiscuous mode [ 319.076117][T19369] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.083306][T19369] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.090631][T19369] bridge_slave_1: entered allmulticast mode [ 319.097237][T19369] bridge_slave_1: entered promiscuous mode [ 319.116974][ T9622] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 319.144215][T19429] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5725'. [ 319.215540][T19369] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 319.227650][T19369] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 319.249502][ T9622] bridge_slave_1: left allmulticast mode [ 319.256097][ T9622] bridge_slave_1: left promiscuous mode [ 319.262828][ T9622] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.295247][ T9622] bridge_slave_0: left allmulticast mode [ 319.301966][ T9622] bridge_slave_0: left promiscuous mode [ 319.307738][ T9622] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.475028][ T9622] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 319.507082][ T9622] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 319.518624][T19450] netlink: 16 bytes leftover after parsing attributes in process `syz.5.5733'. [ 319.530528][ T9622] bond0 (unregistering): Released all slaves [ 319.568649][T19369] team0: Port device team_slave_0 added [ 319.575573][T19369] team0: Port device team_slave_1 added [ 319.596258][T19452] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5735'. [ 319.619508][T19369] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 319.624110][T19452] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5735'. [ 319.627601][T19369] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 319.662362][T19369] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 319.712620][T19462] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5739'. [ 319.723423][T19369] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 319.731348][T19369] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 319.758328][T19369] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 319.790228][ T9622] hsr_slave_0: left promiscuous mode [ 319.803885][ T9622] hsr_slave_1: left promiscuous mode [ 319.817918][ T9622] veth1_macvtap: left promiscuous mode [ 319.823415][ T9622] veth0_macvtap: left promiscuous mode [ 319.835977][ T9622] veth1_vlan: left promiscuous mode [ 319.841517][ T9622] veth0_vlan: left promiscuous mode [ 319.950031][ T9622] pimreg (unregistering): left allmulticast mode [ 320.016322][ T9622] team0 (unregistering): Port device team_slave_1 removed [ 320.026681][ T9622] team0 (unregistering): Port device team_slave_0 removed [ 320.080503][ T8648] infiniband syz1: ib_query_port failed (-19) [ 320.087945][ T8649] lo speed is unknown, defaulting to 1000 [ 320.093940][ T8649] infiniband syz2: ib_query_port failed (-19) [ 320.116564][T19488] $Hÿ: left promiscuous mode [ 320.121455][T19488] bond_slave_0: left promiscuous mode [ 320.127154][T19488] bond_slave_1: left promiscuous mode [ 320.134316][T19488] 8021q: adding VLAN 0 to HW filter on device $Hÿ [ 320.149188][T19488] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 320.179111][T19369] hsr_slave_0: entered promiscuous mode [ 320.196999][T19369] hsr_slave_1: entered promiscuous mode [ 320.205539][T19369] debugfs: 'hsr0' already exists in 'hsr' [ 320.211281][T19369] Cannot create hsr debugfs directory [ 320.219799][T19494] FAULT_INJECTION: forcing a failure. [ 320.219799][T19494] name failslab, interval 1, probability 0, space 0, times 0 [ 320.232483][T19494] CPU: 1 UID: 0 PID: 19494 Comm: syz.0.5751 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 320.232589][T19494] Tainted: [W]=WARN [ 320.232597][T19494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 320.232611][T19494] Call Trace: [ 320.232618][T19494] [ 320.232626][T19494] __dump_stack+0x1d/0x30 [ 320.232685][T19494] dump_stack_lvl+0xe8/0x140 [ 320.232710][T19494] dump_stack+0x15/0x1b [ 320.232730][T19494] should_fail_ex+0x265/0x280 [ 320.232755][T19494] should_failslab+0x8c/0xb0 [ 320.232799][T19494] __kmalloc_node_track_caller_noprof+0xa5/0x580 [ 320.232891][T19494] ? kasprintf+0x83/0xb0 [ 320.232917][T19494] kvasprintf+0x8a/0x110 [ 320.232947][T19494] ? obj_cgroup_charge_account+0x122/0x1a0 [ 320.232969][T19494] kasprintf+0x83/0xb0 [ 320.233069][T19494] ? __memcg_slab_post_alloc_hook+0x44c/0x580 [ 320.233093][T19494] nf_tables_set_alloc_name+0xaa/0x4b0 [ 320.233123][T19494] ? nla_strdup+0x78/0xc0 [ 320.233150][T19494] nf_tables_newset+0xe29/0x14e0 [ 320.233225][T19494] nfnetlink_rcv+0xbc9/0x16c0 [ 320.233252][T19494] ? kmem_cache_free+0xe4/0x3d0 [ 320.233316][T19494] netlink_unicast+0x5c0/0x690 [ 320.233357][T19494] netlink_sendmsg+0x58b/0x6b0 [ 320.233382][T19494] ? __pfx_netlink_sendmsg+0x10/0x10 [ 320.233404][T19494] __sock_sendmsg+0x145/0x180 [ 320.233428][T19494] ____sys_sendmsg+0x31e/0x4e0 [ 320.233487][T19494] ___sys_sendmsg+0x17b/0x1d0 [ 320.233571][T19494] __x64_sys_sendmsg+0xd4/0x160 [ 320.233598][T19494] x64_sys_call+0x191e/0x3000 [ 320.233624][T19494] do_syscall_64+0xd2/0x200 [ 320.233646][T19494] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 320.233709][T19494] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 320.233752][T19494] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 320.233774][T19494] RIP: 0033:0x7f23d5eaf6c9 [ 320.233790][T19494] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 320.233826][T19494] RSP: 002b:00007f23d4917038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 320.233847][T19494] RAX: ffffffffffffffda RBX: 00007f23d6105fa0 RCX: 00007f23d5eaf6c9 [ 320.233862][T19494] RDX: 0000000000000040 RSI: 0000200000009b40 RDI: 0000000000000005 [ 320.233877][T19494] RBP: 00007f23d4917090 R08: 0000000000000000 R09: 0000000000000000 [ 320.233891][T19494] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 320.233905][T19494] R13: 00007f23d6106038 R14: 00007f23d6105fa0 R15: 00007ffc8c0030b8 [ 320.233972][T19494] [ 320.836959][T19369] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 320.858909][T19369] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 320.872614][T19369] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 320.892446][T19369] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 321.028111][T19369] 8021q: adding VLAN 0 to HW filter on device bond0 [ 321.037430][T19547] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 321.043025][T19369] 8021q: adding VLAN 0 to HW filter on device team0 [ 321.056698][ T9622] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.063803][ T9622] bridge0: port 1(bridge_slave_0) entered forwarding state [ 321.098437][ T9622] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.105558][ T9622] bridge0: port 2(bridge_slave_1) entered forwarding state [ 321.209787][T19369] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 321.251205][T19559] 9pnet_fd: Insufficient options for proto=fd [ 321.369617][T19369] veth0_vlan: entered promiscuous mode [ 321.418107][T19369] veth1_vlan: entered promiscuous mode [ 321.437067][T19369] veth0_macvtap: entered promiscuous mode [ 321.444776][T19369] veth1_macvtap: entered promiscuous mode [ 321.473634][T19369] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 321.507449][T19585] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 321.525037][T19369] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 321.542427][T19585] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 321.552624][T11559] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 321.580158][T11559] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 321.601522][T19585] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 321.634543][T19585] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 321.637420][T11559] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 321.696098][T11559] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 321.829583][T19606] SELinux: failed to load policy [ 322.439984][T19609] chnl_net:caif_netlink_parms(): no params data found [ 322.810058][T19609] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.818240][T19609] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.877472][T19609] bridge_slave_0: entered allmulticast mode [ 322.904376][T19609] bridge_slave_0: entered promiscuous mode [ 322.944528][T19609] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.952684][T19609] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.028036][T19609] bridge_slave_1: entered allmulticast mode [ 323.063351][T19609] bridge_slave_1: entered promiscuous mode [ 323.109910][T19652] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 323.198063][T19609] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 323.211910][ T9622] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 323.222318][ T9622] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 1] type 2 family 0 port 20000 - 0 [ 323.356872][ T29] kauditd_printk_skb: 408 callbacks suppressed [ 323.356886][ T29] audit: type=1326 audit(2000000004.629:25367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19655 comm="syz.1.5805" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c9b24f6c9 code=0x7ffc0000 [ 323.389114][ T29] audit: type=1326 audit(2000000004.629:25368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19655 comm="syz.1.5805" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2c9b24f6c9 code=0x7ffc0000 [ 323.413869][ T29] audit: type=1326 audit(2000000004.629:25369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19655 comm="syz.1.5805" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c9b24f6c9 code=0x7ffc0000 [ 323.438696][ T29] audit: type=1326 audit(2000000004.629:25370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19655 comm="syz.1.5805" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2c9b24f6c9 code=0x7ffc0000 [ 323.462467][ T29] audit: type=1326 audit(2000000004.629:25371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19655 comm="syz.1.5805" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c9b24f6c9 code=0x7ffc0000 [ 323.487408][ T29] audit: type=1326 audit(2000000004.629:25372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19655 comm="syz.1.5805" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2c9b24f6c9 code=0x7ffc0000 [ 323.506015][T19664] __nla_validate_parse: 9 callbacks suppressed [ 323.506031][T19664] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5808'. [ 323.512083][ T29] audit: type=1326 audit(2000000004.629:25373): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19655 comm="syz.1.5805" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c9b24f6c9 code=0x7ffc0000 [ 323.551704][ T29] audit: type=1326 audit(2000000004.640:25374): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19655 comm="syz.1.5805" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2c9b24f6c9 code=0x7ffc0000 [ 323.576243][ T29] audit: type=1326 audit(2000000004.640:25375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19655 comm="syz.1.5805" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c9b24f6c9 code=0x7ffc0000 [ 323.600928][ T29] audit: type=1326 audit(2000000004.640:25376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19655 comm="syz.1.5805" exe="/root/syz-executor" sig=0 arch=c000003e syscall=32 compat=0 ip=0x7f2c9b24f6c9 code=0x7ffc0000 [ 323.638347][T19609] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 323.698003][T19673] FAULT_INJECTION: forcing a failure. [ 323.698003][T19673] name failslab, interval 1, probability 0, space 0, times 0 [ 323.711667][T19673] CPU: 0 UID: 0 PID: 19673 Comm: syz.1.5811 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 323.711777][T19673] Tainted: [W]=WARN [ 323.711783][T19673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 323.711805][T19673] Call Trace: [ 323.711812][T19673] [ 323.711820][T19673] __dump_stack+0x1d/0x30 [ 323.711845][T19673] dump_stack_lvl+0xe8/0x140 [ 323.711874][T19673] dump_stack+0x15/0x1b [ 323.711895][T19673] should_fail_ex+0x265/0x280 [ 323.711913][T19673] should_failslab+0x8c/0xb0 [ 323.711975][T19673] kmem_cache_alloc_noprof+0x50/0x480 [ 323.712002][T19673] ? audit_log_start+0x342/0x720 [ 323.712022][T19673] audit_log_start+0x342/0x720 [ 323.712059][T19673] ? kstrtouint+0x76/0xc0 [ 323.712088][T19673] audit_seccomp+0x48/0x100 [ 323.712142][T19673] ? __seccomp_filter+0x82d/0x1250 [ 323.712168][T19673] __seccomp_filter+0x83e/0x1250 [ 323.712200][T19673] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 323.712394][T19673] ? vfs_write+0x7e8/0x960 [ 323.712421][T19673] ? __rcu_read_unlock+0x4f/0x70 [ 323.712489][T19673] ? __fget_files+0x184/0x1c0 [ 323.712522][T19673] __secure_computing+0x82/0x150 [ 323.712621][T19673] syscall_trace_enter+0xcf/0x1e0 [ 323.712653][T19673] do_syscall_64+0xac/0x200 [ 323.712676][T19673] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 323.712753][T19673] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 323.712790][T19673] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 323.712812][T19673] RIP: 0033:0x7f2c9b24f6c9 [ 323.712827][T19673] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 323.712910][T19673] RSP: 002b:00007f2c99caf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 323.712928][T19673] RAX: ffffffffffffffda RBX: 00007f2c9b4a5fa0 RCX: 00007f2c9b24f6c9 [ 323.712940][T19673] RDX: 0000000000000000 RSI: 0000000040044590 RDI: 0000000000000006 [ 323.712952][T19673] RBP: 00007f2c99caf090 R08: 0000000000000000 R09: 0000000000000000 [ 323.712964][T19673] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 323.712975][T19673] R13: 00007f2c9b4a6038 R14: 00007f2c9b4a5fa0 R15: 00007ffd5b4b4e68 [ 323.712996][T19673] [ 323.952985][ T9622] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 323.963471][ T9622] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 1] type 2 family 0 port 20000 - 0 [ 324.005535][T19609] team0: Port device team_slave_0 added [ 324.012802][T19609] team0: Port device team_slave_1 added [ 324.048760][T19669] syzkaller0: entered promiscuous mode [ 324.055377][T19669] syzkaller0: entered allmulticast mode [ 324.070353][ T9622] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 324.080720][ T9622] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 1] type 2 family 0 port 20000 - 0 [ 324.148965][T19688] ip6gretap0: entered promiscuous mode [ 324.154966][T19609] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 324.163111][T19609] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 324.190175][T19609] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 324.236876][T19686] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5816'. [ 324.253829][T19684] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5814'. [ 324.260681][T19609] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 324.269778][T19609] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 324.296821][T19609] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 324.363630][T19684] ip6gretap0 (unregistering): left promiscuous mode [ 324.404210][ T9622] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 324.414982][ T9622] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 1] type 2 family 0 port 20000 - 0 [ 324.517913][T19609] hsr_slave_0: entered promiscuous mode [ 324.529644][T19609] hsr_slave_1: entered promiscuous mode [ 324.540176][T19699] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5819'. [ 324.542091][T19609] debugfs: 'hsr0' already exists in 'hsr' [ 324.556116][T19609] Cannot create hsr debugfs directory [ 324.817482][T19707] netlink: 36 bytes leftover after parsing attributes in process `syz.0.5821'. [ 324.826515][T19707] netlink: 16 bytes leftover after parsing attributes in process `syz.0.5821'. [ 324.835545][T19707] netlink: 36 bytes leftover after parsing attributes in process `syz.0.5821'. [ 324.845753][T19707] netlink: 36 bytes leftover after parsing attributes in process `syz.0.5821'. [ 324.865716][ T9622] bond0 (unregistering): Released all slaves [ 324.880649][ T9622] bond1 (unregistering): Released all slaves [ 324.931390][T19710] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5822'. [ 324.965655][ T9622] IPVS: stopping backup sync thread 17777 ... [ 324.985679][ T9622] hsr_slave_0: left promiscuous mode [ 325.000837][ T9622] veth1_macvtap: left promiscuous mode [ 325.011856][ T9622] veth0_macvtap: left promiscuous mode [ 325.022988][ T9622] veth1_vlan: left promiscuous mode [ 325.044141][T19718] program syz.1.5826 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 325.055029][ T9622] veth0_vlan: left promiscuous mode [ 325.068636][T19720] netlink: 8 bytes leftover after parsing attributes in process `syz.6.5827'. [ 325.098253][ T9622] pimreg (unregistering): left allmulticast mode [ 325.367048][T19738] 8021q: adding VLAN 0 to HW filter on device bond0 [ 325.392757][T19738] 8021q: adding VLAN 0 to HW filter on device team0 [ 325.404349][T19738] bridge0: port 4(dummy0) entered blocking state [ 325.410991][T19738] bridge0: port 4(dummy0) entered forwarding state [ 325.422020][T19738] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 325.469206][T19609] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 325.502606][T19609] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 325.515344][T19738] hub 6-0:1.0: USB hub found [ 325.521078][T19738] hub 6-0:1.0: 8 ports detected [ 325.528638][T19609] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 325.547367][T19609] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 325.704014][ T9622] ------------[ cut here ]------------ [ 325.709701][ T9622] WARNING: CPU: 0 PID: 9622 at net/xfrm/xfrm_state.c:3306 xfrm_state_fini+0x179/0x1f0 [ 325.720476][ T9622] Modules linked in: [ 325.724394][ T9622] CPU: 0 UID: 0 PID: 9622 Comm: kworker/u8:50 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 325.735983][ T9622] Tainted: [W]=WARN [ 325.740766][ T9622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 325.751872][ T9622] Workqueue: netns cleanup_net [ 325.756691][ T9622] RIP: 0010:xfrm_state_fini+0x179/0x1f0 [ 325.763450][ T9622] Code: 48 8d bb 70 0e 00 00 e8 a5 3b b7 fc 48 8b bb 70 0e 00 00 e8 59 e8 c3 fc 5b 41 5e 41 5f 5d c3 cc cc cc cc cc e8 48 e2 9b fc 90 <0f> 0b 90 e9 d9 fe ff ff e8 3a e2 9b fc 90 0f 0b 90 4c 89 f7 e8 6e [ 325.784230][ T9622] RSP: 0018:ffffc90002e87c60 EFLAGS: 00010293 [ 325.791293][ T9622] RAX: ffffffff84bb6778 RBX: ffff888108fc3000 RCX: ffff88812403d280 [ 325.800404][ T9622] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff888108fc3e40 [ 325.802448][T19609] 8021q: adding VLAN 0 to HW filter on device bond0 [ 325.809514][ T9622] RBP: ffffffff86c91040 R08: 0001ffff868480ef R09: 0000000000000000 [ 325.824075][ T9622] R10: ffffc90002e87be8 R11: 0001c90002e87be8 R12: ffffffff86c91060 [ 325.833301][ T9622] R13: ffff888108fc3028 R14: ffff888108fc3e40 R15: ffff888108fc3000 [ 325.842316][ T9622] FS: 0000000000000000(0000) GS:ffff8882aee13000(0000) knlGS:0000000000000000 [ 325.850898][T19609] 8021q: adding VLAN 0 to HW filter on device team0 [ 325.852302][ T9622] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 325.866704][ T9622] CR2: ffffffff93000000 CR3: 000000010aa76000 CR4: 00000000003506f0 [ 325.873054][ T9594] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.875674][ T9622] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 325.881771][ T9594] bridge0: port 1(bridge_slave_0) entered forwarding state [ 325.890804][ T9622] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 325.906881][ T9622] Call Trace: [ 325.910224][ T9622] [ 325.914095][ T9622] xfrm_net_exit+0x2d/0x60 [ 325.918532][ T9622] ops_undo_list+0x27b/0x410 [ 325.922827][T19609] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 325.924217][ T9622] cleanup_net+0x2f4/0x4f0 [ 325.933556][T19609] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 325.937885][ T9622] process_scheduled_works+0x4ce/0x9d0 [ 325.954555][ T9622] worker_thread+0x582/0x770 [ 325.960250][ T9622] kthread+0x489/0x510 [ 325.964380][ T9622] ? __pfx_worker_thread+0x10/0x10 [ 325.970537][ T9622] ? __pfx_kthread+0x10/0x10 [ 325.975235][ T9622] ret_from_fork+0x122/0x1b0 [ 325.980830][ T9622] ? __pfx_kthread+0x10/0x10 [ 325.985495][ T9622] ret_from_fork_asm+0x1a/0x30 [ 325.989780][ T9594] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.991345][ T9622] [ 325.997363][ T9594] bridge0: port 2(bridge_slave_1) entered forwarding state [ 326.007897][ T9622] ---[ end trace 0000000000000000 ]--- [ 326.014117][ T9622] ------------[ cut here ]------------ [ 326.019940][ T9622] WARNING: CPU: 0 PID: 9622 at net/xfrm/xfrm_state.c:3313 xfrm_state_fini+0x1b9/0x1f0 [ 326.030591][ T9622] Modules linked in: [ 326.034506][ T9622] CPU: 0 UID: 0 PID: 9622 Comm: kworker/u8:50 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 326.048006][ T9622] Tainted: [W]=WARN [ 326.051815][ T9622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 326.062930][ T9622] Workqueue: netns cleanup_net [ 326.067725][ T9622] RIP: 0010:xfrm_state_fini+0x1b9/0x1f0 [ 326.074340][ T9622] Code: 3b b7 fc 4d 8b 3e e9 06 ff ff ff e8 21 e2 9b fc 90 0f 0b 90 4c 89 f7 e8 55 3b b7 fc 4d 8b 3e e9 24 ff ff ff e8 08 e2 9b fc 90 <0f> 0b 90 4c 89 f7 e8 3c 3b b7 fc 4d 8b 3e e9 42 ff ff ff e8 ef e1 [ 326.088745][T19609] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 326.095166][ T9622] RSP: 0018:ffffc90002e87c60 EFLAGS: 00010293 [ 326.107891][ T9622] RAX: ffffffff84bb67b8 RBX: ffff888108fc3000 RCX: ffff88812403d280 [ 326.117050][ T9622] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8881170eba00 [ 326.126024][ T9622] RBP: 0000000000000040 R08: 0001888108fc3e5f R09: 0000000000000000 [ 326.135001][ T9622] R10: ffff8881170eb500 R11: 00018881170eb37f R12: ffffffff86c91060 [ 326.144002][ T9622] R13: ffff888108fc3028 R14: ffff888108fc3e58 R15: ffff8881170eba00 [ 326.152938][ T9622] FS: 0000000000000000(0000) GS:ffff8882aee13000(0000) knlGS:0000000000000000 [ 326.163049][ T9622] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 326.170700][ T9622] CR2: ffffffff93000000 CR3: 000000010aa76000 CR4: 00000000003506f0 [ 326.179812][ T9622] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 326.188732][ T9622] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 326.197774][ T9622] Call Trace: [ 326.201059][ T9622] [ 326.203993][ T9622] xfrm_net_exit+0x2d/0x60 [ 326.209407][ T9622] ops_undo_list+0x27b/0x410 [ 326.214027][ T9622] cleanup_net+0x2f4/0x4f0 [ 326.219567][ T9622] process_scheduled_works+0x4ce/0x9d0 [ 326.225068][ T9622] worker_thread+0x582/0x770 [ 326.230607][ T9622] kthread+0x489/0x510 [ 326.234681][ T9622] ? __pfx_worker_thread+0x10/0x10 [ 326.241052][ T9622] ? __pfx_kthread+0x10/0x10 [ 326.246840][ T9622] ret_from_fork+0x122/0x1b0 [ 326.251454][ T9622] ? __pfx_kthread+0x10/0x10 [ 326.257135][ T9622] ret_from_fork_asm+0x1a/0x30 [ 326.261931][ T9622] [ 326.265936][ T9622] ---[ end trace 0000000000000000 ]--- [ 326.272653][ T9622] ------------[ cut here ]------------ [ 326.279230][ T9622] WARNING: CPU: 0 PID: 9622 at net/xfrm/xfrm_state.c:3315 xfrm_state_fini+0x1d2/0x1f0 [ 326.289761][ T9622] Modules linked in: [ 326.293847][ T9622] CPU: 0 UID: 0 PID: 9622 Comm: kworker/u8:50 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 326.305548][ T9622] Tainted: [W]=WARN [ 326.309355][ T9622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 326.319831][ T9622] Workqueue: netns cleanup_net [ 326.325746][ T9622] RIP: 0010:xfrm_state_fini+0x1d2/0x1f0 [ 326.332334][ T9622] Code: 3b b7 fc 4d 8b 3e e9 24 ff ff ff e8 08 e2 9b fc 90 0f 0b 90 4c 89 f7 e8 3c 3b b7 fc 4d 8b 3e e9 42 ff ff ff e8 ef e1 9b fc 90 <0f> 0b 90 4c 89 f7 e8 23 3b b7 fc 4d 8b 3e e9 60 ff ff ff 66 66 2e [ 326.342416][T19609] veth0_vlan: entered promiscuous mode [ 326.352959][ T9622] RSP: 0018:ffffc90002e87c60 EFLAGS: 00010293 [ 326.364489][ T9622] RAX: ffffffff84bb67d1 RBX: ffff888108fc3000 RCX: ffff88812403d280 [ 326.373506][ T9622] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8881170eb880 [ 326.381527][T19609] veth1_vlan: entered promiscuous mode [ 326.389228][ T9622] RBP: 0000000000000040 R08: 0001888108fc3e57 R09: 0000000000000000 [ 326.398589][ T9622] R10: ffff8881170eb340 R11: 00018881170eba3f R12: ffffffff86c91060 [ 326.399628][T19609] veth0_macvtap: entered promiscuous mode [ 326.407576][ T9622] R13: ffff888108fc3028 R14: ffff888108fc3e50 R15: ffff8881170eb880 [ 326.421326][ T9622] FS: 0000000000000000(0000) GS:ffff8882aee13000(0000) knlGS:0000000000000000 [ 326.431300][ T9622] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 326.431656][T19609] veth1_macvtap: entered promiscuous mode [ 326.437920][ T9622] CR2: ffffffff93000000 CR3: 000000010aa76000 CR4: 00000000003506f0 [ 326.437938][ T9622] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 326.450708][T19609] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 326.452694][ T9622] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 326.464500][T19609] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 326.468032][ T9622] Call Trace: [ 326.479056][ T9594] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 326.482086][ T9622] [ 326.485920][ T9594] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 326.486002][ T9594] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 326.486034][ T9594] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 326.526355][ T9622] xfrm_net_exit+0x2d/0x60 [ 326.531632][ T9622] ops_undo_list+0x27b/0x410 [ 326.536247][ T9622] cleanup_net+0x2f4/0x4f0 [ 326.541442][ T9622] process_scheduled_works+0x4ce/0x9d0 [ 326.546901][ T9622] worker_thread+0x582/0x770 [ 326.552218][ T9622] kthread+0x489/0x510 [ 326.556296][ T9622] ? __pfx_worker_thread+0x10/0x10 [ 326.561982][ T9622] ? __pfx_kthread+0x10/0x10 [ 326.566645][ T9622] ret_from_fork+0x122/0x1b0 [ 326.571849][ T9622] ? __pfx_kthread+0x10/0x10 [ 326.576422][ T9622] ret_from_fork_asm+0x1a/0x30 [ 326.581886][ T9622] [ 326.584986][ T9622] ---[ end trace 0000000000000000 ]--- [ 326.709172][T19796] SELinux: failed to load policy [ 326.741936][T19801] tipc: Started in network mode [ 326.746884][T19801] tipc: Node identity c6e51629dba4, cluster identity 4711 [ 326.755253][T19801] tipc: Enabled bearer , priority 0 [ 326.764151][T19801] FAULT_INJECTION: forcing a failure. [ 326.764151][T19801] name failslab, interval 1, probability 0, space 0, times 0 [ 326.777968][T19801] CPU: 0 UID: 0 PID: 19801 Comm: syz.6.5846 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 326.778054][T19801] Tainted: [W]=WARN [ 326.778062][T19801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 326.778076][T19801] Call Trace: [ 326.778083][T19801] [ 326.778092][T19801] __dump_stack+0x1d/0x30 [ 326.778114][T19801] dump_stack_lvl+0xe8/0x140 [ 326.778135][T19801] dump_stack+0x15/0x1b [ 326.778237][T19801] should_fail_ex+0x265/0x280 [ 326.778261][T19801] should_failslab+0x8c/0xb0 [ 326.778294][T19801] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 326.778329][T19801] ? __alloc_skb+0x101/0x320 [ 326.778407][T19801] __alloc_skb+0x101/0x320 [ 326.778514][T19801] inet_netconf_notify_devconf+0x173/0x230 [ 326.778548][T19801] inetdev_event+0x743/0xc10 [ 326.778565][T19801] ? __pfx_ib_netdevice_event+0x10/0x10 [ 326.778619][T19801] ? ib_netdevice_event+0x186/0x5f0 [ 326.778687][T19801] ? __pfx_inetdev_event+0x10/0x10 [ 326.778706][T19801] raw_notifier_call_chain+0x6f/0x1b0 [ 326.778730][T19801] ? call_netdevice_notifiers_info+0x9c/0x100 [ 326.778780][T19801] call_netdevice_notifiers_info+0xae/0x100 [ 326.778803][T19801] unregister_netdevice_many_notify+0xe76/0x1690 [ 326.778829][T19801] unregister_netdevice_queue+0x1f5/0x220 [ 326.778934][T19801] __tun_detach+0x82c/0xb30 [ 326.778977][T19801] ? __pfx_tun_chr_close+0x10/0x10 [ 326.779009][T19801] tun_chr_close+0x5a/0x100 [ 326.779040][T19801] __fput+0x29b/0x650 [ 326.779092][T19801] fput_close_sync+0x6e/0x120 [ 326.779110][T19801] __x64_sys_close+0x56/0xf0 [ 326.779144][T19801] x64_sys_call+0x273c/0x3000 [ 326.779165][T19801] do_syscall_64+0xd2/0x200 [ 326.779187][T19801] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 326.779218][T19801] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 326.779267][T19801] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 326.779315][T19801] RIP: 0033:0x7f0b43b5f6c9 [ 326.779354][T19801] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 326.779375][T19801] RSP: 002b:00007f0b425c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 326.779396][T19801] RAX: ffffffffffffffda RBX: 00007f0b43db5fa0 RCX: 00007f0b43b5f6c9 [ 326.779432][T19801] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 326.779450][T19801] RBP: 00007f0b425c7090 R08: 0000000000000000 R09: 0000000000000000 [ 326.779464][T19801] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 326.779477][T19801] R13: 00007f0b43db6038 R14: 00007f0b43db5fa0 R15: 00007ffea1e8f008 [ 326.779497][T19801] [ 327.050678][T19801] tipc: Disabling bearer [ 327.067337][T19791] FAULT_INJECTION: forcing a failure. [ 327.067337][T19791] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 327.081569][T19791] CPU: 0 UID: 0 PID: 19791 Comm: syz.1.5845 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 327.081610][T19791] Tainted: [W]=WARN [ 327.081618][T19791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 327.081632][T19791] Call Trace: [ 327.081640][T19791] [ 327.081649][T19791] __dump_stack+0x1d/0x30 [ 327.081675][T19791] dump_stack_lvl+0xe8/0x140 [ 327.081700][T19791] dump_stack+0x15/0x1b [ 327.081721][T19791] should_fail_ex+0x265/0x280 [ 327.081754][T19791] should_fail+0xb/0x20 [ 327.081772][T19791] should_fail_usercopy+0x1a/0x20 [ 327.081797][T19791] _copy_from_user+0x1c/0xb0 [ 327.081826][T19791] io_sqe_files_register+0x1e5/0x4f0 [ 327.081896][T19791] __se_sys_io_uring_register+0xa23/0xf30 [ 327.081931][T19791] ? fput+0x8f/0xc0 [ 327.081952][T19791] ? ksys_write+0x192/0x1a0 [ 327.082054][T19791] __x64_sys_io_uring_register+0x55/0x70 [ 327.082083][T19791] x64_sys_call+0x18a3/0x3000 [ 327.082104][T19791] do_syscall_64+0xd2/0x200 [ 327.082126][T19791] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 327.082297][T19791] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 327.082328][T19791] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 327.082374][T19791] RIP: 0033:0x7f2c9b24f6c9 [ 327.082391][T19791] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 327.082408][T19791] RSP: 002b:00007f2c99caf038 EFLAGS: 00000246 ORIG_RAX: 00000000000001ab [ 327.082439][T19791] RAX: ffffffffffffffda RBX: 00007f2c9b4a5fa0 RCX: 00007f2c9b24f6c9 [ 327.082455][T19791] RDX: 0000200000000180 RSI: 0000000000000002 RDI: 0000000000000006 [ 327.082466][T19791] RBP: 00007f2c99caf090 R08: 0000000000000000 R09: 0000000000000000 [ 327.082477][T19791] R10: 00000000000000fe R11: 0000000000000246 R12: 0000000000000002 [ 327.082492][T19791] R13: 00007f2c9b4a6038 R14: 00007f2c9b4a5fa0 R15: 00007ffd5b4b4e68 [ 327.082518][T19791] [ 327.293445][T19814] netlink: 'syz.0.5851': attribute type 10 has an invalid length. [ 327.306714][T19814] ipvlan0: entered allmulticast mode [ 327.313087][T19814] veth0_vlan: entered allmulticast mode [ 327.370562][T19814] team0: Device ipvlan0 failed to register rx_handler [ 327.392003][T19814] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 327.418040][T19821] tipc: Enabled bearer , priority 0 [ 327.428372][T19821] tipc: Disabling bearer [ 327.439053][T19824] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 327.579662][T19835] ref_ctr_offset mismatch. inode: 0x2b3 offset: 0x7 ref_ctr_offset(old): 0x2 ref_ctr_offset(new): 0x0 [ 327.989793][ T9594] netdevsim netdevsim3 netdevsim3 (unregistering): left allmulticast mode [ 328.000830][ T9594] netdevsim netdevsim3 netdevsim3 (unregistering): left promiscuous mode [ 328.010626][ T9594] bridge0: port 3(netdevsim3) entered disabled state [ 328.012632][T19875] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 328.083665][T19881] FAULT_INJECTION: forcing a failure. [ 328.083665][T19881] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 328.096867][T19881] CPU: 1 UID: 0 PID: 19881 Comm: syz.1.5872 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 328.096945][T19881] Tainted: [W]=WARN [ 328.096952][T19881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 328.096964][T19881] Call Trace: [ 328.096970][T19881] [ 328.096982][T19881] __dump_stack+0x1d/0x30 [ 328.097055][T19881] dump_stack_lvl+0xe8/0x140 [ 328.097076][T19881] dump_stack+0x15/0x1b [ 328.097098][T19881] should_fail_ex+0x265/0x280 [ 328.097119][T19881] should_fail+0xb/0x20 [ 328.097137][T19881] should_fail_usercopy+0x1a/0x20 [ 328.097174][T19881] _copy_from_user+0x1c/0xb0 [ 328.097200][T19881] __copy_msghdr+0x244/0x300 [ 328.097231][T19881] ___sys_sendmsg+0x109/0x1d0 [ 328.097262][T19881] __x64_sys_sendmsg+0xd4/0x160 [ 328.097349][T19881] x64_sys_call+0x191e/0x3000 [ 328.097372][T19881] do_syscall_64+0xd2/0x200 [ 328.097395][T19881] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 328.097527][T19881] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 328.097633][T19881] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 328.097657][T19881] RIP: 0033:0x7f2c9b24f6c9 [ 328.097673][T19881] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 328.097692][T19881] RSP: 002b:00007f2c99caf038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 328.097712][T19881] RAX: ffffffffffffffda RBX: 00007f2c9b4a5fa0 RCX: 00007f2c9b24f6c9 [ 328.097780][T19881] RDX: 000000002000c000 RSI: 0000200000000200 RDI: 0000000000000003 [ 328.097794][T19881] RBP: 00007f2c99caf090 R08: 0000000000000000 R09: 0000000000000000 [ 328.097828][T19881] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 328.097841][T19881] R13: 00007f2c9b4a6038 R14: 00007f2c9b4a5fa0 R15: 00007ffd5b4b4e68 [ 328.097860][T19881] [ 328.325270][T19867] chnl_net:caif_netlink_parms(): no params data found [ 328.381264][ T29] kauditd_printk_skb: 668 callbacks suppressed [ 328.381280][ T29] audit: type=1326 audit(6294967305.901:26043): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19893 comm="syz.0.5876" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f23d5eaf6c9 code=0x7ffc0000 [ 328.417950][ T29] audit: type=1326 audit(6294967305.901:26044): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19893 comm="syz.0.5876" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f23d5eaf6c9 code=0x7ffc0000 [ 328.440337][T19897] program syz.5.5877 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 328.448937][ T29] audit: type=1326 audit(6294967305.943:26045): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19893 comm="syz.0.5876" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f23d5eadf10 code=0x7ffc0000 [ 328.475262][ T29] audit: type=1326 audit(6294967305.943:26046): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19893 comm="syz.0.5876" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f23d5eadf10 code=0x7ffc0000 [ 328.499843][ T29] audit: type=1326 audit(6294967305.943:26047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19893 comm="syz.0.5876" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f23d5eaf6c9 code=0x7ffc0000 [ 328.523670][ T29] audit: type=1326 audit(6294967305.943:26048): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19893 comm="syz.0.5876" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f23d5eaf6c9 code=0x7ffc0000 [ 328.548408][ T29] audit: type=1326 audit(6294967305.964:26049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19893 comm="syz.0.5876" exe="/root/syz-executor" sig=0 arch=c000003e syscall=78 compat=0 ip=0x7f23d5eaf6c9 code=0x7ffc0000 [ 328.570984][T19902] program syz.0.5878 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 328.572871][ T29] audit: type=1326 audit(6294967305.964:26050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19893 comm="syz.0.5876" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f23d5eaf6c9 code=0x7ffc0000 [ 328.605816][ T29] audit: type=1326 audit(6294967305.964:26051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19893 comm="syz.0.5876" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f23d5eaf6c9 code=0x7ffc0000 [ 328.630435][ T29] audit: type=1326 audit(6294967305.964:26052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19893 comm="syz.0.5876" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f23d5eaf6c9 code=0x7ffc0000 [ 328.677902][T19867] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.685075][T19867] bridge0: port 1(bridge_slave_0) entered disabled state [ 328.693716][T19867] bridge_slave_0: entered allmulticast mode [ 328.700443][T19867] bridge_slave_0: entered promiscuous mode [ 328.756410][T19904] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 328.756508][T19908] SELinux: failed to load policy [ 328.818293][T19867] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.825445][T19867] bridge0: port 2(bridge_slave_1) entered disabled state [ 328.827940][T19913] FAULT_INJECTION: forcing a failure. [ 328.827940][T19913] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 328.832814][T19867] bridge_slave_1: entered allmulticast mode [ 328.846732][T19913] CPU: 0 UID: 0 PID: 19913 Comm: syz.0.5883 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 328.846766][T19913] Tainted: [W]=WARN [ 328.846774][T19913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 328.846786][T19913] Call Trace: [ 328.846793][T19913] [ 328.846801][T19913] __dump_stack+0x1d/0x30 [ 328.846855][T19913] dump_stack_lvl+0xe8/0x140 [ 328.846877][T19913] dump_stack+0x15/0x1b [ 328.846915][T19913] should_fail_ex+0x265/0x280 [ 328.846936][T19913] should_fail+0xb/0x20 [ 328.846953][T19913] should_fail_usercopy+0x1a/0x20 [ 328.846976][T19913] _copy_from_user+0x1c/0xb0 [ 328.847002][T19913] bpf_test_init+0xb9/0x140 [ 328.847110][T19913] bpf_prog_test_run_xdp+0x305/0x970 [ 328.847225][T19913] ? kstrtouint+0x51/0xc0 [ 328.847257][T19913] ? __rcu_read_unlock+0x4f/0x70 [ 328.847311][T19913] ? __pfx_bpf_prog_test_run_xdp+0x10/0x10 [ 328.847346][T19913] bpf_prog_test_run+0x22a/0x390 [ 328.847399][T19913] __sys_bpf+0x4c0/0x7c0 [ 328.847426][T19913] __x64_sys_bpf+0x41/0x50 [ 328.847458][T19913] x64_sys_call+0x2aee/0x3000 [ 328.847482][T19913] do_syscall_64+0xd2/0x200 [ 328.847569][T19913] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 328.847599][T19913] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 328.847656][T19913] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 328.847746][T19913] RIP: 0033:0x7f23d5eaf6c9 [ 328.847763][T19913] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 328.847782][T19913] RSP: 002b:00007f23d4917038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 328.847802][T19913] RAX: ffffffffffffffda RBX: 00007f23d6105fa0 RCX: 00007f23d5eaf6c9 [ 328.847867][T19913] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 328.847880][T19913] RBP: 00007f23d4917090 R08: 0000000000000000 R09: 0000000000000000 [ 328.847966][T19913] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 328.847979][T19913] R13: 00007f23d6106038 R14: 00007f23d6105fa0 R15: 00007ffc8c0030b8 [ 328.847999][T19913] [ 328.957066][T19921] IPv6: NLM_F_CREATE should be specified when creating new route [ 328.960748][T19909] hub 6-0:1.0: USB hub found [ 328.997513][T19926] __nla_validate_parse: 5 callbacks suppressed [ 328.997530][T19926] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5888'. [ 329.004879][T19909] hub 6-0:1.0: 8 ports detected [ 329.017532][T19867] bridge_slave_1: entered promiscuous mode [ 329.139611][T19867] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 329.170362][T19867] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 329.179815][ T9594] dummy0: left allmulticast mode [ 329.184763][ T9594] dummy0: left promiscuous mode [ 329.189813][ T9594] bridge0: port 4(dummy0) entered disabled state [ 329.209003][ T9594] bridge_slave_1: left allmulticast mode [ 329.214663][ T9594] bridge_slave_1: left promiscuous mode [ 329.220552][ T9594] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.229592][ T9594] bridge_slave_0: left allmulticast mode [ 329.236376][ T9594] bridge_slave_0: left promiscuous mode [ 329.242105][ T9594] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.334314][T19940] netlink: 16 bytes leftover after parsing attributes in process `syz.5.5893'. [ 329.372745][ T9594] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 329.523648][ T9594] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 329.534070][ T9594] bond0 (unregistering): Released all slaves [ 329.541479][T19947] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 329.550272][T19947] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 329.603193][T19867] team0: Port device team_slave_0 added [ 329.603726][T19948] SELinux: failed to load policy [ 329.619950][T19867] team0: Port device team_slave_1 added [ 329.640307][T19867] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 329.648327][T19867] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 329.675323][T19867] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 329.694764][ T9594] hsr_slave_0: left promiscuous mode [ 329.700411][ T9594] hsr_slave_1: left promiscuous mode [ 329.706449][T19952] netlink: 28 bytes leftover after parsing attributes in process `syz.1.5897'. [ 329.707232][T19952] tipc: Can't bind to reserved service type 0 [ 329.726124][ T9594] pimreg (unregistering): left allmulticast mode [ 329.761570][ T9594] team0 (unregistering): Port device team_slave_0 removed [ 329.824382][T19867] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 329.832385][T19867] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 329.855365][T19959] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5900'. [ 329.859307][T19867] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 329.927975][T19867] hsr_slave_0: entered promiscuous mode [ 329.935303][T19867] hsr_slave_1: entered promiscuous mode [ 330.023428][T19968] SELinux: failed to load policy [ 330.333693][T19867] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 330.371984][T19867] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 330.400744][T19867] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 330.419977][T19867] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 330.534760][T19867] 8021q: adding VLAN 0 to HW filter on device bond0 [ 330.576833][T19867] 8021q: adding VLAN 0 to HW filter on device team0 [ 330.598521][ T9603] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.605601][ T9603] bridge0: port 1(bridge_slave_0) entered forwarding state [ 330.654684][T11560] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.661755][T11560] bridge0: port 2(bridge_slave_1) entered forwarding state [ 330.662864][T19990] netlink: 8 bytes leftover after parsing attributes in process `syz.0.5911'. [ 330.723302][T19994] netlink: 8 bytes leftover after parsing attributes in process `syz.6.5913'. [ 330.760390][T19997] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 330.827168][T20001] SELinux: failed to load policy [ 330.827396][T19867] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 330.884648][T20006] netlink: 4 bytes leftover after parsing attributes in process `syz.5.5916'. [ 330.903971][T20010] IPv6: NLM_F_CREATE should be specified when creating new route [ 330.973343][T20018] ref_ctr_offset mismatch. inode: 0x60 offset: 0x7 ref_ctr_offset(old): 0x2 ref_ctr_offset(new): 0x0 [ 331.037902][T20022] netlink: 16 bytes leftover after parsing attributes in process `syz.6.5921'. [ 331.045061][T19867] veth0_vlan: entered promiscuous mode [ 331.123712][T19867] veth1_vlan: entered promiscuous mode [ 331.141209][T20028] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 331.163000][T19867] veth0_macvtap: entered promiscuous mode [ 331.174989][T19867] veth1_macvtap: entered promiscuous mode [ 331.222530][T19867] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 331.237360][T19867] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 331.259170][T11560] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 331.298341][T11560] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 331.310595][T20036] SELinux: failed to load policy [ 331.323933][T11560] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 331.334427][T20040] netlink: 4 bytes leftover after parsing attributes in process `syz.5.5929'. [ 331.342557][T11560] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 331.347530][T20042] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 331.376476][T20042] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 331.420003][T20045] xt_CT: You must specify a L4 protocol and not use inversions on it [ 331.453221][T20045] wireguard0: entered promiscuous mode [ 331.458909][T20045] wireguard0: entered allmulticast mode [ 331.487939][T20056] program syz.5.5935 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 331.524216][T20057] SELinux: failed to load policy [ 331.624363][T20066] FAULT_INJECTION: forcing a failure. [ 331.624363][T20066] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 331.637519][T20066] CPU: 1 UID: 0 PID: 20066 Comm: syz.6.5937 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 331.637552][T20066] Tainted: [W]=WARN [ 331.637560][T20066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 331.637574][T20066] Call Trace: [ 331.637583][T20066] [ 331.637592][T20066] __dump_stack+0x1d/0x30 [ 331.637625][T20066] dump_stack_lvl+0xe8/0x140 [ 331.637647][T20066] dump_stack+0x15/0x1b [ 331.637664][T20066] should_fail_ex+0x265/0x280 [ 331.637683][T20066] should_fail+0xb/0x20 [ 331.637700][T20066] should_fail_usercopy+0x1a/0x20 [ 331.637746][T20066] _copy_to_user+0x20/0xa0 [ 331.637774][T20066] simple_read_from_buffer+0xb5/0x130 [ 331.637821][T20066] proc_fail_nth_read+0x10e/0x150 [ 331.637885][T20066] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 331.637914][T20066] vfs_read+0x1a8/0x770 [ 331.637939][T20066] ? __rcu_read_unlock+0x4f/0x70 [ 331.638000][T20066] ? __fget_files+0x184/0x1c0 [ 331.638028][T20066] ksys_read+0xda/0x1a0 [ 331.638052][T20066] __x64_sys_read+0x40/0x50 [ 331.638076][T20066] x64_sys_call+0x27c0/0x3000 [ 331.638116][T20066] do_syscall_64+0xd2/0x200 [ 331.638139][T20066] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 331.638166][T20066] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 331.638226][T20066] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 331.638250][T20066] RIP: 0033:0x7f0b43b5e0dc [ 331.638268][T20066] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 331.638288][T20066] RSP: 002b:00007f0b425c7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 331.638352][T20066] RAX: ffffffffffffffda RBX: 00007f0b43db5fa0 RCX: 00007f0b43b5e0dc [ 331.638367][T20066] RDX: 000000000000000f RSI: 00007f0b425c70a0 RDI: 0000000000000003 [ 331.638380][T20066] RBP: 00007f0b425c7090 R08: 0000000000000000 R09: 0000000000000000 [ 331.638392][T20066] R10: 0000000000000072 R11: 0000000000000246 R12: 0000000000000001 [ 331.638418][T20066] R13: 00007f0b43db6038 R14: 00007f0b43db5fa0 R15: 00007ffea1e8f008 [ 331.638440][T20066] [ 331.878911][T20070] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5939'. [ 331.932383][T20073] SELinux: failed to load policy [ 332.001474][T20083] 9pnet_fd: Insufficient options for proto=fd [ 332.018850][T20083] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 332.026509][T20083] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 332.059090][T20083] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 332.066568][T20083] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 332.216806][T20100] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 332.225615][T20100] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 332.830067][T20140] 0ªX¹¦À: renamed from caif0 [ 332.837485][T20140] 0ªX¹¦À: entered allmulticast mode [ 332.842757][T20140] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 333.041294][T20161] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 333.058598][T20161] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 333.135109][T20163] 9pnet_fd: Insufficient options for proto=fd [ 333.152134][ T29] kauditd_printk_skb: 705 callbacks suppressed [ 333.152148][ T29] audit: type=1326 audit(6294967310.919:26758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20162 comm="syz.6.5978" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0b43b5f6c9 code=0x7ffc0000 [ 333.205793][ T29] audit: type=1326 audit(6294967310.950:26759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20162 comm="syz.6.5978" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0b43b5f6c9 code=0x7ffc0000 [ 333.230622][ T29] audit: type=1326 audit(6294967310.950:26760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20165 comm="syz.1.5979" exe="/root/syz-executor" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7f2c9b24f6c9 code=0x7ffc0000 [ 333.301086][ T29] audit: type=1326 audit(6294967311.034:26761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20164 comm="syz.6.5978" exe="/root/syz-executor" sig=0 arch=c000003e syscall=60 compat=0 ip=0x7f0b43b5f6c9 code=0x7ffc0000 [ 333.522148][T20184] netlink: 'syz.3.5984': attribute type 10 has an invalid length. [ 333.540297][ T29] audit: type=1326 audit(6294967311.318:26762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20182 comm="syz.6.5986" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0b43b5f6c9 code=0x7ffc0000 [ 333.564808][ T29] audit: type=1326 audit(6294967311.318:26763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20182 comm="syz.6.5986" exe="/root/syz-executor" sig=0 arch=c000003e syscall=220 compat=0 ip=0x7f0b43b5f6c9 code=0x7ffc0000 [ 333.589181][ T29] audit: type=1326 audit(6294967311.318:26764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20182 comm="syz.6.5986" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0b43b5f6c9 code=0x7ffc0000 [ 333.666165][T20192] siw: device registration error -23 [ 333.694942][T20187] FAULT_INJECTION: forcing a failure. [ 333.694942][T20187] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 333.709099][T20187] CPU: 0 UID: 0 PID: 20187 Comm: syz.6.5987 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 333.709132][T20187] Tainted: [W]=WARN [ 333.709205][T20187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 333.709218][T20187] Call Trace: [ 333.709225][T20187] [ 333.709233][T20187] __dump_stack+0x1d/0x30 [ 333.709312][T20187] dump_stack_lvl+0xe8/0x140 [ 333.709347][T20187] dump_stack+0x15/0x1b [ 333.709368][T20187] should_fail_ex+0x265/0x280 [ 333.709391][T20187] should_fail+0xb/0x20 [ 333.709409][T20187] should_fail_usercopy+0x1a/0x20 [ 333.709433][T20187] _copy_from_user+0x1c/0xb0 [ 333.709510][T20187] __sys_sendto+0x19e/0x330 [ 333.709578][T20187] __x64_sys_sendto+0x76/0x90 [ 333.709626][T20187] x64_sys_call+0x2d14/0x3000 [ 333.709696][T20187] do_syscall_64+0xd2/0x200 [ 333.709716][T20187] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 333.709797][T20187] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 333.709830][T20187] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 333.709853][T20187] RIP: 0033:0x7f0b43b5f6c9 [ 333.709931][T20187] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 333.709949][T20187] RSP: 002b:00007f0b425c7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 333.709967][T20187] RAX: ffffffffffffffda RBX: 00007f0b43db5fa0 RCX: 00007f0b43b5f6c9 [ 333.709982][T20187] RDX: 000000000000f4ff RSI: 0000000000000000 RDI: 0000000000000003 [ 333.709997][T20187] RBP: 00007f0b425c7090 R08: 0000200000000200 R09: 0000000000000010 [ 333.710012][T20187] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 333.710026][T20187] R13: 00007f0b43db6038 R14: 00007f0b43db5fa0 R15: 00007ffea1e8f008 [ 333.710048][T20187] [ 333.742280][T20184] ipvlan0: entered allmulticast mode [ 333.892226][T20184] veth0_vlan: entered allmulticast mode [ 333.903562][T20184] team0: Device ipvlan0 failed to register rx_handler [ 333.954424][ T29] audit: type=1326 audit(6294967311.758:26765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20197 comm="syz.6.5990" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0b43b5f6c9 code=0x7ffc0000 [ 333.989217][ T29] audit: type=1326 audit(6294967311.790:26766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20197 comm="syz.6.5990" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f0b43b5df10 code=0x7ffc0000 [ 334.013922][ T29] audit: type=1326 audit(6294967311.790:26767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20197 comm="syz.6.5990" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f0b43b5df10 code=0x7ffc0000 [ 334.075796][T20204] __nla_validate_parse: 11 callbacks suppressed [ 334.075813][T20204] netlink: 131740 bytes leftover after parsing attributes in process `syz.3.5991'. [ 334.095811][T20198] 9pnet_fd: Insufficient options for proto=fd [ 334.104047][T20198] netlink: 4 bytes leftover after parsing attributes in process `syz.6.5990'. [ 334.212786][T20206] netlink: 16 bytes leftover after parsing attributes in process `syz.6.5992'. [ 334.325463][T20210] SELinux: failed to load policy [ 334.737019][T20244] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6003'. [ 334.923400][T20262] SELinux: failed to load policy [ 334.960568][T20267] netlink: 16 bytes leftover after parsing attributes in process `syz.5.6012'. [ 335.021493][T20271] netlink: 16 bytes leftover after parsing attributes in process `syz.5.6014'. [ 335.082484][T20277] ref_ctr_offset mismatch. inode: 0x111 offset: 0x7 ref_ctr_offset(old): 0x2 ref_ctr_offset(new): 0x0 [ 335.138049][T20283] FAULT_INJECTION: forcing a failure. [ 335.138049][T20283] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 335.152099][T20283] CPU: 0 UID: 0 PID: 20283 Comm: syz.5.6020 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 335.152203][T20283] Tainted: [W]=WARN [ 335.152211][T20283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 335.152226][T20283] Call Trace: [ 335.152234][T20283] [ 335.152243][T20283] __dump_stack+0x1d/0x30 [ 335.152268][T20283] dump_stack_lvl+0xe8/0x140 [ 335.152384][T20283] dump_stack+0x15/0x1b [ 335.152404][T20283] should_fail_ex+0x265/0x280 [ 335.152428][T20283] should_fail+0xb/0x20 [ 335.152447][T20283] should_fail_usercopy+0x1a/0x20 [ 335.152470][T20283] _copy_from_iter+0xd2/0xe80 [ 335.152563][T20283] ? __build_skb_around+0x1ab/0x200 [ 335.152598][T20283] ? __alloc_skb+0x223/0x320 [ 335.152628][T20283] netlink_sendmsg+0x471/0x6b0 [ 335.152650][T20283] ? __pfx_netlink_sendmsg+0x10/0x10 [ 335.152696][T20283] __sock_sendmsg+0x145/0x180 [ 335.152721][T20283] ____sys_sendmsg+0x31e/0x4e0 [ 335.152762][T20283] ___sys_sendmsg+0x17b/0x1d0 [ 335.152800][T20283] __x64_sys_sendmsg+0xd4/0x160 [ 335.152822][T20283] x64_sys_call+0x191e/0x3000 [ 335.152889][T20283] do_syscall_64+0xd2/0x200 [ 335.152908][T20283] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 335.153032][T20283] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 335.153068][T20283] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 335.153090][T20283] RIP: 0033:0x7f2349daf6c9 [ 335.153107][T20283] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 335.153160][T20283] RSP: 002b:00007f2348817038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 335.153185][T20283] RAX: ffffffffffffffda RBX: 00007f234a005fa0 RCX: 00007f2349daf6c9 [ 335.153201][T20283] RDX: 0000000020008840 RSI: 00002000000002c0 RDI: 0000000000000003 [ 335.153216][T20283] RBP: 00007f2348817090 R08: 0000000000000000 R09: 0000000000000000 [ 335.153230][T20283] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 335.153243][T20283] R13: 00007f234a006038 R14: 00007f234a005fa0 R15: 00007ffdd25994f8 [ 335.153261][T20283] [ 335.442933][T20288] netlink: 16 bytes leftover after parsing attributes in process `syz.6.6023'. [ 335.443930][T20289] netlink: 8 bytes leftover after parsing attributes in process `syz.0.6021'. [ 335.527382][T20292] netlink: 8 bytes leftover after parsing attributes in process `syz.6.6024'. [ 335.539859][T20294] netlink: 16 bytes leftover after parsing attributes in process `syz.0.6025'. [ 335.748329][T20300] SELinux: failed to load policy [ 335.779540][T20310] FAULT_INJECTION: forcing a failure. [ 335.779540][T20310] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 335.792659][T20310] CPU: 1 UID: 0 PID: 20310 Comm: syz.0.6030 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 335.792695][T20310] Tainted: [W]=WARN [ 335.792702][T20310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 335.792718][T20310] Call Trace: [ 335.792726][T20310] [ 335.792733][T20310] __dump_stack+0x1d/0x30 [ 335.792758][T20310] dump_stack_lvl+0xe8/0x140 [ 335.792782][T20310] dump_stack+0x15/0x1b [ 335.792818][T20310] should_fail_ex+0x265/0x280 [ 335.792885][T20310] should_fail+0xb/0x20 [ 335.792916][T20310] should_fail_usercopy+0x1a/0x20 [ 335.792948][T20310] _copy_from_iter+0xd2/0xe80 [ 335.793012][T20310] ? __build_skb_around+0x1ab/0x200 [ 335.793082][T20310] ? __alloc_skb+0x223/0x320 [ 335.793149][T20310] netlink_sendmsg+0x471/0x6b0 [ 335.793172][T20310] ? __pfx_netlink_sendmsg+0x10/0x10 [ 335.793191][T20310] __sock_sendmsg+0x145/0x180 [ 335.793222][T20310] ____sys_sendmsg+0x31e/0x4e0 [ 335.793310][T20310] ___sys_sendmsg+0x17b/0x1d0 [ 335.793351][T20310] __x64_sys_sendmsg+0xd4/0x160 [ 335.793376][T20310] x64_sys_call+0x191e/0x3000 [ 335.793481][T20310] do_syscall_64+0xd2/0x200 [ 335.793504][T20310] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 335.793537][T20310] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 335.793574][T20310] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 335.793626][T20310] RIP: 0033:0x7f23d5eaf6c9 [ 335.793641][T20310] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 335.793658][T20310] RSP: 002b:00007f23d4917038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 335.793678][T20310] RAX: ffffffffffffffda RBX: 00007f23d6105fa0 RCX: 00007f23d5eaf6c9 [ 335.793693][T20310] RDX: 0000000000000000 RSI: 00002000000002c0 RDI: 0000000000000003 [ 335.793708][T20310] RBP: 00007f23d4917090 R08: 0000000000000000 R09: 0000000000000000 [ 335.793747][T20310] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 335.793759][T20310] R13: 00007f23d6106038 R14: 00007f23d6105fa0 R15: 00007ffc8c0030b8 [ 335.793776][T20310] [ 336.429715][T20330] 0ªX¹¦À: left allmulticast mode [ 336.434775][T20330] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 336.795136][T20343] FAULT_INJECTION: forcing a failure. [ 336.795136][T20343] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 336.808343][T20343] CPU: 1 UID: 0 PID: 20343 Comm: syz.0.6042 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 336.808377][T20343] Tainted: [W]=WARN [ 336.808383][T20343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 336.808395][T20343] Call Trace: [ 336.808402][T20343] [ 336.808412][T20343] __dump_stack+0x1d/0x30 [ 336.808475][T20343] dump_stack_lvl+0xe8/0x140 [ 336.808530][T20343] dump_stack+0x15/0x1b [ 336.808553][T20343] should_fail_ex+0x265/0x280 [ 336.808572][T20343] should_fail+0xb/0x20 [ 336.808587][T20343] should_fail_usercopy+0x1a/0x20 [ 336.808611][T20343] _copy_to_user+0x20/0xa0 [ 336.808650][T20343] simple_read_from_buffer+0xb5/0x130 [ 336.808674][T20343] proc_fail_nth_read+0x10e/0x150 [ 336.808755][T20343] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 336.808783][T20343] vfs_read+0x1a8/0x770 [ 336.808805][T20343] ? __rcu_read_unlock+0x4f/0x70 [ 336.808840][T20343] ? __fget_files+0x184/0x1c0 [ 336.808871][T20343] ksys_read+0xda/0x1a0 [ 336.808901][T20343] __x64_sys_read+0x40/0x50 [ 336.808929][T20343] x64_sys_call+0x27c0/0x3000 [ 336.809017][T20343] do_syscall_64+0xd2/0x200 [ 336.809038][T20343] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 336.809063][T20343] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 336.809096][T20343] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 336.809155][T20343] RIP: 0033:0x7f23d5eae0dc [ 336.809197][T20343] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 336.809216][T20343] RSP: 002b:00007f23d4917030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 336.809235][T20343] RAX: ffffffffffffffda RBX: 00007f23d6105fa0 RCX: 00007f23d5eae0dc [ 336.809255][T20343] RDX: 000000000000000f RSI: 00007f23d49170a0 RDI: 0000000000000004 [ 336.809285][T20343] RBP: 00007f23d4917090 R08: 0000000000000000 R09: 0000000000000000 [ 336.809299][T20343] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 336.809314][T20343] R13: 00007f23d6106038 R14: 00007f23d6105fa0 R15: 00007ffc8c0030b8 [ 336.809335][T20343] [ 337.121360][T20349] ref_ctr_offset mismatch. inode: 0x39c offset: 0x7 ref_ctr_offset(old): 0x2 ref_ctr_offset(new): 0x0 [ 337.344445][T20364] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 337.661165][T20372] hub 6-0:1.0: USB hub found [ 337.746207][T20372] hub 6-0:1.0: 8 ports detected [ 337.770319][T20368] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 338.022388][T20376] program syz.0.6054 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 338.085094][T20377] program syz.0.6054 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 338.294860][T20381] bridge0: entered promiscuous mode [ 338.340802][ T29] kauditd_printk_skb: 409 callbacks suppressed [ 338.340817][ T29] audit: type=1326 audit(6294967316.346:27177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20382 comm="syz.0.6056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f23d5eaf6c9 code=0x7ffc0000 [ 338.370915][ T29] audit: type=1326 audit(6294967316.346:27178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20382 comm="syz.0.6056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f23d5eaf6c9 code=0x7ffc0000 [ 338.394543][ T29] audit: type=1326 audit(6294967316.346:27179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20382 comm="syz.0.6056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f23d5eaf6c9 code=0x7ffc0000 [ 338.418261][ T29] audit: type=1326 audit(6294967316.346:27180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20382 comm="syz.0.6056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f23d5eaf6c9 code=0x7ffc0000 [ 338.442249][ T29] audit: type=1326 audit(6294967316.346:27181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20382 comm="syz.0.6056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f23d5eaf6c9 code=0x7ffc0000 [ 338.465845][ T29] audit: type=1326 audit(6294967316.346:27182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20382 comm="syz.0.6056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=461 compat=0 ip=0x7f23d5eaf6c9 code=0x7ffc0000 [ 338.489581][ T29] audit: type=1326 audit(6294967316.346:27183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20382 comm="syz.0.6056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f23d5eaf6c9 code=0x7ffc0000 [ 338.513206][ T29] audit: type=1326 audit(6294967316.346:27184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20382 comm="syz.0.6056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f23d5eaf6c9 code=0x7ffc0000 [ 338.536689][ T29] audit: type=1326 audit(6294967316.346:27185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20382 comm="syz.0.6056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f23d5eaf6c9 code=0x7ffc0000 [ 338.560328][ T29] audit: type=1326 audit(6294967316.346:27186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20382 comm="syz.0.6056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f23d5eaf6c9 code=0x7ffc0000 [ 338.618274][T20381] macsec1: entered promiscuous mode [ 338.628530][T20381] bridge0: port 3(macsec1) entered blocking state [ 338.635038][T20381] bridge0: port 3(macsec1) entered disabled state [ 338.697489][T20389] IPv6: NLM_F_CREATE should be specified when creating new route [ 338.705602][T20381] macsec1: entered allmulticast mode [ 338.710907][T20381] bridge0: entered allmulticast mode [ 338.789929][T20381] macsec1: left allmulticast mode [ 338.795166][T20381] bridge0: left allmulticast mode [ 338.866213][T20381] bridge0: left promiscuous mode [ 338.875183][T20393] __nla_validate_parse: 4 callbacks suppressed [ 338.875197][T20393] netlink: 8 bytes leftover after parsing attributes in process `syz.5.6060'. [ 338.934021][T20396] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 339.031397][T20399] netlink: 16 bytes leftover after parsing attributes in process `syz.0.6062'. [ 339.438156][T20409] FAULT_INJECTION: forcing a failure. [ 339.438156][T20409] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 339.451269][T20409] CPU: 1 UID: 0 PID: 20409 Comm: syz.0.6067 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 339.451301][T20409] Tainted: [W]=WARN [ 339.451307][T20409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 339.451343][T20409] Call Trace: [ 339.451404][T20409] [ 339.451413][T20409] __dump_stack+0x1d/0x30 [ 339.451435][T20409] dump_stack_lvl+0xe8/0x140 [ 339.451472][T20409] dump_stack+0x15/0x1b [ 339.451490][T20409] should_fail_ex+0x265/0x280 [ 339.451578][T20409] should_fail+0xb/0x20 [ 339.451596][T20409] should_fail_usercopy+0x1a/0x20 [ 339.451615][T20409] copy_fpstate_to_sigframe+0x628/0x7d0 [ 339.451653][T20409] ? copy_fpstate_to_sigframe+0xe6/0x7d0 [ 339.451767][T20409] ? x86_task_fpu+0x36/0x60 [ 339.451824][T20409] get_sigframe+0x34d/0x490 [ 339.451855][T20409] ? get_signal+0xdc7/0xf70 [ 339.451877][T20409] x64_setup_rt_frame+0xa8/0x580 [ 339.451901][T20409] arch_do_signal_or_restart+0x23e/0x440 [ 339.451930][T20409] exit_to_user_mode_loop+0x77/0x110 [ 339.451974][T20409] do_syscall_64+0x1d6/0x200 [ 339.451998][T20409] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 339.452030][T20409] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 339.452105][T20409] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 339.452129][T20409] RIP: 0033:0x7f23d5eaf6c7 [ 339.452144][T20409] Code: ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 <0f> 05 48 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 [ 339.452241][T20409] RSP: 002b:00007f23d4917038 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 339.452258][T20409] RAX: 0000000000000013 RBX: 00007f23d6105fa0 RCX: 00007f23d5eaf6c9 [ 339.452270][T20409] RDX: 0000000000000001 RSI: 0000200000000300 RDI: 0000000000000003 [ 339.452363][T20409] RBP: 00007f23d4917090 R08: 0000000000000000 R09: 0000000000000000 [ 339.452374][T20409] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 339.452388][T20409] R13: 00007f23d6106038 R14: 00007f23d6105fa0 R15: 00007ffc8c0030b8 [ 339.452409][T20409] [ 339.878854][T20415] netlink: 188 bytes leftover after parsing attributes in process `syz.0.6068'. [ 339.919583][T20415] netlink: 36 bytes leftover after parsing attributes in process `syz.0.6068'. [ 340.069103][T20419] ref_ctr_offset mismatch. inode: 0xcb offset: 0x7 ref_ctr_offset(old): 0x2 ref_ctr_offset(new): 0x0 [ 340.131804][T20423] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 340.299513][T20428] netlink: 8 bytes leftover after parsing attributes in process `syz.0.6075'. [ 340.460086][T20433] infiniband syz!: set active [ 340.464814][T20433] infiniband syz!: added team_slave_0 [ 340.465626][T20435] 9pnet_fd: Insufficient options for proto=fd [ 340.477428][T20433] RDS/IB: syz!: added [ 340.477443][T20433] smc: adding ib device syz! with port count 1 [ 340.477457][T20433] smc: ib device syz! port 1 has no pnetid [ 340.528493][T20441] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6078'. [ 340.546295][T20441] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 340.554814][T20441] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 340.564135][T20438] ref_ctr_offset mismatch. inode: 0x3d6 offset: 0x7 ref_ctr_offset(old): 0x2 ref_ctr_offset(new): 0x0 [ 340.659512][T20441] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 340.667890][T20441] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 340.724337][T20446] netlink: 16 bytes leftover after parsing attributes in process `syz.5.6081'. [ 340.872206][T20448] SELinux: failed to load policy [ 340.908963][T20454] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 340.948103][T20456] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6086'. [ 340.979104][T20462] ref_ctr_offset mismatch. inode: 0x771 offset: 0x7 ref_ctr_offset(old): 0x2 ref_ctr_offset(new): 0x0 [ 341.124801][T20474] 9pnet_fd: Insufficient options for proto=fd [ 341.143499][T20474] netlink: 4 bytes leftover after parsing attributes in process `syz.6.6094'. [ 341.187557][T20478] SELinux: failed to load policy [ 341.541876][T20495] vhci_hcd: default hub control req: 800f v0000 i0000 l31125 [ 341.756704][T20507] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6104'. [ 341.917051][T20510] ref_ctr_offset mismatch. inode: 0x3ec offset: 0x7 ref_ctr_offset(old): 0x2 ref_ctr_offset(new): 0x0 [ 342.096202][T20522] syzkaller1: entered promiscuous mode [ 342.101701][T20522] syzkaller1: entered allmulticast mode [ 342.749965][T20533] FAULT_INJECTION: forcing a failure. [ 342.749965][T20533] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 342.763179][T20533] CPU: 1 UID: 0 PID: 20533 Comm: syz.1.6114 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 342.763237][T20533] Tainted: [W]=WARN [ 342.763245][T20533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 342.763259][T20533] Call Trace: [ 342.763274][T20533] [ 342.763353][T20533] __dump_stack+0x1d/0x30 [ 342.763376][T20533] dump_stack_lvl+0xe8/0x140 [ 342.763396][T20533] dump_stack+0x15/0x1b [ 342.763416][T20533] should_fail_ex+0x265/0x280 [ 342.763505][T20533] should_fail+0xb/0x20 [ 342.763521][T20533] should_fail_usercopy+0x1a/0x20 [ 342.763545][T20533] _copy_from_user+0x1c/0xb0 [ 342.763574][T20533] do_sock_getsockopt+0xf1/0x240 [ 342.763675][T20533] __x64_sys_getsockopt+0x11e/0x1a0 [ 342.763881][T20533] x64_sys_call+0x2bca/0x3000 [ 342.763932][T20533] do_syscall_64+0xd2/0x200 [ 342.763955][T20533] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 342.764059][T20533] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 342.764132][T20533] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 342.764151][T20533] RIP: 0033:0x7f2c9b24f6c9 [ 342.764167][T20533] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 342.764188][T20533] RSP: 002b:00007f2c99caf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 342.764209][T20533] RAX: ffffffffffffffda RBX: 00007f2c9b4a5fa0 RCX: 00007f2c9b24f6c9 [ 342.764293][T20533] RDX: 000000000000001a RSI: 0000000000000084 RDI: 0000000000000003 [ 342.764307][T20533] RBP: 00007f2c99caf090 R08: 0000200000000400 R09: 0000000000000000 [ 342.764322][T20533] R10: 0000200000000240 R11: 0000000000000246 R12: 0000000000000001 [ 342.764337][T20533] R13: 00007f2c9b4a6038 R14: 00007f2c9b4a5fa0 R15: 00007ffd5b4b4e68 [ 342.764407][T20533] [ 342.981446][T20537] FAULT_INJECTION: forcing a failure. [ 342.981446][T20537] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 342.994529][T20537] CPU: 1 UID: 0 PID: 20537 Comm: syz.0.6116 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 342.994561][T20537] Tainted: [W]=WARN [ 342.994568][T20537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 342.994580][T20537] Call Trace: [ 342.994587][T20537] [ 342.994659][T20537] __dump_stack+0x1d/0x30 [ 342.994681][T20537] dump_stack_lvl+0xe8/0x140 [ 342.994769][T20537] dump_stack+0x15/0x1b [ 342.994786][T20537] should_fail_ex+0x265/0x280 [ 342.994881][T20537] should_fail+0xb/0x20 [ 342.995018][T20537] should_fail_usercopy+0x1a/0x20 [ 342.995038][T20537] _copy_to_iter+0x251/0xe70 [ 342.995067][T20537] ? seq_list_next+0x32/0x50 [ 342.995092][T20537] seq_read_iter+0x776/0x950 [ 342.995146][T20537] seq_read+0x270/0x2b0 [ 342.995168][T20537] ? __pfx_seq_read+0x10/0x10 [ 342.995184][T20537] proc_reg_read+0x128/0x1c0 [ 342.995203][T20537] ? __pfx_proc_reg_read+0x10/0x10 [ 342.995224][T20537] vfs_readv+0x3fb/0x690 [ 342.995302][T20537] __x64_sys_preadv+0xfd/0x1c0 [ 342.995332][T20537] x64_sys_call+0x282e/0x3000 [ 342.995355][T20537] do_syscall_64+0xd2/0x200 [ 342.995379][T20537] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 342.995578][T20537] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 342.995616][T20537] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 342.995658][T20537] RIP: 0033:0x7f23d5eaf6c9 [ 342.995672][T20537] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 342.995690][T20537] RSP: 002b:00007f23d4917038 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 342.995709][T20537] RAX: ffffffffffffffda RBX: 00007f23d6105fa0 RCX: 00007f23d5eaf6c9 [ 342.995723][T20537] RDX: 0000000000000001 RSI: 00002000000015c0 RDI: 0000000000000003 [ 342.995746][T20537] RBP: 00007f23d4917090 R08: 000000000000d215 R09: 0000000000000000 [ 342.995823][T20537] R10: 00000000000000f0 R11: 0000000000000246 R12: 0000000000000001 [ 342.995835][T20537] R13: 00007f23d6106038 R14: 00007f23d6105fa0 R15: 00007ffc8c0030b8 [ 342.995854][T20537] [ 343.280345][T20542] ref_ctr_offset mismatch. inode: 0x401 offset: 0x7 ref_ctr_offset(old): 0x2 ref_ctr_offset(new): 0x0 [ 343.398563][ T29] kauditd_printk_skb: 404 callbacks suppressed [ 343.398579][ T29] audit: type=1326 audit(6294967321.669:27591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20553 comm="syz.3.6124" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc78e2cf6c9 code=0x7ffc0000 [ 343.465862][T20559] ref_ctr_offset mismatch. inode: 0x78c offset: 0x7 ref_ctr_offset(old): 0x2 ref_ctr_offset(new): 0x0 [ 343.488968][T20560] SELinux: policydb version 531 does not match my version range 15-35 [ 343.500681][ T29] audit: type=1326 audit(6294967321.669:27592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20553 comm="syz.3.6124" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc78e2cf6c9 code=0x7ffc0000 [ 343.524508][ T29] audit: type=1400 audit(6294967321.679:27593): avc: denied { create } for pid=20552 comm="syz.6.6123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 343.544290][ T29] audit: type=1400 audit(6294967321.679:27594): avc: denied { bind } for pid=20552 comm="syz.6.6123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 343.561959][T20560] SELinux: failed to load policy [ 343.564924][ T29] audit: type=1400 audit(6294967321.679:27595): avc: denied { listen } for pid=20552 comm="syz.6.6123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 343.589408][ T29] audit: type=1326 audit(6294967321.700:27596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20553 comm="syz.3.6124" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc78e2cf6c9 code=0x7ffc0000 [ 343.614075][ T29] audit: type=1326 audit(6294967321.700:27597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20553 comm="syz.3.6124" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc78e2cf6c9 code=0x7ffc0000 [ 343.637790][ T29] audit: type=1326 audit(6294967321.700:27598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20553 comm="syz.3.6124" exe="/root/syz-executor" sig=0 arch=c000003e syscall=461 compat=0 ip=0x7fc78e2cf6c9 code=0x7ffc0000 [ 343.662385][ T29] audit: type=1326 audit(6294967321.700:27599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20553 comm="syz.3.6124" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc78e2cf6c9 code=0x7ffc0000 [ 343.686979][ T29] audit: type=1326 audit(6294967321.700:27600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20553 comm="syz.3.6124" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fc78e2cf6c9 code=0x7ffc0000 [ 343.787791][T20569] __nla_validate_parse: 5 callbacks suppressed [ 343.787854][T20569] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6130'. [ 343.790560][T20573] netlink: 28 bytes leftover after parsing attributes in process `syz.6.6132'. [ 343.813979][T20573] netlink: 28 bytes leftover after parsing attributes in process `syz.6.6132'. [ 343.824299][T20569] netlink: 32 bytes leftover after parsing attributes in process `syz.3.6130'. [ 343.825485][T20573] netlink: 28 bytes leftover after parsing attributes in process `syz.6.6132'. [ 343.842361][T20573] netlink: 28 bytes leftover after parsing attributes in process `syz.6.6132'. [ 343.852946][T20571] hub 6-0:1.0: USB hub found [ 343.871211][T20571] hub 6-0:1.0: 8 ports detected [ 343.921033][T20577] netlink: 28 bytes leftover after parsing attributes in process `syz.6.6133'. [ 343.922546][T20579] netlink: 16 bytes leftover after parsing attributes in process `syz.1.6135'. [ 343.930105][T20577] netlink: 28 bytes leftover after parsing attributes in process `syz.6.6133'. [ 343.974774][T20582] netlink: 8 bytes leftover after parsing attributes in process `syz.6.6136'. [ 344.037093][T20589] ref_ctr_offset mismatch. inode: 0x7ab offset: 0x7 ref_ctr_offset(old): 0x2 ref_ctr_offset(new): 0x0 [ 344.074272][T20593] ref_ctr_offset mismatch. inode: 0x12e offset: 0x7 ref_ctr_offset(old): 0x2 ref_ctr_offset(new): 0x0 [ 344.122762][T20599] ref_ctr_offset mismatch. inode: 0x7b1 offset: 0x7 ref_ctr_offset(old): 0x2 ref_ctr_offset(new): 0x0 [ 344.194068][T20605] IPVS: Error connecting to the multicast addr [ 344.206196][T20607] FAULT_INJECTION: forcing a failure. [ 344.206196][T20607] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 344.220234][T20607] CPU: 0 UID: 0 PID: 20607 Comm: syz.5.6145 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 344.220266][T20607] Tainted: [W]=WARN [ 344.220274][T20607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 344.220296][T20607] Call Trace: [ 344.220321][T20607] [ 344.220329][T20607] __dump_stack+0x1d/0x30 [ 344.220350][T20607] dump_stack_lvl+0xe8/0x140 [ 344.220369][T20607] dump_stack+0x15/0x1b [ 344.220435][T20607] should_fail_ex+0x265/0x280 [ 344.220454][T20607] should_fail+0xb/0x20 [ 344.220468][T20607] should_fail_usercopy+0x1a/0x20 [ 344.220536][T20607] _copy_from_iter+0xd2/0xe80 [ 344.220557][T20607] ? __build_skb_around+0x1ab/0x200 [ 344.220586][T20607] ? __alloc_skb+0x223/0x320 [ 344.220622][T20607] netlink_sendmsg+0x471/0x6b0 [ 344.220674][T20607] ? __pfx_netlink_sendmsg+0x10/0x10 [ 344.220694][T20607] __sock_sendmsg+0x145/0x180 [ 344.220722][T20607] ____sys_sendmsg+0x31e/0x4e0 [ 344.220803][T20607] ___sys_sendmsg+0x17b/0x1d0 [ 344.220835][T20607] __x64_sys_sendmsg+0xd4/0x160 [ 344.220912][T20607] x64_sys_call+0x191e/0x3000 [ 344.220987][T20607] do_syscall_64+0xd2/0x200 [ 344.221007][T20607] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 344.221040][T20607] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 344.221139][T20607] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 344.221159][T20607] RIP: 0033:0x7f2349daf6c9 [ 344.221175][T20607] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 344.221195][T20607] RSP: 002b:00007f2348817038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 344.221214][T20607] RAX: ffffffffffffffda RBX: 00007f234a005fa0 RCX: 00007f2349daf6c9 [ 344.221228][T20607] RDX: 0000000000008844 RSI: 0000200000000080 RDI: 0000000000000003 [ 344.221276][T20607] RBP: 00007f2348817090 R08: 0000000000000000 R09: 0000000000000000 [ 344.221297][T20607] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 344.221309][T20607] R13: 00007f234a006038 R14: 00007f234a005fa0 R15: 00007ffdd25994f8 [ 344.221329][T20607] [ 344.340413][T20612] SELinux: Context system_u:object_r:mqueue_spool_t:s0 is not valid (left unmapped). [ 344.627632][T20626] ref_ctr_offset mismatch. inode: 0x7d5 offset: 0x7 ref_ctr_offset(old): 0x2 ref_ctr_offset(new): 0x0 [ 345.041541][T20652] hub 6-0:1.0: USB hub found [ 345.049901][T20652] hub 6-0:1.0: 8 ports detected [ 345.244446][T20669] netlink: 'syz.0.6172': attribute type 3 has an invalid length. [ 345.484152][T20681] IPVS: Error connecting to the multicast addr [ 345.664108][T20685] 9pnet_fd: Insufficient options for proto=fd [ 345.861354][T20713] 9pnet_fd: Insufficient options for proto=fd [ 345.895113][T20713] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 346.080976][ T8649] hid-generic 0000:3000000:0000.0006: unknown main item tag 0x4 [ 346.088728][ T8649] hid-generic 0000:3000000:0000.0006: unknown main item tag 0x2 [ 346.097998][ T8649] hid-generic 0000:3000000:0000.0006: unknown main item tag 0x3 [ 346.202766][ T8649] hid-generic 0000:3000000:0000.0006: hidraw0: HID v0.00 Device [sy] on syz0 [ 346.265534][T20737] 9pnet_fd: Insufficient options for proto=fd [ 346.351585][T20746] rdma_op ffff888127fd0980 conn xmit_rdma 0000000000000000 [ 346.895364][T20770] 9pnet_fd: Insufficient options for proto=fd [ 347.599599][T20767] 9pnet_fd: Insufficient options for proto=fd [ 347.886287][T20788] tmpfs: Bad value for 'size' [ 348.010150][T20793] SELinux: policydb magic number 0x75622f2e does not match expected magic number 0xf97cff8c [ 348.074576][T20793] SELinux: failed to load policy [ 348.155767][T20808] 9pnet_fd: Insufficient options for proto=fd [ 348.164602][ T29] kauditd_printk_skb: 843 callbacks suppressed [ 348.164617][ T29] audit: type=1326 audit(6294967326.676:28444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20807 comm="syz.1.6224" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c9b24f6c9 code=0x7ffc0000 [ 348.195747][ T29] audit: type=1326 audit(6294967326.676:28445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20807 comm="syz.1.6224" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f2c9b24f6c9 code=0x7ffc0000 [ 348.202938][T20811] hub 6-0:1.0: USB hub found [ 348.220681][ T29] audit: type=1326 audit(6294967326.676:28446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20807 comm="syz.1.6224" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c9b24f6c9 code=0x7ffc0000 [ 348.248559][ T29] audit: type=1326 audit(6294967326.676:28447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20807 comm="syz.1.6224" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f2c9b24f6c9 code=0x7ffc0000 [ 348.272077][ T29] audit: type=1326 audit(6294967326.676:28448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20807 comm="syz.1.6224" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c9b24f6c9 code=0x7ffc0000 [ 348.290922][T20811] hub 6-0:1.0: 8 ports detected [ 348.296747][ T29] audit: type=1326 audit(6294967326.676:28449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20807 comm="syz.1.6224" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c9b24f6c9 code=0x7ffc0000 [ 348.324971][ T29] audit: type=1326 audit(6294967326.676:28450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20807 comm="syz.1.6224" exe="/root/syz-executor" sig=0 arch=c000003e syscall=305 compat=0 ip=0x7f2c9b24f6c9 code=0x7ffc0000 [ 348.349600][ T29] audit: type=1326 audit(6294967326.676:28451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20807 comm="syz.1.6224" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c9b24f6c9 code=0x7ffc0000 [ 348.374102][ T29] audit: type=1326 audit(6294967326.676:28452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20807 comm="syz.1.6224" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2c9b24f6c9 code=0x7ffc0000 [ 348.603948][ T29] audit: type=1326 audit(6294967326.676:28453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20807 comm="syz.1.6224" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c9b24f6c9 code=0x7ffc0000 [ 348.660541][T20826] __nla_validate_parse: 16 callbacks suppressed [ 348.660558][T20826] netlink: 8 bytes leftover after parsing attributes in process `syz.5.6230'. [ 349.133442][T20853] netlink: 8 bytes leftover after parsing attributes in process `syz.6.6238'. [ 349.339992][T20861] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 349.445863][T20867] netlink: 8 bytes leftover after parsing attributes in process `syz.3.6246'. [ 349.487719][T20861] vhci_hcd: invalid port number 96 [ 349.492877][T20861] vhci_hcd: default hub control req: 0000 vfffc i0060 l0 [ 349.673724][T20877] FAULT_INJECTION: forcing a failure. [ 349.673724][T20877] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 349.687924][T20877] CPU: 0 UID: 0 PID: 20877 Comm: syz.5.6245 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 349.688008][T20877] Tainted: [W]=WARN [ 349.688015][T20877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 349.688046][T20877] Call Trace: [ 349.688103][T20877] [ 349.688111][T20877] __dump_stack+0x1d/0x30 [ 349.688197][T20877] dump_stack_lvl+0xe8/0x140 [ 349.688216][T20877] dump_stack+0x15/0x1b [ 349.688232][T20877] should_fail_ex+0x265/0x280 [ 349.688253][T20877] should_fail+0xb/0x20 [ 349.688300][T20877] should_fail_usercopy+0x1a/0x20 [ 349.688323][T20877] _copy_from_user+0x1c/0xb0 [ 349.688410][T20877] __sys_sendto+0x19e/0x330 [ 349.688453][T20877] __x64_sys_sendto+0x76/0x90 [ 349.688483][T20877] x64_sys_call+0x2d14/0x3000 [ 349.688577][T20877] do_syscall_64+0xd2/0x200 [ 349.688596][T20877] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 349.688627][T20877] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 349.688669][T20877] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 349.688753][T20877] RIP: 0033:0x7f2349daf6c9 [ 349.688770][T20877] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 349.688855][T20877] RSP: 002b:00007f2348817038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 349.688873][T20877] RAX: ffffffffffffffda RBX: 00007f234a005fa0 RCX: 00007f2349daf6c9 [ 349.688885][T20877] RDX: 000000000000ffe0 RSI: 0000200000000000 RDI: 0000000000000004 [ 349.688897][T20877] RBP: 00007f2348817090 R08: 0000200000000100 R09: 000000000000001c [ 349.688908][T20877] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 349.688920][T20877] R13: 00007f234a006038 R14: 00007f234a005fa0 R15: 00007ffdd25994f8 [ 349.688974][T20877] [ 349.918914][T20884] netlink: 8 bytes leftover after parsing attributes in process `syz.5.6251'. [ 350.136576][T20901] netlink: 24 bytes leftover after parsing attributes in process `syz.5.6259'. [ 350.158557][T20901] IPVS: Error connecting to the multicast addr [ 350.416220][T20920] netlink: 8 bytes leftover after parsing attributes in process `syz.6.6267'. [ 350.598938][T20930] IPv6: NLM_F_CREATE should be specified when creating new route [ 350.683659][T20934] ref_ctr_offset mismatch. inode: 0x183 offset: 0x7 ref_ctr_offset(old): 0x2 ref_ctr_offset(new): 0x0 [ 350.724831][T20943] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6275'. [ 350.741878][T20935] 9pnet_fd: Insufficient options for proto=fd [ 350.750229][T20935] netlink: 4 bytes leftover after parsing attributes in process `syz.6.6272'. [ 350.882639][T20956] ref_ctr_offset mismatch. inode: 0x1ee offset: 0x7 ref_ctr_offset(old): 0x2 ref_ctr_offset(new): 0x0 [ 350.900193][T20955] hub 6-0:1.0: USB hub found [ 350.905051][T20955] hub 6-0:1.0: 8 ports detected [ 351.086059][T20964] netlink: 12 bytes leftover after parsing attributes in process `syz.1.6280'. [ 351.095217][T20964] netlink: 'syz.1.6280': attribute type 1 has an invalid length. [ 351.102970][T20964] netlink: 24 bytes leftover after parsing attributes in process `syz.1.6280'. [ 351.744406][T21005] 9pnet_fd: Insufficient options for proto=fd [ 351.778015][T21005] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 352.534206][T21037] vcan0: tx drop: invalid sa for name 0x0000000000000001 [ 352.562313][T21040] tipc: Started in network mode [ 352.568285][T21040] tipc: Node identity 4e4e3fea0c7c, cluster identity 4711 [ 352.576505][T21040] tipc: Enabled bearer , priority 0 [ 352.658279][T15220] syz-executor invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 352.670234][T15220] CPU: 0 UID: 0 PID: 15220 Comm: syz-executor Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 352.670271][T15220] Tainted: [W]=WARN [ 352.670278][T15220] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 352.670292][T15220] Call Trace: [ 352.670376][T15220] [ 352.670384][T15220] __dump_stack+0x1d/0x30 [ 352.670406][T15220] dump_stack_lvl+0xe8/0x140 [ 352.670429][T15220] dump_stack+0x15/0x1b [ 352.670448][T15220] dump_header+0x81/0x220 [ 352.670535][T15220] oom_kill_process+0x342/0x400 [ 352.670571][T15220] out_of_memory+0x979/0xb80 [ 352.670680][T15220] try_charge_memcg+0x610/0xa10 [ 352.670734][T15220] charge_memcg+0x51/0xc0 [ 352.670761][T15220] mem_cgroup_swapin_charge_folio+0xcc/0x150 [ 352.670845][T15220] __read_swap_cache_async+0x17b/0x2d0 [ 352.670890][T15220] swap_cluster_readahead+0x362/0x3c0 [ 352.670938][T15220] swapin_readahead+0xde/0x6f0 [ 352.670961][T15220] ? mod_memcg_lruvec_state+0x1fc/0x2c0 [ 352.670995][T15220] ? css_rstat_updated+0xb7/0x240 [ 352.671016][T15220] ? __rcu_read_unlock+0x4f/0x70 [ 352.671114][T15220] ? __rcu_read_unlock+0x4f/0x70 [ 352.671140][T15220] ? swap_cache_get_folio+0x277/0x280 [ 352.671173][T15220] do_swap_page+0x2ae/0x2370 [ 352.671195][T15220] ? _raw_spin_unlock+0x26/0x50 [ 352.671221][T15220] ? finish_task_switch+0xad/0x2b0 [ 352.671245][T15220] ? __pfx_default_wake_function+0x10/0x10 [ 352.671312][T15220] handle_mm_fault+0x9a5/0x2be0 [ 352.671340][T15220] ? vma_start_read+0x141/0x1f0 [ 352.671388][T15220] do_user_addr_fault+0x630/0x1080 [ 352.671412][T15220] ? fpregs_restore_userregs+0xe2/0x1d0 [ 352.671510][T15220] ? switch_fpu_return+0xe/0x20 [ 352.671542][T15220] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 352.671626][T15220] exc_page_fault+0x62/0xa0 [ 352.671660][T15220] asm_exc_page_fault+0x26/0x30 [ 352.671682][T15220] RIP: 0033:0x7f0b43b91f45 [ 352.671699][T15220] Code: 00 00 00 00 00 83 ff 03 74 7b 83 ff 02 b8 fa ff ff ff 49 89 ca 0f 44 f8 80 3d 1e 66 1f 00 00 74 14 b8 e6 00 00 00 0f 05 f7 d8 66 2e 0f 1f 84 00 00 00 00 00 48 83 ec 28 48 89 54 24 10 89 74 [ 352.671719][T15220] RSP: 002b:00007ffea1e8f348 EFLAGS: 00010246 [ 352.671747][T15220] RAX: 0000000000000000 RBX: 00000000000003f5 RCX: 00007f0b43b91f43 [ 352.671762][T15220] RDX: 00007ffea1e8f360 RSI: 0000000000000000 RDI: 0000000000000000 [ 352.671776][T15220] RBP: 00007ffea1e8f3cc R08: 00000000061466ab R09: 0000000000000000 [ 352.671790][T15220] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000001388 [ 352.671804][T15220] R13: 00000000000927c0 R14: 00000000000597a3 R15: 00007ffea1e8f420 [ 352.671826][T15220] [ 352.671833][T15220] memory: usage 307200kB, limit 307200kB, failcnt 2856 [ 352.708493][T21048] SELinux: failed to load policy [ 352.711262][T15220] memory+swap: usage 308208kB, limit 9007199254740988kB, failcnt 0 [ 352.967456][T15220] kmem: usage 74740kB, limit 9007199254740988kB, failcnt 0 [ 352.975753][T15220] Memory cgroup stats for /syz6: [ 352.977920][T15220] cache 0 [ 352.986818][T15220] rss 0 [ 352.989611][T15220] shmem 0 [ 352.993453][T15220] mapped_file 0 [ 352.996995][T15220] dirty 0 [ 352.999921][T15220] writeback 0 [ 353.003415][T15220] workingset_refault_anon 1472 [ 353.008159][T15220] workingset_refault_file 72 [ 353.012778][T15220] swap 1032192 [ 353.016216][T15220] swapcached 0 [ 353.019589][T15220] pgpgin 360575 [ 353.023083][T15220] pgpgout 360561 [ 353.026618][T15220] pgfault 357488 [ 353.030195][T15220] pgmajfault 293 [ 353.034695][T15220] inactive_anon 0 [ 353.038318][T15220] active_anon 0 [ 353.042770][T15220] inactive_file 0 [ 353.046396][T15220] active_file 57344 [ 353.051275][T15220] unevictable 0 [ 353.054742][T15220] hierarchical_memory_limit 314572800 [ 353.060169][T15220] hierarchical_memsw_limit 9223372036854771712 [ 353.066314][T15220] total_cache 0 [ 353.070782][T15220] total_rss 0 [ 353.074115][T15220] total_shmem 0 [ 353.077555][T15220] total_mapped_file 0 [ 353.082373][T15220] total_dirty 0 [ 353.085816][T15220] total_writeback 0 [ 353.090245][T15220] total_workingset_refault_anon 1472 [ 353.095550][T15220] total_workingset_refault_file 72 [ 353.101318][T15220] total_swap 1032192 [ 353.105201][T15220] total_swapcached 0 [ 353.109747][T15220] total_pgpgin 360575 [ 353.113826][T15220] total_pgpgout 360561 [ 353.118612][T15220] total_pgfault 357488 [ 353.122696][T15220] total_pgmajfault 293 [ 353.127359][T15220] total_inactive_anon 0 [ 353.131491][T15220] total_active_anon 0 [ 353.136186][T15220] total_inactive_file 0 [ 353.140327][T15220] total_active_file 57344 [ 353.145273][T15220] total_unevictable 0 [ 353.149237][T15220] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz6,task_memcg=/syz6,task=syz.6.6298,pid=21011,uid=0 [ 353.152206][T21036] tipc: Disabling bearer [ 353.163940][T15220] Memory cgroup out of memory: Killed process 21011 (syz.6.6298) total-vm:93956kB, anon-rss:1236kB, file-rss:22312kB, shmem-rss:0kB, UID:0 pgtables:128kB oom_score_adj:1000 [ 353.238264][ T29] kauditd_printk_skb: 1352 callbacks suppressed [ 353.238278][ T29] audit: type=1400 audit(6294967331.999:29806): avc: denied { read } for pid=21063 comm="syz.6.6319" name="msr" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 353.267948][ T29] audit: type=1400 audit(6294967331.999:29807): avc: denied { open } for pid=21063 comm="syz.6.6319" path="/dev/cpu/0/msr" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 353.386616][ T29] audit: type=1326 audit(6294967332.156:29808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21075 comm="syz.3.6318" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc78e2cf6c9 code=0x7ffc0000 [ 353.437172][ T29] audit: type=1326 audit(6294967332.188:29809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21075 comm="syz.3.6318" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fc78e2cf6c9 code=0x7ffc0000 [ 353.460962][ T29] audit: type=1326 audit(6294967332.188:29810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21072 comm="syz.0.6322" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f23d5eaf6c9 code=0x7ffc0000 [ 353.484683][ T29] audit: type=1326 audit(6294967332.188:29811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21072 comm="syz.0.6322" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f23d5eaf6c9 code=0x7ffc0000 [ 353.509353][ T29] audit: type=1326 audit(6294967332.188:29812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21072 comm="syz.0.6322" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f23d5eaf6c9 code=0x7ffc0000 [ 353.533148][ T29] audit: type=1326 audit(6294967332.188:29813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21072 comm="syz.0.6322" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f23d5eaf6c9 code=0x7ffc0000 [ 353.557805][ T29] audit: type=1326 audit(6294967332.188:29814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21072 comm="syz.0.6322" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f23d5eaf6c9 code=0x7ffc0000 [ 353.582718][ T29] audit: type=1326 audit(6294967332.188:29815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21072 comm="syz.0.6322" exe="/root/syz-executor" sig=0 arch=c000003e syscall=461 compat=0 ip=0x7f23d5eaf6c9 code=0x7ffc0000 [ 353.615132][T21096] hub 6-0:1.0: USB hub found [ 353.619919][T21096] hub 6-0:1.0: 8 ports detected [ 353.713488][T21102] __nla_validate_parse: 8 callbacks suppressed [ 353.713503][T21102] netlink: 8 bytes leftover after parsing attributes in process `syz.0.6333'. [ 353.816100][T21116] netlink: 'syz.3.6340': attribute type 10 has an invalid length. [ 353.829358][T21116] team0: Port device dummy0 added [ 353.837660][T21114] 9pnet_fd: Insufficient options for proto=fd [ 353.847048][T21114] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6339'. [ 353.871409][T21121] IPv6: NLM_F_CREATE should be specified when creating new route [ 353.985282][T21136] sctp: [Deprecated]: syz.3.6348 (pid 21136) Use of int in maxseg socket option. [ 353.985282][T21136] Use struct sctp_assoc_value instead [ 354.024267][T21142] netlink: 464 bytes leftover after parsing attributes in process `syz.0.6350'. [ 354.126371][T21146] 9pnet_fd: Insufficient options for proto=fd [ 354.134463][T21146] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6352'. [ 354.295288][T21170] netlink: 8 bytes leftover after parsing attributes in process `syz.6.6362'. [ 354.690426][T21183] 9pnet_fd: Insufficient options for proto=fd [ 355.017622][T21188] netlink: 'syz.3.6367': attribute type 32 has an invalid length. [ 355.529654][T21201] netlink: 24 bytes leftover after parsing attributes in process `syz.0.6370'. [ 355.642691][T21201] IPVS: Error connecting to the multicast addr [ 355.812659][T21221] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6381'. [ 355.974490][T21231] netlink: 24 bytes leftover after parsing attributes in process `syz.1.6385'. [ 355.986969][T21231] IPVS: Error connecting to the multicast addr [ 356.350264][T21242] SELinux: failed to load policy [ 356.436802][T21250] 9pnet_fd: Insufficient options for proto=fd [ 356.444343][T21260] netlink: 24 bytes leftover after parsing attributes in process `syz.3.6397'. [ 356.466850][T21250] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6393'. [ 356.477486][T21260] IPVS: Error connecting to the multicast addr [ 356.550789][T21269] program syz.5.6401 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 356.623329][T21273] SELinux: failed to load policy [ 356.746947][T21288] netlink: 'syz.6.6406': attribute type 10 has an invalid length. [ 356.767276][T21288] siw: device registration error -23 [ 356.961436][T21296] SELinux: failed to load policy [ 357.152805][T21302] 9pnet_fd: Insufficient options for proto=fd [ 357.236206][T21311] SELinux: failed to load policy [ 357.389726][T21320] hub 6-0:1.0: USB hub found [ 357.413171][T21320] hub 6-0:1.0: 8 ports detected [ 357.572934][T21335] 9pnet_fd: Insufficient options for proto=fd [ 357.586132][T21333] SELinux: failed to load policy [ 357.596636][T21335] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 357.600506][T21338] SELinux: policydb magic number 0x6572666b does not match expected magic number 0xf97cff8c [ 357.604059][T21335] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 357.624156][T21335] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 357.631596][T21335] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 357.632479][T21338] SELinux: failed to load policy [ 357.881219][T21358] hub 6-0:1.0: USB hub found [ 357.893047][T21358] hub 6-0:1.0: 8 ports detected [ 358.015504][T21367] netlink: 'syz.1.6438': attribute type 10 has an invalid length. [ 358.048319][T21367] ipvlan0: entered allmulticast mode [ 358.053816][T21367] veth0_vlan: entered allmulticast mode [ 358.087228][T21367] team0: Device ipvlan0 failed to register rx_handler [ 358.096610][T21370] siw: device registration error -23 [ 358.222511][T21372] SELinux: failed to load policy [ 358.461319][ T29] kauditd_printk_skb: 920 callbacks suppressed [ 358.461333][ T29] audit: type=1326 audit(6294967337.489:30736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21385 comm="syz.3.6445" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc78e2cf6c9 code=0x7ffc0000 [ 358.471361][T21387] SELinux: failed to load policy [ 358.491264][ T29] audit: type=1326 audit(6294967337.489:30737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21385 comm="syz.3.6445" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc78e2cf6c9 code=0x7ffc0000 [ 358.497996][ T29] audit: type=1326 audit(6294967337.521:30738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21385 comm="syz.3.6445" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fc78e2cdf10 code=0x7ffc0000 [ 358.544366][ T29] audit: type=1326 audit(6294967337.521:30739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21385 comm="syz.3.6445" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fc78e2cdf10 code=0x7ffc0000 [ 358.567997][ T29] audit: type=1326 audit(6294967337.521:30740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21385 comm="syz.3.6445" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc78e2cf6c9 code=0x7ffc0000 [ 358.591577][ T29] audit: type=1326 audit(6294967337.521:30741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21385 comm="syz.3.6445" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc78e2cf6c9 code=0x7ffc0000 [ 358.621758][T21393] __nla_validate_parse: 6 callbacks suppressed [ 358.621772][T21393] netlink: 24 bytes leftover after parsing attributes in process `syz.5.6447'. [ 358.638203][T21384] SELinux: policydb magic number 0x61637876 does not match expected magic number 0xf97cff8c [ 358.638493][T21384] SELinux: failed to load policy [ 358.639686][ T29] audit: type=1326 audit(6294967337.668:30742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21385 comm="syz.3.6445" exe="/root/syz-executor" sig=0 arch=c000003e syscall=78 compat=0 ip=0x7fc78e2cf6c9 code=0x7ffc0000 [ 358.650520][T21393] IPVS: Error connecting to the multicast addr [ 358.654270][ T29] audit: type=1326 audit(6294967337.668:30743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21385 comm="syz.3.6445" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc78e2cf6c9 code=0x7ffc0000 [ 358.707708][ T29] audit: type=1326 audit(6294967337.668:30744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21385 comm="syz.3.6445" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc78e2cf6c9 code=0x7ffc0000 [ 358.739387][ T29] audit: type=1326 audit(6294967337.710:30745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21389 comm="syz.1.6446" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2c9b24f6c9 code=0x7ffc0000 [ 358.780467][T21386] 9pnet_fd: Insufficient options for proto=fd [ 358.812474][T21386] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6445'. [ 358.815316][T21405] netlink: 8 bytes leftover after parsing attributes in process `syz.6.6450'. [ 358.838309][T21407] netlink: 'syz.5.6449': attribute type 10 has an invalid length. [ 358.862958][T21407] ipvlan0: entered allmulticast mode [ 358.868305][T21407] veth0_vlan: entered allmulticast mode [ 358.885899][T21414] netlink: 464 bytes leftover after parsing attributes in process `syz.0.6453'. [ 358.888219][T21407] team0: Device ipvlan0 failed to register rx_handler [ 358.905176][T21415] siw: device registration error -23 [ 358.993756][T21424] program syz.6.6458 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 359.260669][T21451] netlink: 464 bytes leftover after parsing attributes in process `syz.3.6470'. [ 359.312517][T21457] SELinux: policydb magic number 0x6572666b does not match expected magic number 0xf97cff8c [ 359.350010][T21457] SELinux: failed to load policy [ 359.454407][T21470] netlink: 8 bytes leftover after parsing attributes in process `syz.6.6477'. [ 359.471271][T21469] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6469'. [ 359.564730][T21472] netlink: 3 bytes leftover after parsing attributes in process `syz.3.6478'. [ 359.603138][T21472] 0ªX¹¦À: renamed from caif0 [ 359.617740][T21472] 0ªX¹¦À: entered allmulticast mode [ 359.623079][T21472] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 359.685192][T21480] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6481'. [ 359.993280][T21442] ================================================================== [ 360.001389][T21442] BUG: KCSAN: data-race in mem_cgroup_flush_stats_ratelimited / tick_do_update_jiffies64 [ 360.011224][T21442] [ 360.013545][T21442] read-write to 0xffffffff868099c0 of 8 bytes by interrupt on cpu 1: [ 360.016448][T19609] syz-executor invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 360.021595][T21442] tick_do_update_jiffies64+0x113/0x1c0 [ 360.032621][T19609] CPU: 1 UID: 0 PID: 19609 Comm: syz-executor Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 360.032655][T19609] Tainted: [W]=WARN [ 360.032662][T19609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 360.032675][T19609] Call Trace: [ 360.032683][T19609] [ 360.032693][T19609] __dump_stack+0x1d/0x30 [ 360.032715][T19609] dump_stack_lvl+0xe8/0x140 [ 360.032770][T19609] dump_stack+0x15/0x1b [ 360.032789][T19609] dump_header+0x81/0x220 [ 360.032809][T19609] oom_kill_process+0x342/0x400 [ 360.032898][T19609] out_of_memory+0x979/0xb80 [ 360.033000][T19609] try_charge_memcg+0x610/0xa10 [ 360.033035][T19609] charge_memcg+0x51/0xc0 [ 360.033059][T19609] mem_cgroup_swapin_charge_folio+0xcc/0x150 [ 360.033088][T19609] __read_swap_cache_async+0x17b/0x2d0 [ 360.033191][T19609] swap_cluster_readahead+0x362/0x3c0 [ 360.033220][T19609] swapin_readahead+0xde/0x6f0 [ 360.033241][T19609] ? mod_memcg_lruvec_state+0x1fc/0x2c0 [ 360.033306][T19609] ? css_rstat_updated+0xb7/0x240 [ 360.033391][T19609] ? __rcu_read_unlock+0x4f/0x70 [ 360.033418][T19609] ? __rcu_read_unlock+0x4f/0x70 [ 360.033494][T19609] ? swap_cache_get_folio+0x277/0x280 [ 360.033516][T19609] do_swap_page+0x2ae/0x2370 [ 360.033541][T19609] ? _raw_spin_unlock+0x26/0x50 [ 360.033568][T19609] ? finish_task_switch+0xad/0x2b0 [ 360.033595][T19609] ? __pfx_default_wake_function+0x10/0x10 [ 360.033729][T19609] handle_mm_fault+0x9a5/0x2be0 [ 360.033757][T19609] ? vma_start_read+0x141/0x1f0 [ 360.033851][T19609] do_user_addr_fault+0x630/0x1080 [ 360.033889][T19609] ? fpregs_restore_userregs+0xe2/0x1d0 [ 360.033929][T19609] ? switch_fpu_return+0xe/0x20 [ 360.033992][T19609] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 360.034021][T19609] exc_page_fault+0x62/0xa0 [ 360.034058][T19609] asm_exc_page_fault+0x26/0x30 [ 360.034079][T19609] RIP: 0033:0x7f2349de1f45 [ 360.034123][T19609] Code: 00 00 00 00 00 83 ff 03 74 7b 83 ff 02 b8 fa ff ff ff 49 89 ca 0f 44 f8 80 3d 1e 66 1f 00 00 74 14 b8 e6 00 00 00 0f 05 f7 d8 66 2e 0f 1f 84 00 00 00 00 00 48 83 ec 28 48 89 54 24 10 89 74 [ 360.034141][T19609] RSP: 002b:00007ffdd2599838 EFLAGS: 00010246 [ 360.034158][T19609] RAX: 0000000000000000 RBX: 000000000000013a RCX: 00007f2349de1f43 [ 360.034172][T19609] RDX: 00007ffdd2599850 RSI: 0000000000000000 RDI: 0000000000000000 [ 360.034185][T19609] RBP: 00007ffdd25998bc R08: 000000003425c502 R09: 0000000000000000 [ 360.034198][T19609] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000001388 [ 360.034212][T19609] R13: 00000000000927c0 R14: 000000000005b530 R15: 00007ffdd2599910 [ 360.034281][T19609] [ 360.034288][T19609] memory: usage 307200kB, limit 307200kB, failcnt 23879 [ 360.037951][T21442] tick_nohz_handler+0x7f/0x2d0 [ 360.049495][T19609] memory+swap: usage 307824kB, limit 9007199254740988kB, failcnt 0 [ 360.053246][T21442] __hrtimer_run_queues+0x20f/0x5a0 [ 360.053276][T21442] hrtimer_interrupt+0x21a/0x460 [ 360.063333][T19609] kmem: usage 307124kB, limit 9007199254740988kB, failcnt 0 [ 360.066576][T21442] __sysvec_apic_timer_interrupt+0x5f/0x1d0 [ 360.069492][T19609] Memory cgroup stats for /syz5 [ 360.073792][T21442] sysvec_apic_timer_interrupt+0x6f/0x80 [ 360.078444][T19609] : [ 360.082498][T21442] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 360.082525][T21442] kcsan_setup_watchpoint+0x415/0x430 [ 360.166508][T19609] cache 0 [ 360.166911][T21442] strnchr+0x1e/0x40 [ 360.172704][T19609] rss 0 [ 360.177517][T21442] bpf_bprintf_prepare+0xc4/0xd20 [ 360.177538][T21442] bpf_trace_printk+0x84/0x1c0 [ 360.182364][T19609] shmem 0 [ 360.182373][T19609] mapped_file 0 [ 360.187447][T21442] bpf_prog_b1367f0be6c54012+0x39/0x3f [ 360.187467][T21442] bpf_trace_run2+0x107/0x1c0 [ 360.187497][T21442] __traceiter_kfree+0x2e/0x50 [ 360.193008][T19609] dirty 0 [ 360.193016][T19609] writeback 0 [ 360.197844][T21442] kfree+0x351/0x400 [ 360.197872][T21442] shrink_lruvec+0x2a5/0x1b50 [ 360.203944][T19609] workingset_refault_anon 507 [ 360.208398][T21442] shrink_node+0x686/0x2120 [ 360.213263][T19609] workingset_refault_file 4988 [ 360.217617][T21442] do_try_to_free_pages+0x3f6/0xcd0 [ 360.217640][T21442] try_to_free_mem_cgroup_pages+0x1ab/0x410 [ 360.237315][T19609] swap 638976 [ 360.243295][T21442] try_charge_memcg+0x383/0xa10 [ 360.243322][T21442] charge_memcg+0x51/0xc0 [ 360.243342][T21442] mem_cgroup_swapin_charge_folio+0xcc/0x150 [ 360.243366][T21442] __read_swap_cache_async+0x17b/0x2d0 [ 360.251364][T19609] swapcached 0 [ 360.259279][T21442] swap_cluster_readahead+0x362/0x3c0 [ 360.267256][T19609] pgpgin 498828 [ 360.275176][T21442] swapin_readahead+0xde/0x6f0 [ 360.275199][T21442] do_swap_page+0x2ae/0x2370 [ 360.283173][T19609] pgpgout 498809 [ 360.286157][T21442] handle_mm_fault+0x9a5/0x2be0 [ 360.293085][T19609] pgfault 468085 [ 360.297883][T21442] do_user_addr_fault+0x630/0x1080 [ 360.297906][T21442] exc_page_fault+0x62/0xa0 [ 360.297935][T21442] asm_exc_page_fault+0x26/0x30 [ 360.297953][T21442] [ 360.297959][T21442] read to 0xffffffff868099c0 of 8 bytes by task 21442 on cpu 0: [ 360.305889][T19609] pgmajfault 160 [ 360.310989][T21442] mem_cgroup_flush_stats_ratelimited+0x29/0x70 [ 360.315926][T19609] inactive_anon 0 [ 360.323175][T21442] count_shadow_nodes+0x6a/0x230 [ 360.323199][T21442] do_shrink_slab+0x63/0x680 [ 360.329080][T19609] active_anon 0 [ 360.333886][T21442] shrink_slab+0x448/0x760 [ 360.339506][T19609] inactive_file 77824 [ 360.341883][T21442] shrink_node+0x6c3/0x2120 [ 360.341910][T21442] do_try_to_free_pages+0x3f6/0xcd0 [ 360.347890][T19609] active_file 0 [ 360.353211][T21442] try_to_free_mem_cgroup_pages+0x1ab/0x410 [ 360.356150][T19609] unevictable 0 [ 360.359994][T21442] try_charge_memcg+0x383/0xa10 [ 360.362741][T19609] hierarchical_memory_limit 314572800 [ 360.367737][T21442] obj_cgroup_charge_pages+0xa6/0x150 [ 360.367759][T21442] __memcg_kmem_charge_page+0x9f/0x170 [ 360.372495][T19609] hierarchical_memsw_limit 9223372036854771712 [ 360.375407][T21442] __alloc_frozen_pages_noprof+0x188/0x360 [ 360.375427][T21442] alloc_pages_mpol+0xb3/0x260 [ 360.375446][T21442] alloc_pages_noprof+0x90/0x130 [ 360.375463][T21442] __vmalloc_node_range_noprof+0x7a5/0xed0 [ 360.375494][T21442] bpf_map_area_alloc+0xfa/0x150 [ 360.375516][T21442] array_map_alloc+0x1d3/0x3c0 [ 360.375546][T21442] map_create+0x840/0xda0 [ 360.375566][T21442] __sys_bpf+0x54e/0x7c0 [ 360.375582][T21442] __x64_sys_bpf+0x41/0x50 [ 360.375614][T21442] x64_sys_call+0x2aee/0x3000 [ 360.375637][T21442] do_syscall_64+0xd2/0x200 [ 360.375658][T21442] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 360.379088][T19609] total_cache 0 [ 360.379098][T19609] total_rss 0 [ 360.384521][T21442] [ 360.384528][T21442] value changed: 0x0000000100001d17 -> 0x0000000100001d18 [ 360.384540][T21442] [ 360.384544][T21442] Reported by Kernel Concurrency Sanitizer on: [ 360.384558][T21442] CPU: 0 UID: 0 PID: 21442 Comm: syz.5.6465 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 360.384586][T21442] Tainted: [W]=WARN [ 360.384593][T21442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 360.384604][T21442] ================================================================== [ 360.718112][T19609] total_shmem 0 [ 360.721564][T19609] total_mapped_file 0 [ 360.725550][T19609] total_dirty 0 [ 360.729040][T19609] total_writeback 0 [ 360.732881][T19609] total_workingset_refault_anon 507 [ 360.738106][T19609] total_workingset_refault_file 4988 [ 360.743419][T19609] total_swap 638976 [ 360.747237][T19609] total_swapcached 0 [ 360.751111][T19609] total_pgpgin 498828 [ 360.755083][T19609] total_pgpgout 498809 [ 360.759153][T19609] total_pgfault 468085 [ 360.763287][T19609] total_pgmajfault 160 [ 360.767452][T19609] total_inactive_anon 0 [ 360.771635][T19609] total_active_anon 0 [ 360.775632][T19609] total_inactive_file 77824 [ 360.780185][T19609] total_active_file 0 [ 360.784184][T19609] total_unevictable 0 [ 360.788155][T19609] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz5,task_memcg=/syz5,task=syz.5.6465,pid=21440,uid=0 [ 360.802900][T19609] Memory cgroup out of memory: Killed process 21440 (syz.5.6465) total-vm:93956kB, anon-rss:1140kB, file-rss:22188kB, shmem-rss:0kB, UID:0 pgtables:132kB oom_score_adj:1000 [ 367.080659][ C0] EXT4-fs (loop4): error count since last fsck: 5 [ 367.087094][ C0] EXT4-fs (loop4): last error at time 1762483053: ext4_lookup:1791: inode 2