last executing test programs: 10m37.380984962s ago: executing program 1 (id=338): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0xa2f01, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) timer_create(0x1, &(0x7f0000000200)={0x0, 0x23, 0x2, @thr={&(0x7f0000000180)="c1c0ab2d2f0df2b0d9b05c3e02301619e040a5a2b3b5deb9b6f4e7f54361792b68c80f", &(0x7f0000000300)="1f0d2e95db79226fcfa0117c5e0c663f8477bbc077cf274eb418d740a9ef581fa4009f48273fd9df3199c141da17285ba99186d59b7f3a9f865362e791830feee252a1e8aa2a3ec56f2b0ebb090537e401e7601fadfd98fc"}}, &(0x7f0000000380)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r3, 0x10e, 0xc, &(0x7f0000000040)=0x7f, 0x4) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="240000004a00030000200000fdffffff0a008000", @ANYRES32=0x0, @ANYBLOB="00000000080001"], 0x24}, 0x1, 0x0, 0x0, 0x20044090}, 0x20004000) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getegid() bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRESDEC, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kmem_cache_free\x00', r6}, 0x18) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x5, 0x7, 0x7ffc0001}]}) set_tid_address(&(0x7f0000000440)) llistxattr(0x0, 0x0, 0x0) fchownat(r2, &(0x7f0000000000)='./file0\x00', r4, r5, 0x800) write$tun(r0, &(0x7f00000002c0)={@val={0x0, 0x6005}, @void, @eth={@multicast, @remote, @val={@void}, {@ipv4={0x800, @generic={{0x5, 0x4, 0x1, 0x26, 0x29, 0x68, 0x0, 0x9, 0x4, 0x0, @private=0xa010101, @multicast1}, "a93a88c19c640ec98e51b5683ee58e25bfcdb2ba7d"}}}}}, 0x3f) 10m37.251589154s ago: executing program 1 (id=343): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000380)={0x1d, r1, 0x1, {0x0, 0x0, 0x3}, 0xff}, 0x18) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x30000000) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)={0x4c, 0x13, 0x100, 0x70bd2b, 0x25dfdbfc, {0xa, 0xb, 0x1, 0x0, {0x4e21, 0x4e21, [0xc, 0x10001, 0x5, 0x3], [0xfffffff5, 0x3, 0x1, 0x6], 0x0, [0x40, 0x6000000]}, 0x9, 0x100000}}, 0x4c}, 0x1, 0x0, 0x0, 0x400c491}, 0x0) 10m37.146035403s ago: executing program 1 (id=346): socketpair$unix(0x1, 0x2, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000001c0)=ANY=[@ANYBLOB="540000001000030400000000cc3ce2a61771", @ANYRES32=0x0, @ANYBLOB="00030000000000002c0012800b00010062726964676500001c00028008000500010000000500250001000000050029000000000008000a00", @ANYRES32=r1], 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x8044) openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x40042, 0x1) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRDELBR(r2, 0x89a2, &(0x7f0000000200)='bridge0\x00') 10m37.019089564s ago: executing program 1 (id=350): socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0x8080, &(0x7f0000000500)={[{@norecovery}, {@grpquota}, {@sysvgroups}, {@lazytime}]}, 0xee, 0x49b, &(0x7f0000000a40)="$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") r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000e00)='./file0\x00', 0x1900) renameat2(r1, &(0x7f0000000140)='./file0\x00', r1, &(0x7f0000000040)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x4) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000080)={[{@usrquota}, {@noblock_validity}, {@bh}, {@max_batch_time={'max_batch_time', 0x3d, 0x8c9}}, {@debug}, {@inlinecrypt}]}, 0x6, 0x5fc, &(0x7f0000000c00)="$eJzs3c9rHGUfAPDvzCZ5kzavaUXEFsWAhxakaVKLVS+29WAPBQv2IOKhoUlq6PYHTQq2FkzBg4KCiFeRXvwHvEvv3kRQb56FKlJRUOnK7M62m2Q3XdPsTpr5fGCzz/PM7D7PdydP5pmZPDsBlNZ49iON2BVx51QSMdaybDQaC8fz9W7/du109kiiVnv91ySSvKy5fpI/b88zwxHx7dGIRyur6124cvXsdLXW8F7E/sVzF/cvXLm6b/7c9JnZM7Pnpw68cPDQ5ItTB6c2JM7t+fOx4689+fH7bz8/9111XxKH4+TguzOxIo6NMh7jcScPsbV8ICIOZYk2n8vDZguEUGqV/PdxMCIej7Go1HMNYzH/UaGNA3qqVomoASWV6P9QUs1xQPPYvrvj4JM9HpX0z60jjQOg1fEPNM6NxHD92Gjb7aTlyKhxbmPHBtSf1fHPtd2fZ49Ydh7iz7tbZ2AD6ulk6XpEPNEu/qTeth31SLP402XtSCJiMiKG8va98gBtSFrSvTgPs5b1xp9GxOH8OSs/us76x1fk+x0/AOV080i+I1/Kcvf2f9nYozn+iTbjn9E2+671KHr/13n819zfD9fPkacrxmHZmOVE+7ccXFnw04fHPu1Uf+v4L3tk9TfHgv1w63rE7hXxf5AFm49/sviTNts/W+XU4e7qePX7X451WlZ0/LUbEXvaHv/cG5VmqTWuT+6fm6/OTjZ+tq3j62/e+rJT/UXHn23/bR3ib9n+6crXZZ/JxS7r+OrEjXOdlo3eN/7056Gkcbw5lJe8M724eGkqYig5nq/SUn5g7bY012m+Rxb/3mfa9/9lv//Xl7/PSPNPZhcuvnH2dqdl69n+LReT79S6bEMnWfwz99/+q/p/VvZJl3X88eblpzotWyv+kQcJDAAAAAAAAEoorV+DTdKJu+k0nZhozJd9LLal1QsLi8/OXbh8fiZib/3/IQfT5pXusUY+yfJT+f/DNvMHVuSfi4idEfFZZaSenzh9oTpTdPAAAAAAAAAAAAAAAAAAAACwSWzP5/8371P9e6Ux/x8oiV7eYA7Y3PR/KK96/191iyegDOz/obz0fygv/R/KS/+H8tL/obz0fygv/R/KS/8HAAAAgC1p59M3f0wiYumlkfojM5QvMyMItrbBohsAFKZSdAOAwty99G+wD6XT1fj/r/zLAXvfHKAASbvC+uCgtnbnv9n2lQAAAAAAAAAAAABAD+zZ1Xn+v7nBsLWZ9gfl9QDz/311ADzkfPU/lJdjfOB+s/iHOy0w/x8AAAAAAAAAAAAA+ma0/kjSiXwu8Gik6cRExP8jYkcMJnPz1dnJiHgkIn6oDP4vy08V3WgAAAAAAAAAAAAAAAAAAADYYhauXD07Xa3OXmpN/L2qZGsnmndB7UNdL8d/fFUk/f9YRiKi8I3Ss8RAS0kSsZRt+U3RsEsLsTmaUU8U/IcJAAAAAAAAAAAAAAAAAABKqGXucXu7v+hziwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACg/+7d/793iaJjBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeTv8GAAD//7V5QCw=") seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000bc0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r2 = getpid() r3 = syz_pidfd_open(r2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="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"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x50) r4 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5, 0xf8546, 0x9, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={0x0, 0x8}, 0x292, 0xa7, 0x2, 0x5, 0x6, 0x9b9a, 0x8, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_clone(0x100000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x80842111, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x4) sync() r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./bus\x00', 0x289c2, 0x1) fcntl$setlease(r5, 0x400, 0x1) fremovexattr(r5, &(0x7f0000000040)=@known='system.posix_acl_default\x00') ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000280)={'ip_vti0\x00', &(0x7f0000000600)={'sit0\x00', 0x0, 0x700, 0x80, 0x4, 0x401, {{0x30, 0x4, 0x0, 0x36, 0xc0, 0x66, 0x0, 0x1, 0x2f, 0x0, @multicast1, @remote, {[@timestamp_prespec={0x44, 0x24, 0xf9, 0x3, 0xf, [{@multicast2, 0x2}, {@private=0xa010101, 0xffffffff}, {@rand_addr=0x64010100, 0x8}, {@dev={0xac, 0x14, 0x14, 0x2a}, 0x101}]}, @ra={0x94, 0x4}, @lsrr={0x83, 0x7, 0x6f, [@local]}, @noop, @cipso={0x86, 0x45, 0x1, [{0x5, 0x10, "12293cef291fbf12dbd7aaf2b785"}, {0x2, 0x5, "0ac07c"}, {0x6, 0x11, "88dbc256f848471f3aad8d8bb5c462"}, {0x2, 0x12, "b3363ee0a9dce20d6db2f0bfb94b6dce"}, {0x5, 0x7, "95be1bb6f8"}]}, @timestamp_prespec={0x44, 0x34, 0x98, 0x3, 0x2, [{@dev={0xac, 0x14, 0x14, 0x25}, 0x2}, {@local, 0x8}, {@empty, 0x4}, {@broadcast, 0x5}, {@private=0xa010102, 0x77}, {@loopback, 0x54a}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r5, 0x89f0, &(0x7f00000007c0)={'gre0\x00', &(0x7f0000000700)={'gretap0\x00', r6, 0x10, 0x7, 0x80000000, 0x80000001, {{0x12, 0x4, 0x2, 0x33, 0x48, 0x66, 0x0, 0x3, 0x4, 0x0, @broadcast, @multicast1, {[@timestamp_prespec={0x44, 0x1c, 0xb9, 0x3, 0x1, [{@multicast2, 0x5}, {@rand_addr=0x64010102, 0x9}, {@local, 0xdc54}]}, @ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xf, 0x32, [@empty, @multicast2, @multicast2]}, @ra={0x94, 0x4}, @noop]}}}}}) r7 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000080)='./cgroup\x00', &(0x7f0000000f80), 0xc00, &(0x7f0000000140)={[{@mpol={'mpol', 0x3d, {'local', '=static', @void}}}]}) sendmsg$IPSET_CMD_DEL(r7, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000004c0)={0x10c, 0xa, 0x6, 0x801, 0x0, 0x0, {0x3, 0x0, 0x3}, [@IPSET_ATTR_DATA={0x38, 0x7, 0x0, 0x1, [@IPSET_ATTR_ETHER={0xa, 0x11, @multicast}, @IPSET_ATTR_IP2={0x18, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}, @IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x3}, @IPSET_ATTR_SKBQUEUE={0x6, 0x1d, 0x1, 0x0, 0x3}]}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x18, 0x7, 0x0, 0x1, [@IPSET_ATTR_CIDR={0x5, 0x3, 0x6}, @IPSET_ATTR_PACKETS={0xc, 0x19, 0x1, 0x0, 0x3}]}, @IPSET_ATTR_DATA={0x24, 0x7, 0x0, 0x1, [@IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz0\x00'}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e22}, @IPSET_ATTR_COMMENT={0xc, 0x1a, 'usrquota'}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0xfffffff8}, @IPSET_ATTR_ADT={0x6c, 0x8, 0x0, 0x1, [{0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e22}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0xc41d}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_ETHER={0xa, 0x11, @remote}}, {0x1c, 0x7, 0x0, 0x1, @IPSET_ATTR_IP_TO={0x18, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @loopback}}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_MARKMASK={0x8, 0xb, 0x1, 0x0, 0xfffffff7}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_SKBPRIO={0x8, 0x1c, 0x1, 0x0, 0x1}}, {0xc, 0x7, 0x0, 0x1, @IPSET_ATTR_TIMEOUT={0x8}}]}, @IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x93}]}, 0x10c}}, 0x0) r8 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000001980), 0x200) fcntl$setstatus(r8, 0x4, 0x2800) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r8, 0x5452, &(0x7f0000000a00)={0x0, 0x0, {0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) bpf$PROG_LOAD(0x5, 0x0, 0x0) inotify_init() setns(r3, 0x24020000) 10m36.353446203s ago: executing program 1 (id=352): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYRES8], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000006020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b70300000000ecff85000000040000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x8042, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r3, 0x0, 0x100000000}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) epoll_pwait2(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x1) link(&(0x7f0000000200)='./file1\x00', &(0x7f0000000300)='./file0\x00') r4 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x4, 0x0, @mcast1={0xff, 0x7}, 0x8a4}}, {{0xa, 0x4e20, 0x100, @remote}}}, 0x108) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f0000000100)=ANY=[@ANYBLOB="2c00000010008100000000000080000000000000", @ANYRES32=0x0, @ANYBLOB="0a043cbf", @ANYRES32], 0x2c}], 0x1}, 0x0) socket$netlink(0x10, 0x3, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) ioprio_set$uid(0x3, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000140)='./file2\x00', 0x404, &(0x7f0000000080)={[{@nogrpid}, {@noinit_itable}, {@jqfmt_vfsold}, {@debug}, {@nodiscard}, {@quota}]}, 0x1, 0x43d, &(0x7f0000000700)="$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") r6 = open(&(0x7f0000000240)='./file1\x00', 0x105342, 0x20) setns(r1, 0x10000000) sendfile(r6, r6, 0x0, 0x800000009) 10m36.103371495s ago: executing program 1 (id=357): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="01030003000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x4) sendmsg$nl_route(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1c}, 0x1, 0x0, 0x0, 0x20088814}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x7400, &(0x7f00000001c0)={&(0x7f0000000200)=@delchain={0x24, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x24}}, 0x0) 10m36.069649908s ago: executing program 32 (id=357): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r2, @ANYBLOB="01030003000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x4) sendmsg$nl_route(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1c}, 0x1, 0x0, 0x0, 0x20088814}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000280)={0x0, 0x7400, &(0x7f00000001c0)={&(0x7f0000000200)=@delchain={0x24, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r5}}, 0x24}}, 0x0) 9m43.406895284s ago: executing program 4 (id=945): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x8}, 0x80b0, 0x4d, 0x800020, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) setsockopt(r0, 0x8, 0xfffff000, &(0x7f0000000140)="170cd6aba0b1a105a200c1309b60020acbab1465b9e10882f17dc1e20e9da173637927e360a2ef476fc1f2d391ebca7eb3af63cd488650c9eaf44dc77e5c4e547b3474db9a98303539f9cff197a4736bcf055ef32000f2da085b5e6f9956801b032395e6cf09c75d7bd4248ae316ae98a43f2ec78e0a03dd54ba8c6281a84f93514ea8e2816d4d4c2fe46f6af264cdbdff043c805f4096ad8ca754d30606e19742a8", 0xa2) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000008000000004"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000000000000000008000000018120000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x41002, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$xdp(0xffffffffffffffff, &(0x7f0000000100)={0x2c, 0x2}, 0x10) getsockopt(r2, 0x1, 0x0, &(0x7f0000000740)=""/4096, &(0x7f0000000240)=0x1000) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$NFT_BATCH(r3, &(0x7f0000000200)={0x0, 0x35, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001000040000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a30000000002c0003800800014000000000080002400000000018000380140001007465616d3000000000000000000000005c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c00038014"], 0xfc}}, 0x0) 9m42.830777254s ago: executing program 4 (id=946): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000ebff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000580)={0x0, 0x20}}, 0x10) 9m42.481643246s ago: executing program 4 (id=948): socket$packet(0x11, 0xa, 0x300) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x1fffffe, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/11], 0x0, 0x8000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r0, 0x0, 0x80000}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = syz_clone(0x80, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp(r1, r1, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000280)='./file0\x00', 0x8000, &(0x7f00000004c0)=ANY=[@ANYBLOB="6e6f6e756d7461696c2c6e66732c73686f72746e616d653d6c6f7765722c757466383d312c64656275672c696f636861727365743d757466382c73686f72746e616d653d6d697865642c757466383d312c004845160000000000"], 0x1, 0x2be, &(0x7f00000014c0)="$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") r2 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'ipvlan0\x00', 0x0}) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000fedbdf25080000001800028014000380100001800400030008000100050000000c00018008000100", @ANYRES32=r3], 0x38}, 0x1, 0x0, 0x0, 0x4000814}, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x5, '\x00', r3, 0xffffffffffffffff, 0x4, 0x5, 0x5}, 0x50) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x800c4, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) write(r5, &(0x7f0000004200)='t', 0x1) sendfile(r5, r4, 0x0, 0x3ffff) sendfile(r5, r4, 0x0, 0x7ffff000) socket$key(0xf, 0x3, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) fsmount(0xffffffffffffffff, 0x0, 0x0) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f00000002c0)='syzkaller\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x5, 0xb68, 0x560b0000, &(0x7f0000000000)="259a53f271a76d2688ca4c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 9m40.550507207s ago: executing program 4 (id=961): r0 = syz_open_dev$usbfs(&(0x7f0000000480), 0x77, 0x41341) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x1}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xc21f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000200)) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000200), 0x80080) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r3, 0xc058534f, &(0x7f00000002c0)={{0x6, 0x7}, 0x0, 0x7fff, 0xa, {0x0, 0xfa}, 0x5, 0xd0aa}) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/wakeup_count', 0x0, 0x10) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x45, &(0x7f0000000080), 0x67, 0x52e, &(0x7f0000000480)="$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") r5 = fspick(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r4, 0x40a85323, &(0x7f0000000c80)={{0x32, 0x8}, 'port1\x00', 0x10, 0x20434, 0x4, 0x6, 0x400, 0x8, 0x7, 0x0, 0x1, 0x6}) r6 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) write$binfmt_register(r6, &(0x7f0000000440)={0x3a, 'syz2', 0x3a, 'M', 0x3a, 0x0, 0x3a, 'usrjquota=', 0x3a, '', 0x3a, './file2', 0x3a, [0x46]}, 0x32) fsconfig$FSCONFIG_CMD_RECONFIGURE(r5, 0x7, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x4, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000002000080000000000000000061104f000000000095"], &(0x7f0000000100)='GPL\x00', 0x1, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, @fallback=0x8bc6bfab9230d34f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000c40)) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffea6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r8}, 0x10) r9 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r9, 0x0, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x44, 0x6, 0x4a0, 0x138, 0x0, 0x368, 0x1d0, 0x138, 0x408, 0x408, 0x408, 0x408, 0x408, 0x6, 0x0, {[{{@ip={@broadcast, @multicast1=0xe0007600, 0x11000000, 0x0, 'geneve1\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0x98}, @TTL={0x28, 'TTL\x00', 0x0, {0x0, 0x4}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0xff000000, 0x0, 'batadv_slave_1\x00', 'veth1_virt_wifi\x00', {0xff}, {0xff}, 0x11, 0x0, 0x28}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x10, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0xffffff00, 'vlan1\x00', 'nr0\x00', {}, {0xff}}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}, {{@ip={@broadcast, @multicast2, 0xff, 0xffffff00, 'ip6gre0\x00', 'virt_wifi0\x00', {0xff}, {}, 0x2e, 0x0, 0x1}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:dbusd_etc_t:s0\x00'}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00', {0xe6d959333babc205}, {0xff}}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x500) io_setup(0x3, &(0x7f0000000340)=0x0) io_pgetevents(r10, 0x9, 0x9, &(0x7f0000000fc0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x0, &(0x7f0000000c00)={&(0x7f0000000f80)={[0xc]}, 0x8}) r11 = syz_io_uring_setup(0x10c, &(0x7f00000003c0)={0x0, 0x10, 0x0, 0x3, 0x80}, &(0x7f0000000180)=0x0, &(0x7f0000000280)=0x0) io_uring_register$IORING_REGISTER_FILES(r11, 0x2, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r12, 0x4, &(0x7f0000000080)=0xfffffffd, 0x0, 0x4) syz_io_uring_submit(r12, r13, &(0x7f00000002c0)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x1, 0x0, @fd=r7, 0x8, 0x0, 0x6, 0x5}) syz_emit_ethernet(0x4a, &(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) epoll_pwait(r0, &(0x7f0000000080)=[{}, {}, {}, {}, {}], 0x5, 0x8001, &(0x7f00000000c0)={[0x8]}, 0x8) 9m38.780358613s ago: executing program 4 (id=976): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[], 0x48) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="160000000000000005000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000bc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00', r2}, 0x9) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000000)={0x0, 0x0, 0x8, 0x5, 0x200, &(0x7f0000003c40)="1ae19337aa151f36ae49bb3f8cb95c5bf840d4f1e55efaaf098d47a70eb36a73090000000000001b0f4743f490c585108c1331c774b399a25a705f5096cb268cbc6070d680e1be250700000000000000472471ff550c0010000007f3c7b61abe4162256004ea8ca5e5b5f379c6eb3257eda08f7e6959090000004d13184d382747e035b4722525e00ade86b4c6d1e157c75d15c1f961ebc0a64d7f2a73f8979fcecacaa64f9b9069ebcc1d5b471edbc4f6c7f1b98ae74e909aa6f25b7fa77bf9cd4ed36d5c53dc519d11c3cc1c22a3b86cf3c645413f4afbcea0c99ded703699d2bb6a4a663b99b6069da5aaf64785a5887c31261d4b9e57ee07000000def6f255ca26108f11f02047d47f2d0fec30f7e92482f71496e184214a4e0c5fdc48b0af0c0478940016d8f0990a0e1090fd515380aae83c5eaeed338701574b64200a16ef2811fadcf1e0f49a514df529061e09ce45e3da03a03fe9b4a6bcfa7d04594e4f6d0714a2e14ea127ab37d64a5e0db630cd4f4a2e6c985a542ff20a9b2193f265f93a258a88dd6c9d6a926dd23d32425849c5d9210007660a617f22133b6cb5087f4c6057942aa18193172bd995fa70a1f949b196f2e2a3c175858575713be5ee3f7f4dcecc98123f9ded3afdebe13d79a7f7fcb2469ae0ac503111401612df7ee995f74fb97a63bf62d61f78c062f959119ab50c1f706a930121ebcd53ccb93d158186ed360750ca8e728150d988844b9a5cff46591ccaff416e5a8c25f9555da5ca6fdf75b86ea6171b046b856168f403b5253a5cc393430a09a4489a0895571e597ac8846f945ffb372a88d3a25978b463dc961416c80c55773f917020751ed51cfd73c1e06fbadd156d56bedc117af95d242d6dccbe2ce34dccd6005e944afa92b22ec9a698469c6edc06caa2cfcd61912607d459b4c28ebea9745bcd4697d75c9601fd333d3cd797963a3c71b7cc5fdc756da8d97207936e5f53b53b732533c2722e03002293517966611602f297de6ff5408777b7a93c45cee3ee5c5601a4e94266b295ea7a86812a7ab8896ec5ea1b12643e1844b185734528399e62bceb8700cc6cd491e4a4430d0a3ba329a5a2fa170fd0b1cc294de988cd35df2cd7344aa8a9f3432b96fb889c02f484f635a0cc3466a3c2733d45f176931b2db18dba54991a9553cedb7f585786388d4042dbae1c95b769e3d4e036e8afea0a04c04f4c2b152ca1fd1f8efee60425c5a122fd1b90e98635284abd9f217d9e19cb2a64b354c9d79509cc47d7305114990148a7291cb0fe2d1c773a6664b66ae04aa62c534d072ae54c2ca0d5962cc58945d8924abfc4d5af922462507430d8f2c17479a6678b0b370c000000000000000000000000000000000000000000f800"}) recvmmsg(0xffffffffffffffff, &(0x7f0000007700), 0x4000267, 0xfc0, 0x0) 9m38.662580804s ago: executing program 4 (id=977): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000001700000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r1}, 0x18) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) r3 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) sendmsg$tipc(r3, &(0x7f0000000580)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 9m38.662315164s ago: executing program 33 (id=977): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000001700000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r1}, 0x18) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) r3 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) sendmsg$tipc(r3, &(0x7f0000000580)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 9m35.642568742s ago: executing program 0 (id=1017): r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f00000000c0), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vxcan1\x00'}) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/locks\x00', 0x0, 0x0) pread64(r1, &(0x7f00000024c0)=""/209, 0xd1, 0x8) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000200)={0xd6d}, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3, 0x0, 0xfffffffffffffffc}, 0x18) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file1\x00', 0x21081e, &(0x7f00000001c0)={[{@grpquota}, {@nogrpid}, {@quota}]}, 0x1, 0x4fa, &(0x7f00000005c0)="$eJzs3c9vG1kdAPCvnThx0uwmu+wBEOyW3YWCqjqJuxut9gDLCSFUCdEjSG1I3CiKHUexU5rQQ3rmikQlTnDkD+DcE3cuCG5cygGJHxGoQeLg1YwnqZvaTdQkdhR/PtJo3ps39fe9pvNe/U3iF8DQuhoRuxExFhF3I2I6u57LjvisfST3Pdt7uLS/93ApF63W7X/l0vbkWnT8mcSV7DWLEfGj70X8NPdy3Mb2ztpitVrZzOqzzdrGbGN758ZqbXGlslJZL5cX5hfmPrn5cfnMxvpebSwrffXpH3e/9fOkW1PZlc5xnKX20AuHcRKjEfGD8wg2ACPZeMYG3RFeSz4i3o6I99PnfzpG0q8mAHCZtVrT0ZrurAMAl10+zYHl8qUsFzAV+Xyp1M7hvROT+Wq90bx+r761vtzOlc1EIX9vtVqZy3KFM1HIJfX5tPy8Xj5SvxkRb0XEL8cn0nppqV5dHuR/fABgiF05sv7/d7y9/gMAl1xx0B0AAPrO+g8Aw8f6DwDDx/oPAMOnvf5PDLobAEAfef8PAMPH+g8AQ+WHt24lR2s/+/zr5fvbW2v1+zeWK421Um1rqbRU39wordTrK+ln9tSOe71qvb4x/1FsPZj59kajOdvY3rlTq2+tN++kn+t9p1JI79rtw8gAgF7eeu/JX3LJivzpRHpEx14OhYH2DDhv+UF3ABiYkUF3ABgYu33B8DrFe3zpAbgkumzR+4Jit18QarVarfPrEnDOrn1J/h+GVUf+308Bw5CR/4fhJf8Pw6vVyp10z/846Y0AwMUmxw/0+P7/29n5d9k3B36yfPSOx+fZKwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALjYDvb/LWV7gU9FPl8qRbwRETNRyN1brVbmIuLNiPjzeGE8qc8PuM8AwGnl/57L9v+6Nv3h1AtN7145LI5FxM9+fftXDxabzc0/RYzl/j1+cL35OLte7n/vAYDjHazT6bnjjfyzvYdLB0c/+/OP70ZEsR1/f28s9g/jj8Zoei5GISIm/5PL6m25jtzFaew+iogvdht/LqbSHEh759Oj8ZPYb/Q1fv6F+Pm0rX1O/i6+cAZ9gWHzJJl/Puv2/OXjanru/vwX0xnq9LL5L3mppf10Dnwe/2D+G+kx/109aYyP/vD9dmni5bZHEV8ejTiIvd8x/xzEz/WI/+EJ4//1K+++36ut9ZuIa9E9fmes2WZtY7axvXNjtba4UlmprJfLC/MLc5/c/Lg8m+aoZ3uvBv/89PqbvdqS8U/2iF88ZvxfP+H4f/v/uz/+2ivif/ODbvHz8c4r4idr4jdOGH9x8vfFXm1J/OUe4z/u63/9hPGf/m3npW3DAYDBaWzvrC1Wq5VNBYWLX0j+yV6AbnQtfKdfscaie9MvPmg/00eaWq3XitVrxjiLrBtwERw+9BHxv0F3BgAAAAAAAAAAAAAA6Kofv7E06DECAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABweX0eAAD//19xzyM=") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40010) 9m35.562225989s ago: executing program 0 (id=1020): r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='gre0\x00', 0x10) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x45, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$unix(0x1, 0x5, 0x0) sendmmsg$inet(r0, &(0x7f0000000a40)=[{{&(0x7f00000001c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001980)=[{&(0x7f0000000200)="a90500040000746400009e150451160200000064c6", 0x15}, {&(0x7f00000002c0)="174640b6d80fb2eedc81ba60ccbb9d", 0xfffffffffffffd36}], 0x2}}, {{&(0x7f00000004c0)={0x2, 0x4e24, @multicast1}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000780)="5825be57aff9352b356be67ca2746357d1787b35", 0x5c4}], 0x1}}], 0x2, 0x4004040) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYRES16, @ANYRES32, @ANYRESHEX], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001600), 0x109344, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x1018, 0xffffffffffffffff}, './file0\x00'}) ioctl$F2FS_IOC_DECOMPRESS_FILE(r3, 0xf517, 0x0) 9m35.514041623s ago: executing program 0 (id=1023): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x5453, 0x0) ioctl$TIOCMBIC(r0, 0x5415, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r1}, &(0x7f0000000200), &(0x7f0000000280)=r2}, 0x20) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kfree\x00', r2, 0x0, 0x100000000000000}, 0x18) r4 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) timer_settime(0x0, 0x1, &(0x7f00000002c0)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) r6 = syz_open_dev$usbfs(&(0x7f0000000000), 0x1ff, 0x402) r7 = dup(r6) ioctl$USBDEVFS_CONTROL(r7, 0xc0185500, &(0x7f0000000040)={0x23, 0x3, 0x9, 0x3, 0x0, 0x5, 0x0}) ioctl$EVIOCGMASK(r5, 0x80104592, &(0x7f0000000300)={0x0, 0xffffffffffffff36, &(0x7f0000000200)="952bb3e006ae9a4c3a"}) r8 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r8, 0x6, 0x0, 0x0, 0x0) r9 = fsmount(r8, 0x0, 0x80) fchdir(r9) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) statx(r9, &(0x7f0000000000)='./file1\x00', 0x800, 0x10, &(0x7f0000000080)) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) r10 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x2c}}, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) syz_read_part_table(0x5e2, &(0x7f0000000b00)="$eJzs3L+rHFUUB/DvndlfD6LPP8DiQRpR8Al24sNY6DNdEO0EbS2eSCzEQnYXFcEff0Ba0cIohFhbKEgQ01mJ8NBCxN7CFIYrOzuzG1CrfSiBz6fYe+6de86Z4U47G+5udT+pJbnZzT5qu2HUJNNV8GvyzjhZvvhkv5CM+8SS5PmrTz198eBSmW7WVquL/up022XSj6Mc9NGXo3x49fjdLl6kZJ4+zPjzSUarvXWdd+XvN32rpO328D8bfVXXBzHJ9/kiyUlpV4c/TZb5JLkvs27fYZK21tod8yLZS9rNW7GDa0c3lk/08V76N228ns3fK/WR/to4tdbaZH5+yGyT+x8/vPxPRbv8Zfd4w1KtdXxuyG22F05uT4bw0W9/nmc521RPbbYlT/eSV0+ffbi7k7KuMd798QEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOGMPvPbg180wudD9lk38zKdptlsXyZ9DfDA7o/7Xjm7sv/X25SZvHL38wytv/nL8W35P0ubw+Fwy3ex7aT1cf78bRv1qu3P/k9vN5LOPv9nbLPSlS/Ld+R9v1aHDaT++/tgdyUfNzv0BAAAAAAAAAAAAAAAAAABg5XouHlxq8lxS8kK2n/vXzJJShuksqbXWP2pn+Ph/cuXePrr5U8oqKbXcWf1Csn9PUqcfPNT9rcA6sdY66lqU/+YZ+Xd/BQAA//8EFGMK") 9m34.729634483s ago: executing program 0 (id=1028): mkdirat(0xffffffffffffff9c, &(0x7f0000002000)='./file0\x00', 0x0) mount$bind(&(0x7f0000000100)='.\x00', &(0x7f0000000300)='./file0/../file0\x00', 0x0, 0x2151090, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) mount$bind(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x2301091, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) umount2(&(0x7f0000000080)='./file0\x00', 0x2) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00'}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'pim6reg\x00', 0x2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x80400, 0x0) ioctl$TUNSETIFF(r2, 0x400454da, &(0x7f00000002c0)={'bond0\x00', 0x4000}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'veth0_to_team\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=@newqdisc={0x48, 0x24, 0xd0f, 0x70bd2b, 0x0, {0x60, 0x0, 0x0, r5, {0x0, 0xa}, {0xffff, 0xffff}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x748, 0xffff8000}}]}}]}, 0x48}, 0x1, 0x0, 0x0, 0x20002044}, 0x44080) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x73be44c35331b826, 0x1a, &(0x7f0000000400)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x866f}, [@ldst={0x3, 0x0, 0x4, 0x6, 0xb, 0xffffffffffffffbc, 0xfffffffffffffffc}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x3}, @map_val={0x18, 0xb, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7}, @map_idx={0x18, 0xd, 0x5, 0x0, 0xb}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x81}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @alu={0x7, 0x0, 0xa, 0xa, 0x3, 0x6, 0x10}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}]}, &(0x7f0000000140)='GPL\x00', 0x5, 0x49, &(0x7f0000000340)=""/73, 0x41100, 0x1, '\x00', r5, @fallback=0x5, r0, 0x8, &(0x7f0000000180)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000000240)={0x5, 0x10, 0xffffffff, 0x4}, 0x10, 0xffffffffffffffff, r0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) 9m34.658737989s ago: executing program 0 (id=1029): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f00000002c0)=ANY=[], 0x200002e6) fcntl$setpipe(r2, 0x407, 0x1) r3 = openat$full(0xffffffffffffff9c, &(0x7f00000004c0), 0x4100, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)={0x1b, 0x0, 0x0, 0x40000, 0x0, r3}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xf, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000fdffffff18110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf01000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="640000000206010800000000040000000000000014000780080011400000000005001500020000000500010006000000050005000a00000005000400000000000900020073797a320000000016000300686173683a6e65742c706f72742c6e6574"], 0x64}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)) bpf$TOKEN_CREATE(0x24, &(0x7f0000000180)={0x0, r3}, 0x8) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x1, r6}, 0x38) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000019200)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r7, 0x0, 0xfffffffffffffffe}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x8, &(0x7f00000001c0)=ANY=[@ANYRES32=r7, @ANYRESHEX=r0], &(0x7f0000000100)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x27, '\x00', 0x0, @fallback=0x36}, 0x94) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x9) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r9 = socket$inet_smc(0x2b, 0x1, 0x0) r10 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) fcntl$lock(r10, 0x410, &(0x7f00000000c0)={0x1, 0x1, 0x1, 0xfffe}) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x8) close_range(r9, 0xffffffffffffffff, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000200)) ioctl$SNAPSHOT_FREE(r1, 0x3305) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) 9m34.543202089s ago: executing program 0 (id=1030): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000ebff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010328bd7000fedbdf251c0000000c00018008000100"], 0x20}}, 0x10) 9m34.542865009s ago: executing program 34 (id=1030): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000ebff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010328bd7000fedbdf251c0000000c00018008000100"], 0x20}}, 0x10) 6m17.838735746s ago: executing program 5 (id=3499): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xe, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0xfffffffffffff001}, 0x18) r3 = openat$sysfs(0xffffff9c, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_genetlink_get_family_id$tipc(0x0, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) socket$netlink(0x10, 0x3, 0x14) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000000306010200000000000000000a9d0001050001"], 0x1c}, 0x1, 0x0, 0x0, 0x4004810}, 0x840) 6m17.792986s ago: executing program 5 (id=3501): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000001c0), 0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000540)=[@in6={0xa, 0x4e24, 0x1, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, 0x1ff}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000a80)={r1, 0x12, "132bf2b2631e4a669e5ab545f4df3af85ad7"}, &(0x7f0000000180)=0x1a) 6m16.912444948s ago: executing program 5 (id=3517): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0600000004000000fd0f000002"], 0x50) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)=@generic={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f9ffffffb703000000080000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe9b, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="01000000070000000800000008"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040), &(0x7f0000000500), 0xce, r3}, 0x38) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0500000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB="000000000001c559000000060000000000000004", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r6}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) ioctl$FIOCLEX(r5, 0x5451) r7 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200), 0x80, 0x0) r8 = fsopen(&(0x7f00000002c0)='selinuxfs\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r8, 0x6, 0x0, 0x0, 0x0) fsmount(r8, 0x0, 0x82) pread64(r7, 0x0, 0x0, 0x10000000000a) 6m16.646061192s ago: executing program 5 (id=3518): r0 = socket$nl_route(0x10, 0x3, 0x0) socket(0x400000000010, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000600)=@newtfilter={0x74, 0x2c, 0x1, 0x70bd22, 0x2, {0x0, 0x0, 0x0, 0x0, {0x0, 0x2400}, {}, {0x8, 0x4}}, [@filter_kind_options=@f_flower={{0xb}, {0x44, 0x2, [@TCA_FLOWER_KEY_UDP_SRC={0x6}, @TCA_FLOWER_KEY_CT_MARK={0x8, 0x5f, 0xa9}, @TCA_FLOWER_KEY_ARP_SHA_MASK={0xa, 0x40, [0x0, 0xff, 0x0, 0xff, 0x0, 0xff]}, @TCA_FLOWER_KEY_ICMPV4_TYPE_MASK={0x5}, @TCA_FLOWER_KEY_IP_TOS_MASK={0x5, 0x4a, 0x97}, @TCA_FLOWER_KEY_ENC_IPV6_DST={0x14, 0x21, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}}]}, 0x74}, 0x1, 0x0, 0x0, 0x4084}, 0x8000) 6m16.374230926s ago: executing program 5 (id=3520): mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xd, &(0x7f0000000c80)=ANY=[@ANYBLOB="18000000220000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000021007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1, 0x0, 0xfffffffffffffffc}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r5 = dup(r4) ioctl$HIDIOCSFEATURE(r5, 0xc0404806, &(0x7f0000000980)="b0178510409d79b1b7956764378fc84c7bf17b50261d9c73ee5f3bf9ccfe364790e429433561dc5fd41a27683aefb42ba0e4575c8215c84cd95f11b0b7342474d2bbf10c6d4d763c31945669ec2dde873f79221170bd341f8f999b22f0fbbb9b5c0e5bed66681fb579c183849940469967f5e30f72779961eb42d8907d2153e279ab8fc42db283cef328b4ea3270a2e0ce2e3238ea2a15d2ce55acf89339f1a6fedbdb90cad39ca08d9dc58bf2b53ca6d293a5bf6e88de9d9265e2c3207068cc0dd199f18f687dd28c49f244fba80d152bf6e75c9578c8") mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r5, @ANYBLOB=',msize=0x0000000000001000,']) ioctl$USBDEVFS_GET_SPEED(r5, 0x551f) sendmsg$nl_route_sched(r2, &(0x7f00000037c0)={0x0, 0x0, &(0x7f0000003780)={&(0x7f0000000040)=@newtaction={0x898, 0x30, 0x12f, 0x20, 0x0, {}, [{0x884, 0x1, [@m_police={0x880, 0x1, 0x0, 0x0, {{0xb}, {0x854, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, {0x7, 0x0, 0x0, 0x0, 0x0, 0x7}, {0x7, 0x2, 0x275, 0x0, 0x0, 0x3}}}], [@TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x10000004a56}, @TCA_POLICE_RATE={0x404, 0x2, [0x1, 0x0, 0x5, 0x0, 0x2, 0xb, 0xfffffffb, 0x0, 0x7, 0xfea7, 0x1, 0xffff7ffd, 0x90, 0x9fd, 0x2, 0xb8, 0xca2, 0x6, 0x3c, 0x7, 0x1, 0xa89c, 0x400, 0xc, 0x492217a0, 0x103, 0x5, 0x3, 0x1ff, 0xe5, 0x2d, 0xe, 0x3, 0xa, 0x3, 0x1, 0x9, 0x11, 0x188, 0x6, 0x3ff, 0xb, 0xd, 0x3, 0xc0001, 0x8, 0x8, 0xffffff40, 0x100, 0x3, 0x5, 0x7, 0xe0b2, 0x1, 0x8fe, 0xbf0, 0x9, 0x3, 0x9, 0x7ffffffd, 0x6, 0x0, 0x8, 0x800, 0x9, 0x4, 0x200100, 0x401, 0x8, 0x3, 0xb5, 0x10001, 0x401, 0x1, 0x7f, 0x0, 0x8, 0x3, 0x7f, 0x0, 0x2, 0x4, 0x0, 0x1000004, 0x7ffd, 0x0, 0x9, 0x80, 0x7, 0x5, 0x1, 0x0, 0x2000007, 0x1, 0xd, 0x8000, 0xfffffff7, 0x0, 0x4, 0x3ff, 0x400000, 0x10, 0x5, 0x3, 0x10000, 0x3, 0x1, 0x0, 0x5, 0x6, 0x5, 0x6, 0xe5a, 0x4, 0x2, 0x81, 0xd44, 0x9, 0x6, 0x7fff, 0x1000800, 0xfffffff4, 0x10000, 0x5, 0x8, 0xba, 0x2, 0x89, 0x2, 0x6, 0x6, 0x9, 0xffffa3e0, 0x86b9, 0x40ff, 0x1, 0x2, 0x12, 0x24b9, 0x8, 0xe01, 0x1, 0x6430, 0xd, 0x8, 0x0, 0x3, 0x7eb6, 0x3, 0x0, 0x200, 0xfffffeff, 0x9, 0xff, 0xa, 0x100, 0x7, 0x100, 0x1, 0x8001, 0x100, 0xffff9c71, 0x8, 0x2, 0x6, 0x2, 0xfffffc00, 0x81, 0x81, 0x200, 0x80000001, 0x1, 0xfffffffd, 0x9, 0x7, 0x4, 0xb, 0x80, 0x0, 0xfffffffe, 0x0, 0x5, 0x2, 0x65, 0x40, 0xfffffa0a, 0x3, 0x0, 0x2, 0x4, 0x35bc0, 0x9, 0xfffffffa, 0x7, 0x5, 0x3, 0x0, 0x6, 0x8, 0x2b, 0x2, 0x5, 0x10001, 0xffffffff, 0xf, 0xffffffff, 0x1, 0x723, 0x0, 0x1, 0x9, 0x4, 0x6, 0x7, 0x200, 0xfffffbff, 0x7, 0x3, 0x8, 0x5, 0xfffffffb, 0x2, 0x7f, 0x2, 0x80000002, 0x0, 0x9, 0x1ff, 0xfffffffb, 0x928, 0x4, 0xffffffff, 0x5, 0x6042, 0xb85, 0x6, 0x8d8d, 0x55, 0x101, 0x3, 0x64e8, 0x8, 0x82f, 0x77a, 0x80a, 0xfffffffc, 0x3ff, 0x3f7, 0x4, 0x8, 0x8, 0x1, 0x5d, 0x9, 0x9, 0x80]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x8, 0x26, 0x9d, 0xf, 0x7, 0x6b3, 0x1, 0x1, 0x3, 0x1000000, 0x1, 0xdf0, 0x18000, 0xf, 0x2, 0x4, 0x7, 0x1, 0xfffffff8, 0x5, 0xfffffffb, 0x6, 0x4, 0x3, 0x2b2, 0x9, 0x6, 0x400, 0x5, 0x6, 0x3, 0x0, 0x8, 0x0, 0x100, 0x9, 0x9, 0x3, 0x6, 0x1, 0x9, 0x4, 0x6, 0xe4c, 0xba3, 0xc88, 0xfffffff4, 0x5, 0xb, 0x5a, 0x8000, 0x7, 0x7, 0x7, 0x5, 0x7, 0x4fffdf8d, 0x0, 0x20, 0x8001, 0x2, 0x7, 0x4, 0x5, 0x0, 0x10000, 0x8, 0x2, 0x80000000, 0x10, 0x1000, 0x4, 0x70, 0x23, 0x1, 0x9, 0x4, 0x400, 0x6, 0x0, 0x34, 0x1bac, 0xff, 0x10, 0x2be48b4a, 0x91df, 0x5, 0x1b, 0x3, 0x6, 0x10000, 0x7, 0x800, 0x1, 0x3, 0x0, 0x800, 0x0, 0x8000, 0x3, 0xfffffffa, 0x1000, 0xffff, 0x44, 0x2, 0x2, 0x5, 0x9, 0x4, 0x5, 0x10001, 0xc, 0x1, 0xffffffff, 0x1af, 0x4, 0x9, 0xf82, 0x3, 0x2, 0x7, 0x10000, 0x4, 0x4, 0x3, 0x80000001, 0x1, 0x0, 0x9, 0x3, 0x0, 0x2, 0x6, 0xcc7b, 0x100, 0x7, 0x0, 0x7fff, 0x2, 0x4, 0x11080000, 0x5, 0x8a, 0x1, 0x64, 0x43, 0x4, 0x5, 0x8000, 0x2, 0x3, 0x9, 0x7fffffff, 0x0, 0x35bc, 0x9, 0x0, 0x10001, 0x0, 0xd, 0x8, 0x0, 0x9, 0x4, 0x6, 0xc7, 0xb8b7, 0x5, 0xfff, 0x5, 0x2, 0x200, 0xfff, 0x8, 0x1, 0x4, 0x9, 0x8, 0x4, 0x49ab, 0xffff, 0x5, 0x7fff, 0xfffffffc, 0x1, 0x9, 0x4, 0x6, 0x8d7, 0x5, 0x1, 0x4, 0xff9e, 0x0, 0x8, 0x8, 0xff, 0x4, 0x6, 0x8, 0x3, 0x10001, 0x7fffffff, 0x40, 0x2, 0x5, 0x4, 0x200, 0x10, 0xfffffffb, 0xc, 0x4, 0x1d66, 0x1, 0x101, 0xcb8, 0x9, 0x0, 0x2, 0x80, 0xc8, 0x100, 0x98600000, 0x5, 0x4, 0x71cb, 0x4, 0x4, 0xffff, 0x0, 0xc984, 0xd, 0x1, 0x1, 0x3, 0x3ff, 0xffffffff, 0x6, 0x401, 0x100, 0x9, 0x7, 0xfd2b, 0x8, 0x4, 0xb, 0x7, 0x2, 0x7, 0x1, 0x8bb, 0x0, 0xffff0001, 0x3, 0x4c0a, 0x59]}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa, {0x3}}}}]}]}, 0x898}, 0x1, 0x0, 0x0, 0x50}, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x84000, 0x0) 6m15.927325715s ago: executing program 5 (id=3522): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xe, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0xfffffffffffff001}, 0x18) r3 = openat$sysfs(0xffffff9c, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_genetlink_get_family_id$tipc(0x0, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) socket$netlink(0x10, 0x3, 0x14) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000000306010200000000000000000a9d0001050001"], 0x1c}, 0x1, 0x0, 0x0, 0x4004810}, 0x840) 6m0.86141429s ago: executing program 35 (id=3522): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xe, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0xfffffffffffff001}, 0x18) r3 = openat$sysfs(0xffffff9c, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_genetlink_get_family_id$tipc(0x0, r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) socket$netlink(0x10, 0x3, 0x14) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000000306010200000000000000000a9d0001050001"], 0x1c}, 0x1, 0x0, 0x0, 0x4004810}, 0x840) 4m24.753910215s ago: executing program 7 (id=5373): move_pages(0x0, 0x1efe, &(0x7f0000000080), 0x0, &(0x7f0000000040), 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000006c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x18) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_TID_CONFIG(r3, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000002ec0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="5953fdfffffffddbdf256b"], 0x28}}, 0x50) (fail_nth: 2) 4m24.476065349s ago: executing program 7 (id=5375): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000930d000000000000010000352b531400000000009500000000000000"], &(0x7f0000000800)='GPL\x00', 0x3, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xe3}, 0x94) socket$inet6_sctp(0xa, 0x5, 0x84) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000071103e00000000009500000700000000cd1dea8f1da3b2092f99be78892cca045bfe0744ac93c06728556316"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x80) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) r1 = socket$inet(0x2, 0x2, 0x1) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x14}, 0x4010) sendmsg$inet(r1, &(0x7f0000001040)={&(0x7f0000000040)={0x2, 0xffff, @remote}, 0x10, &(0x7f0000000000)=[{&(0x7f0000000280)='\b\x00', 0x2}, {&(0x7f0000000180)="2d0000008058", 0x6}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000007000000890b040a0101027f00000100000000001c000000000000000000000008"], 0x40}, 0x20000024) 4m24.430652933s ago: executing program 7 (id=5379): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000001850000001b000000b7"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r1}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x111, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000000)={0x13, 0x10, 0xfa00, {0xffffffffffffffff, r3, 0x1}}, 0x89) 4m24.393924017s ago: executing program 7 (id=5381): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r0}, 0x10) socket(0x400000000010, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x20081e, &(0x7f0000000300)={[{@nombcache}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0xa30}}, {@journal_dev={'journal_dev', 0x3d, 0x460b8000}}]}, 0x1, 0x52a, &(0x7f0000001440)="$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") r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000dfff75390000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='io_uring_register\x00', r1}, 0x10) r2 = io_uring_setup(0x19b4, &(0x7f0000000000)={0x0, 0x709f, 0x8, 0x2, 0xeb}) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000000c0)=@raw={'raw\x00', 0x8, 0x3, 0x2f8, 0x170, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x490, 0xffffffff, 0xffffffff, 0x490, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xf0, 0x118, 0x0, {}, [@common=@unspec=@helper={{0x48}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x170}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x1, 0xacc, 0x3, 'snmp_trap\x00', 'syz1\x00', {0x3}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x358) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1) io_uring_register$IORING_UNREGISTER_PBUF_RING(r2, 0x17, &(0x7f0000000540)={0x0, 0x0, 0x1}, 0x1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101842, 0x11) bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB="0500000004000000080000000b"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x71, &(0x7f0000000800)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000580)='kmem_cache_free\x00', r4, 0x0, 0xac5}, 0x18) lsetxattr$security_evm(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000400), &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0xa8, 0x1) r5 = syz_io_uring_setup(0x185e, &(0x7f00000006c0)={0x0, 0xf36c, 0x80, 0x3, 0x610, 0x0, r2}, &(0x7f00000004c0)=0x0, &(0x7f0000000680)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r6, r7, &(0x7f00000002c0)=@IORING_OP_LINKAT={0x27, 0xa, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x400, 0x1}) io_uring_enter(r5, 0x5fdd, 0x217, 0xa5, 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000005c0)) r8 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) r9 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r9) ptrace$setregset(0x4205, r9, 0x1, &(0x7f0000000100)={&(0x7f0000000040)="dcef58b7f29c1f7c93d183044aedba283413e674c7719c33a4b17f028f68610a6c55bb2bf8282853f3e16f8394a8676ff55a3507e2ad50248c6130863b0f7433c7fbc9b978a39eae88bffd05d139cedbee444f7c98e1f92b0f64462b4b470bedced2125e0b1f38fbaa348c6d75aa1a4011e9cdae15ecb9309b0101edbf6dd6d111d6132f1821a4e4cbec8438c595d491dea40ed58175a2a5", 0x98}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r8, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) munmap(&(0x7f0000002000/0x4000)=nil, 0x4000) syz_io_uring_setup(0x371d, &(0x7f0000000440)={0x0, 0xc576, 0x400, 0xa, 0xffffff}, 0x0, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, 0x0, 0x84) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) 4m23.90055539s ago: executing program 7 (id=5388): syz_open_dev$usbfs(&(0x7f0000000080), 0x74, 0x101783) r0 = fsopen(&(0x7f0000000000)='exfat\x00', 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) syz_usbip_server_init(0x4) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)=[{{&(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000040)="281effe935fdca249bd774480a584b135c556eabe1a3f2724200a50e8002a6e5", 0x20}], 0x1, &(0x7f0000000340)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @local}}}], 0x20}}], 0x1, 0x4800) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'wg0\x00', 0x0}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000440)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000880)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010028bdfaadbc077f9103fc000008000300", @ANYRES32=r6], 0x2c}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0xe0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f00000003c0), &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x43, &(0x7f0000000700)=[{}], 0x8, 0xffffffffffffff5a, &(0x7f00000007c0), &(0x7f0000000800), 0x8, 0xba, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="01002bbd7000ffdbdf25010000001c000180060001788b00a95753c8da78d0ae452e6a20000800030000000000080006002a000000"], 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000038c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000003880)={&(0x7f00000009c0)=@newtaction={0x2e84, 0x30, 0x300, 0x70bd2b, 0x25dfdbfb, {}, [{0x1578, 0x1, [@m_mirred={0x128, 0x1d, 0x0, 0x0, {{0xb}, {0xc4, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x3ff, 0x2, 0x10000000, 0xbae9, 0x5ae}, 0x1}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x5, 0x31, 0x2, 0x5, 0x1}, 0x7, r3}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0xfffffff8, 0x9, 0x6, 0x8, 0x7}, 0x1}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0xfffffe7c, 0x5, 0x3, 0x4, 0x5}, 0x3}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x4, 0x0, 0x7, 0x2e30, 0x7d00000}, 0x1}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x19a, 0x4, 0x8, 0xccb5, 0x8001}, 0x0, r3}}]}, {0x3b, 0x6, "8528c1c2af7e9dc9d68c44495c9805d7aa78cc5b3f01f744891e1241a39718549c764c756a06545e8e0d16158dad0da8fb468616ab04db"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x2}}}}, @m_xt={0x90, 0xd, 0x0, 0x0, {{0x7}, {0x28, 0x2, 0x0, 0x1, [@TCA_IPT_TABLE={0x24, 0x1, 'filter\x00'}]}, {0x44, 0x6, "824a3c199ee69e12574fe2ed63baa0a6447d24b2defc51fbc121b3cb322475ecc2bd0cc1adc02ab9269cc4f130aa61c4c2e510456d25e57b97944e91a21635ce"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x3}}}}, @m_simple={0x1dc, 0x9, 0x0, 0x0, {{0xb}, {0xb8, 0x2, 0x0, 0x1, [@TCA_DEF_PARMS={0x18, 0x2, {0x5, 0x3ff, 0xd, 0x5, 0xe}}, @TCA_DEF_DATA={0x14, 0x3, '-}*[[{*-*:))\x04-+\x00'}, @TCA_DEF_DATA={0x5, 0x3, '\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x4, 0x5, 0x6, 0xc, 0x5}}, @TCA_DEF_DATA={0x5, 0x3, '\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x5e, 0x2, 0x5, 0x22, 0x7}}, @TCA_DEF_PARMS={0x18, 0x2, {0x1, 0x1, 0x7, 0x8, 0x9}}, @TCA_DEF_DATA={0x5, 0x3, '\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x6, 0x1, 0x6, 0x9, 0x6}}, @TCA_DEF_DATA={0xd, 0x3, '/dev/loop'}]}, {0xf9, 0x6, "57b55494ca1f936b19cc9c4b87cb7d310457a3f3fec5f11a66b61452cec4f8d056ee80f38dd546c94584288036852f5aa7e8e6ff009b9fb31bb2f2219f00a4624aaecc08bc71f298843b3697376210107a5941ce68f022d3b55f8b1abbaf6a40974f4ca401507e815f36c84a1727035e8f56245a375f81a3dad51234ce1bb4ba03ec3e5a384fafd81dd3963ba30479c1d0228775e4f7fc5822551b5728ff46525ac1fa845253b110545d6c8e45e46c127745ed2eff72c39207b5b6fb81a884c8fddb7bbc59158cac3c2ac32d660c62a5e70fb89ff3f2d2b6d41935cb3c3116cb35ef2811765f58525f160e4595bc194750adde7192"}, {0xc}, {0xc, 0x8, {0x3, 0x2}}}}, @m_simple={0xbc, 0xe, 0x0, 0x0, {{0xb}, {0x48, 0x2, 0x0, 0x1, [@TCA_DEF_DATA={0x5, 0x3, '\x00'}, @TCA_DEF_DATA={0x14, 0x3, 'kmem_cache_free\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x9, 0x3, 0x8, 0x938, 0x3}}, @TCA_DEF_DATA={0x8, 0x3, 'lon\x00'}, @TCA_DEF_DATA={0x8, 0x3, 'lon\x00'}]}, {0x49, 0x6, "825d02daee053ae6670b9712d336446d8460cd953143e9f80b5ecee00ee96a05e992f9ec6815f157ac707ad5a6b80aea2e1215c343261eb3144611878af741c9862905e4f9"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}, @m_mirred={0x80, 0xb, 0x0, 0x0, {{0xb}, {0x44, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x5b64, 0x104, 0x8, 0x80000000, 0x1}, 0x2, r6}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x3e, 0x3, 0x10000000, 0x5, 0x6}, 0x0, r7}}]}, {0x13, 0x6, "538a1414ea2336da3319c4afda6cc2"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_bpf={0xf4, 0x5, 0x0, 0x0, {{0x8}, {0x60, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x0, 0x6, 0x80, 0x9}, {0x81, 0x83, 0x9, 0x9}, {0xd6c, 0x51, 0x8, 0x880}, {0x400, 0x2, 0xb, 0x80000000}, {0x6, 0x2, 0x5, 0x1}]}, @TCA_ACT_BPF_FD={0x8, 0x5, r8}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x8000, 0x8, 0x20000000, 0xd31, 0xf}}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x7}, @TCA_ACT_BPF_FD={0x8, 0x5, r2}]}, {0x6e, 0x6, "96bc3eb2aa6fcd3dabc940e84e430a10373f6179452528a3f8c41d77409a3a37105053c91aac63f93e127ced93f9b4aa911630b4631ae03c5e8e6b27095adf3756ad3b370833a65ca0a3a5c08d7b09977170e6dc715ba3124da37d8e28dbf678ee0828668fd2345389d2"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x3}}}}, @m_pedit={0xfb0, 0x8, 0x0, 0x0, {{0xa}, {0xebc, 0x2, 0x0, 0x1, [@TCA_PEDIT_KEYS_EX={0x68, 0x5, 0x0, 0x1, [{0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}]}, {0x44, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}]}]}, @TCA_PEDIT_PARMS={0xe50, 0x2, {{{0x9, 0x579, 0x8, 0x5, 0x200}, 0x5, 0x0, [{0x0, 0x6, 0x7, 0x6, 0x51080, 0x80}, {0x200, 0x7ff, 0x2, 0x8, 0x8, 0x3}]}, [{0x80000000, 0x80000001, 0x7, 0x0, 0x8, 0x1c}, {0x35, 0x40, 0x0, 0x4, 0x5, 0xffff}, {0x1, 0x9b, 0x2, 0x5, 0x6, 0x9ce}, {0x1, 0xff, 0x6, 0x4, 0x7}, {0xfffffffb, 0x9, 0x6, 0x8, 0x8d3, 0x7}, {0x8, 0x1, 0x3, 0x9, 0x5, 0x8}, {0x1, 0x6, 0x4, 0xf, 0xfffffffb, 0x4}, {0xfffff303, 0x7, 0x4, 0x1, 0x4, 0x9d3}, {0xb, 0x9, 0x8, 0x6, 0x9, 0x6}, {0xd, 0x8, 0x5, 0x9, 0x0, 0x4}, {0x5, 0x175c, 0x40, 0xa4d, 0x8, 0x8}, {0x7, 0x1, 0x8, 0x7, 0x2, 0x8}, {0x7, 0x3, 0x6, 0x6, 0x1ff, 0x8001}, {0xd, 0x9, 0x7, 0x6, 0x100, 0xbf}, {0x8, 0x655b0293, 0xb, 0x4, 0x7, 0xc}, {0x2, 0x8000, 0x4, 0x60ee, 0x1, 0x101}, {0x1, 0x7d, 0x4, 0x4, 0x7, 0x4}, {0x10000, 0x7, 0x9, 0x1ff, 0x5, 0x7}, {0x0, 0x0, 0x2, 0x7, 0xfffffffb, 0xac7e}, {0x0, 0x2, 0x2, 0x6, 0x7, 0x4}, {0x2, 0x4, 0xcd4, 0x40}, {0xa, 0x3ff, 0x7, 0x5, 0x80000000, 0x4}, {0x5, 0x9, 0xc, 0x0, 0x8, 0x7}, {0x9, 0x6, 0x7fffffff, 0x9, 0xf354, 0x7}, {0xa71, 0x3e44ec86, 0x8, 0x2, 0x3, 0xfffffff9}, {0xe, 0x1, 0x10, 0x7, 0xfc2e0000, 0x7ff}, {0x9, 0xce0f, 0x0, 0x4, 0x1, 0x8}, {0x8, 0x7f, 0xfffff1e2, 0x7db, 0xfffffff8, 0x1}, {0x100, 0x1, 0x7, 0x2, 0x9}, {0xb, 0x6, 0x4, 0xfffffffd, 0xa, 0xd}, {0x8, 0x7, 0x7fffffff, 0x4, 0x9, 0x9}, {0x105, 0x2, 0x6, 0xe79, 0xd, 0x5}, {0x5, 0x8, 0x9, 0x7, 0x1, 0x7}, {0x9, 0x7, 0x7ff, 0x6, 0x8000000, 0x97}, {0x400, 0x515, 0x5, 0xf711, 0x8, 0x2}, {0x9, 0xbf25, 0xfed, 0x2000000, 0xe, 0x3}, {0x101, 0x8000, 0x0, 0x7, 0x7fffffff, 0x7}, {0xfff, 0xf, 0x6, 0x9, 0x2, 0x4}, {0xd, 0x200, 0x2, 0x6774, 0x10001, 0x3}, {0x8, 0xb3, 0x4247, 0x31, 0x0, 0x7}, {0x3, 0x9, 0xffff0000, 0xa, 0x4ad6, 0x2}, {0x2dae, 0x8, 0x2, 0x3, 0x7fff, 0x7}, {0xb, 0xf, 0x4, 0x0, 0x8000, 0x7449}, {0x8, 0x8, 0x7e7, 0xfffffff1, 0x5}, {0x9, 0xb, 0x2ec3, 0x2, 0x3, 0x9}, {0x3, 0x9, 0x38e, 0x60a, 0x656, 0xc}, {0x8e, 0x7, 0xff, 0x32, 0x0, 0xecd5}, {0x3, 0x6f9, 0x3, 0xea, 0xffffffff, 0x9}, {0xc, 0x4, 0x0, 0x2, 0x2, 0xbc2}, {0x1, 0x8, 0x2, 0x1000, 0x2, 0x81}, {0x8, 0x1000, 0x3, 0xf62, 0x10001, 0x6}, {0x3, 0x7, 0x9, 0x3ff, 0x0, 0xcec6}, {0xee6, 0x42, 0x5, 0x81, 0x2, 0xfffffffe}, {0x2, 0xb, 0xd9, 0x7, 0x7, 0x8}, {0x2, 0x0, 0xfff, 0x3, 0x10, 0xe}, {0x3, 0x6, 0x9, 0xcc3e, 0x7fff, 0xfffffff8}, {0xaf, 0x9, 0x5af, 0x7f, 0x101, 0x8}, {0x46, 0xe7ae09f2, 0xa65d, 0x400, 0x4, 0x6}, {0x1ff, 0x3, 0x4, 0x8, 0xfffffffa, 0x6b0}, {0x9, 0xb, 0x80000000, 0x3ff, 0x6, 0x1ff}, {0x3, 0xfffffff2, 0x4, 0x81, 0x6, 0x6fbe0d4d}, {0x10001, 0x5, 0x8, 0x8, 0x0, 0x9}, {0x0, 0xe, 0x3, 0x5, 0x58, 0x6}, {0x2, 0x5, 0x7, 0x71, 0x7, 0xa}, {0x5, 0x9, 0x0, 0x217, 0x81, 0x3}, {0x1000, 0x9, 0x0, 0xffffffff, 0x800, 0x94c6}, {0xfff, 0x2, 0x3, 0x6, 0x3, 0x1}, {0x1, 0x10000, 0x7f, 0x6e, 0xc4a5, 0x8}, {0x5, 0x5, 0x8, 0x8, 0x6, 0x1}, {0x8, 0x401, 0xd, 0x2, 0xc, 0xde22}, {0x9, 0x7, 0x4, 0xca, 0x10, 0x9}, {0x29c, 0xf1, 0x2, 0x1, 0x0, 0x7}, {0x8, 0xe, 0x101, 0xf13, 0x5, 0x83b7}, {0x3, 0x1, 0x0, 0x700, 0x5, 0x9}, {0x9, 0x2, 0x7, 0xc, 0xffffffff, 0x7}, {0x6, 0x40, 0x65e, 0x6da, 0xfffffff6}, {0x4, 0x72, 0x7, 0x8, 0x8000, 0x401}, {0x4, 0x8, 0x3000, 0x7, 0xffffff00, 0x5}, {0x2, 0x7ac, 0x7, 0x1, 0x3, 0x5}, {0x7fffffff, 0x0, 0x4, 0x800, 0x40, 0x8}, {0x9, 0x6, 0x9, 0x3, 0x8, 0x1}, {0x7, 0x47cd6895, 0x1, 0x8, 0x7, 0x80000001}, {0xc90, 0xe, 0x6, 0x68e0, 0x9, 0x9}, {0x0, 0x5, 0x8, 0x6, 0x7, 0x7ff}, {0x2, 0x6, 0x7, 0xffffffff, 0x79, 0x7ff}, {0x9, 0x2, 0x7ff, 0x8001, 0x6, 0x9}, {0x0, 0x7318, 0x6, 0x4e3, 0x2, 0x401}, {0x0, 0x20000, 0xd36, 0x8d, 0x1, 0x8}, {0xffffff00, 0x6, 0x5, 0x1, 0x100, 0xffff}, {0x6, 0x9, 0x3, 0x401, 0x1, 0x4}, {0x401, 0x4, 0xe6c, 0x8, 0x3, 0x1}, {0x2, 0x8, 0x5, 0x0, 0x8001, 0x9}, {0x1, 0x1, 0xa, 0x2362c63b, 0x5, 0xffff8001}, {0x9f335800, 0x8, 0x2, 0x6, 0x9, 0x200}, {0xffffffff, 0x8, 0x4, 0xff, 0x10001, 0x3}, {0x9, 0x80000001, 0x3, 0x2, 0x8, 0x1}, {0x1, 0x0, 0x400, 0x7fff, 0x10001, 0xa68d}, {0xf, 0x5, 0x7, 0x5, 0x9, 0x3}, {0x9, 0x8, 0x1, 0xd4e, 0x80000001, 0x101}, {0xd, 0x8, 0x8001, 0x2c, 0xc, 0x3}, {0x3, 0x80000000, 0x0, 0x2, 0xffffff00, 0x9}, {0x752, 0x627e, 0x100, 0x8, 0x5, 0x5}, {0x98000000, 0x0, 0x2, 0xb, 0x5, 0x2000}, {0x81, 0x7ff, 0x7fffffff, 0x6a15, 0x462, 0xa}, {0x7, 0x800, 0x9, 0x8, 0xd, 0xfffffff9}, {0x4, 0x1ff, 0x2, 0x1, 0x6, 0x3}, {0x5, 0x7, 0x8, 0x2, 0x9, 0x9}, {0x9, 0x6, 0x3, 0x10, 0x5dba064, 0x9}, {0x3, 0x8, 0x3, 0x1, 0xf78, 0xcb4}, {0x3, 0x2, 0x80000000, 0x5, 0x8, 0x10}, {0x5, 0x6, 0x5, 0x800, 0xffffff38, 0x2}, {0x2, 0xa, 0x2, 0xaba09b6c, 0x0, 0x3}, {0x17e43e54, 0x3, 0x9, 0x0, 0x1, 0x5a57}, {0x4, 0x622, 0x9, 0x6, 0xa0000000, 0x1f600000}, {0x7, 0x8, 0x2, 0x9, 0x7fffffff, 0x7}, {0x33800000, 0x1, 0x4, 0x8, 0x3, 0x10001}, {0x1, 0x8, 0x5, 0x3, 0x89bc, 0xe}, {0x5, 0x1ff, 0xff, 0x2, 0x3, 0x1c}, {0x80, 0x3, 0xe, 0x7, 0x5, 0x8}, {0xfffffff0, 0xfffffff8, 0x6, 0x6, 0x8, 0xb93c}, {0x7d, 0x5936, 0x1, 0x9, 0x8, 0x800}, {0x401, 0x2, 0x2, 0x7f, 0x5, 0x5}, {0x0, 0x7ff, 0x8, 0x60000000, 0xca6}, {0xd69, 0x6, 0x7fff, 0x6, 0x8, 0x7}, {0x6, 0xf, 0x7, 0x1, 0x9, 0x3}, {0x100, 0x2, 0x1, 0x9, 0xc49, 0x800}, {0x43, 0x6, 0x2, 0x0, 0x8, 0x3284f4da}, {0x1, 0x8, 0x6, 0x8, 0x1b4, 0x3}], [{0x2}, {0x3, 0x1}, {0x4}, {0x3}, {}, {0x4, 0x1}, {0x1, 0x1}, {0x3}, {0x4, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x2}, {0x5, 0x1}, {0x4}, {0x2}, {0x0, 0x1}, {0x5}, {0x5}, {0x1, 0x1}, {0x5, 0x1}, {0x5}, {0x2, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x4}, {0x3, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x1}, {0x7, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x2}, {0x1, 0x1}, {0x1}, {0x4}, {}, {}, {0x3}, {0x3, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {0x4}, {0x4, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x2}, {0x2}, {0x5}, {0x5}, {0x3, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x1}, {0x2}, {0x1}, {0x3}, {0x5, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x2}, {0x4, 0x1}, {0x1}, {0x3}, {0x4, 0x1}, {0x7fe069138281e703}, {0x2}, {0x4}, {}, {0x2}, {0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x2}, {}, {0x4}, {0x0, 0x1}, {0x3}, {0x3, 0x1}, {0x3, 0x1}, {0x4}, {0x4, 0x1}, {0x5}, {0x5}, {0x4, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {}, {}, {0x4}, {0x0, 0x1}, {0x1}, {0x5, 0x1}, {}, {0x5}, {0x5}, {0x1}, {0x5, 0x1}, {0x2}, {0x5}, {0x4, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x1}, {0x2}, {0x1, 0x1}, {0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x4}, {0x1}, {0x0, 0x1}, {0x2}, {0x0, 0x1}, {0x3, 0x1}], 0x1}}]}, {0xca, 0x6, "c1c34040d821134fbb46ef516d4ccd1c145b4d82938c41be34e20bb436a5a200a847c71442026dedd84968b7cbecc6cda0b6766ab091a5a3697515053bb803073dd5da09c3f1fccf8b751bdfda48cfe0572c395307c3af76dca2083c250b4ad34aa1423b0efffb930f4a536fbca5aaf6b1896a1ea43a5fbe88e34e91793d9c0260c5f8388c0fa6b9a6306adda13f59ef83db44663f59113657327bc42a13779f8b954f2352a0879fa0b541a7eb1f1e335a4ab65c6a88ddb6f0a1ef6e71ae37e9557ab4b2bfce"}, {0xc}, {0xc, 0x8, {0x2}}}}]}, {0x15c, 0x1, [@m_csum={0x158, 0x20, 0x0, 0x0, {{0x9}, {0x58, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0xf55, 0x1409, 0x6, 0x5, 0x3bae}}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x4, 0x1, 0x9142590fdcd75707, 0x2, 0x8}, 0x28}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0xb6a8050, 0xff, 0x10000000, 0xffff, 0xffffffff}, 0x11}}]}, {0xd7, 0x6, "fd94ac906396339b24ecf6c8d30197f63a49dde8a4f826d8ef501553874ce13d661c3fbec3c84edc27fb8340826f924025320817131f0a471ec652dd683804b7bf837f7d73d364da8c30fe63998152f4daf71c36acab19c454ca2d50919b88ee93b1d615c09ec5fa5259482c4d57c7e593d5bdfaadcfc144c06101f8e10bdfebf3839430404719ae5831cc524c71e34687934f5ec5a5eaec756759bb32266c735e9a008b6dc2ea6295fc377633a2c4a7cf7017b4901d87089369d066034faaed7d7a694e6bb3cdf25886c91b9b7b2578e29811"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x6}}}}]}, {0x248, 0x1, [@m_csum={0x164, 0x17, 0x0, 0x0, {{0x9}, {0xc8, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x8, 0x401, 0x7, 0x38}, 0x10}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x7, 0x6e24561, 0x7, 0x80000001, 0x3}, 0x1d}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x10000, 0x9, 0x8, 0x8, 0x2}, 0x31}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x5, 0x3, 0x20000005, 0x7, 0x9}, 0x7a}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x4000, 0x5, 0x1, 0xff, 0x8}, 0x61}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0xa, 0x654, 0x3, 0xccab, 0x3}, 0x72}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x2, 0x2, 0x4, 0x3, 0xc}}}]}, {0x71, 0x6, "031d570d9ec30e554914daa4f7ed87b309a91b2b36a96b0c12e908d25dcb40bdd0e5a32901d80650d8c018d2a951a7b7450ee3f1e2d045e3b6bfa4bb5b04a8d93b73a83b5a4e437f20541653f987fa2fd2e0de89d787a9d4982f15debd8b499cc3f91c10d0c4d42c696f13f07b"}, {0xc}, {0xc, 0x8, {0x3, 0x2}}}}, @m_ife={0xe0, 0x1b, 0x0, 0x0, {{0x8}, {0x40, 0x2, 0x0, 0x1, [@TCA_IFE_DMAC={0xa}, @TCA_IFE_PARMS={0x1c, 0x1, {{0x1, 0x2, 0x0, 0x9955}}}, @TCA_IFE_TYPE={0x6}, @TCA_IFE_DMAC={0xa, 0x3, @random="935c967b9e09"}]}, {0x79, 0x6, "9871252a51868bed8cc82a1c2026455d0eb74f7969e26c9d3f16458875af6905085281960c34be2f4ef676c56f1843806d730c63eb502f1a5a37308941e29117910040f6c476a20dc2d9383884f9060331e069350bfa435016d5f246163775c2e11fa6675a8304b540c289f43bf342d93034602edf"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x1}}}}]}, {0x1554, 0x1, [@m_skbedit={0x14c, 0x16, 0x0, 0x0, {{0xc}, {0x54, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0xfff3, 0xc}}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0xffff}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0xa}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0xc5}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x6, 0x2, 0x10000000, 0x8, 0x100}}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0xa, 0xa}}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x6}, @TCA_SKBEDIT_PRIORITY={0x8, 0x3, {0x8, 0xfff1}}]}, {0xcf, 0x6, "04f865c25b2b354a966a0c506a54149dd14f233a16eb4047d023462d58d05377b392ced44d186396b869eca1d8b4c66c412d3267b390941cf581011a6cb31954cdd080e3b5bca398df5a37b010a8449c5e0567decb3af2d8d4f31a853ff671a84334ebee6356e6f69c4f7b4c01de64e1d52b7de868b6f95afe8e9b4fb57bce4d10d834da23375afb0500f9e8b1be03be6494468aaf3bf35df4692b1f0815287ef78af0963e235b39cb1fec571ff8caa40ce6ec2f46c39c39f2f13a3405982994e56f477243c1df3414616d"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x3}}}}, @m_mpls={0x78, 0x6, 0x0, 0x0, {{0x9}, {0x28, 0x2, 0x0, 0x1, [@TCA_MPLS_BOS={0x5}, @TCA_MPLS_PARMS={0x1c, 0x2, {{0x3ade7cba, 0x5b80ba65, 0x20000000, 0x1, 0x6}, 0x2}}]}, {0x28, 0x6, "7af87cabd196fd315b0cc7898f1b1d1e5d205216efe97bd3e7d5d1fc1f29ebc50ad211cb"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_skbmod={0x120, 0x1d, 0x0, 0x0, {{0xb}, {0x34, 0x2, 0x0, 0x1, [@TCA_SKBMOD_DMAC={0xa, 0x3, @random="699e07141aae"}, @TCA_SKBMOD_PARMS={0x24, 0x2, {{0xff, 0x5, 0x4, 0x80000000, 0x8}, 0x1}}]}, {0xc4, 0x6, "d5a46e2512f11a37632a01a9125047e94ae58a0d7b0d2ac2dc9acecc92436c1fa6f76b18118019647ed672bc43263e0156d95012bdf7d32afb5694107daf92a54a6855b37a449ddde54d4682bb10597c6dd4a5165f8b2194310f21797e27fd45808d1ac561baa29d2350735d9937948d0103d5cd15136bcd58e72117c3e3ad422533123df3263b5134c7bd152d0d28b60b633a3079397c741a993b1c0918c2fa1670b15ca517606896672694441d4843887fefcb72edee957f41bf61af133458"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x3, 0x1}}}}, @m_ctinfo={0xb0, 0x1b, 0x0, 0x0, {{0xb}, {0x3c, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0x6}, @TCA_CTINFO_ZONE={0x6, 0x4, 0xf1}, @TCA_CTINFO_ACT={0x18, 0x3, {0x3, 0x6, 0x3, 0x0, 0x8}}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0xdb26}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0x6}]}, {0x4a, 0x6, "86b18e12bce103b569ffe18aedb17f3156500202fb95f4e356578901e587544d23ec656d8d2cd3b29186d70a8d0c663e85cb5795aa8a3caeade34611b8c5db00bbc7761b1992"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_xt={0x1170, 0x1f, 0x0, 0x0, {{0x7}, {0x1118, 0x2, 0x0, 0x1, [@TCA_IPT_TABLE={0x24, 0x1, 'raw\x00'}, @TCA_IPT_TARG={0x102a, 0x6, {0x3, 'raw\x00', 0x8, 0xfff, "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"}}, @TCA_IPT_HOOK={0x8, 0x2, 0x1}, @TCA_IPT_TARG={0xb1, 0x6, {0xff, 'raw\x00', 0x3, 0x2, "65ec43b71242c7c132cbe3637d4be5a8f233ffa625fba780ba58a502c24f983137c3032cacd6dafac8ed536f7e99a2021c1b08e12a0c5a9fdaaf12fb29eea97b7d9b9ca0e7c9339afc1e3ccdcb127d5dab9e6c7f6bc4171a46b3098239f31ea936d1d7711c78728fdaf476b65aaf061e6ce471d6296a188a181201c45bc25c5d721b78c7819ac8"}}, @TCA_IPT_INDEX={0x8}]}, {0x31, 0x6, "5434563f133185bdf370da2e776a41157b5635431d3ecf114df86fba211b8188b9f6b83f39ab3bae9237330c84"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x2}}}}, @m_mpls={0x4c, 0x12, 0x0, 0x0, {{0x9}, {0x14, 0x2, 0x0, 0x1, [@TCA_MPLS_BOS={0x5, 0x8, 0x1}, @TCA_MPLS_PROTO={0x6, 0x4, 0xdada}]}, {0xd, 0x6, "d09b01de152c4739c2"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}]}]}, 0x2e84}, 0x1, 0x0, 0x0, 0x20008000}, 0x1) keyctl$set_reqkey_keyring(0xe, 0x7) request_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000780)={'syz', 0x0}, &(0x7f0000000740)='lon\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r10, 0x29, 0x1b, &(0x7f0000000100)={@remote}, 0x14) r11 = syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000240)='./file1\x00', 0x200000, &(0x7f0000000a00)={[{@test_dummy_encryption_v1}, {@bh}, {@delalloc}, {@nomblk_io_submit}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@journal_async_commit}, {@delalloc}, {@journal_dev={'journal_dev', 0x3d, 0x8}}, {@grpjquota}], [{@smackfsroot={'smackfsroot', 0x3d, '[]}!'}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@fowner_eq}, {@euid_eq}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/loop-control\x00'}}, {@dont_measure}, {@subj_type={'subj_type', 0x3d, 'debug_want_extra_isize'}}]}, 0x3, 0x58d, &(0x7f0000000d80)="$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") openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r11, {0xfffff801}}, './file0\x00'}) ioctl$RTC_AIE_OFF(0xffffffffffffffff, 0x7002) close(r10) r12 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r12, 0x40286608, &(0x7f00000000c0)={0x6, 0x8000, 0x81, 0x8, 0x7, 0x6}) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000001d40)='\xd0\x9e^\xa0\xee\xc8\x17T\xb1GI\x90\xe2Q1\xb0\x8f\xe1\xa8\x95\xa0\xcd\fL\xaei\xb6\xb7\xc1Y\xd5YG\xf9\xc2\xf1\xa4\xdb$\xf6]\xab\x1a\xdaY\xfb\x03dhS\x97nZ\xf8\xc6\x1f\x03\x00\x00\x00\x00\x00\x00\x00\x9bg-D#g\x16\xf4\xd9\x00\x00\x00\x00\x00eA\x9f\xc3\x11\x18\xe6\xc5\x95\x9e!^W\xf6\xacE\xa3\xc8\xe7\xec\xd6\xbd\x1c+\n\xc7Q( \xba\xff\x17N\x1fB\x91\x15\x83\xec(B\xc5\x05\x9d\xd6\x02|6\xdc\xee$\xb5\x1deC\xfb\xa2\xaa\xe0#\xcb\xde;sA\xad\xa6\xb6P\xa3\xf7\xc3q\xd4\xb6\x95\x02\xd8*\xa8\xd2\x94\xa3\x89\xa9\xa0\xc5\xc9=\xa5^\x00\x00\x00\x00\x00\x00\x00\x00\x00\xef\xcd\xd3\t\x01A\xd5\x81\xc1;9\xeez\xba\x00\x00\x00\xdc\x94\xff)\xa4\xe6\xfb]\x90bG\x11\b\x98#\xaa99ez|\x8b5\x92\xa5\xba\x96\xb3\xb26I\xbb\xdeb\x95?\xc0\x81', &(0x7f0000000200)='sockfs\x00', 0x0) close(r0) 4m23.663208831s ago: executing program 7 (id=5393): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r0, 0xffffffffffffffff}, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27e}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x3f, 0x0, 0x0, 0x0, 0xb}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000643200007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007041af64090aac40d6600000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) 4m23.623338715s ago: executing program 36 (id=5393): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r0, 0xffffffffffffffff}, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27e}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x3f, 0x0, 0x0, 0x0, 0xb}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000643200007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007041af64090aac40d6600000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) 4.169041101s ago: executing program 6 (id=9330): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x11, 0xb, &(0x7f0000000080)=@framed={{0x18, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @initr0, @generic={0x65}, @initr0={0x18, 0x0, 0x0, 0x0, 0x20000000}, @exit, @alu={0x4, 0x0, 0x2, 0x3, 0x0, 0x0, 0xfffffffffffffffc}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x45}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xe, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000140)='kfree\x00', r1, 0x0, 0xfffffffffffff001}, 0x18) add_key(&(0x7f0000000040)='ceph\x00', 0x0, &(0x7f00000000c0)="010001000000000000001000015b097ead85847817353d2dbad05dd5", 0x1c, 0xffffffffffffffff) 4.039230173s ago: executing program 6 (id=9332): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000080)={'syzkaller1\x00', @broadcast}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000003c0)={0x0, {0x2, 0x4e20, @private=0xa010102}, {0x2, 0x4224, @remote}, {0x2, 0x4e25, @multicast2}, 0x184, 0x0, 0x0, 0x0, 0x2008, 0x0, 0x200003, 0x0, 0xb4}) write$tun(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="080000fa"], 0xdc) ioctl$SIOCGSKNS(r0, 0x894c, &(0x7f0000000040)={'ip6gretap0\x00', 0x200}) 3.876034787s ago: executing program 8 (id=9336): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8, 0x6}, 0x120, 0x10000, 0x33f8, 0x1, 0x8, 0x20009, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000800), 0xffffffffffffffff) (async) syz_usbip_server_init(0x1) (async) syz_usbip_server_init(0x1) (async) syz_usbip_server_init(0x2) syz_usbip_server_init(0x1) syz_usbip_server_init(0x1) syz_usbip_server_init(0x0) syz_usbip_server_init(0x0) (async) r2 = syz_open_dev$vcsu(&(0x7f0000000040), 0x3ff, 0x2) write$cgroup_int(r2, &(0x7f0000000080)=0x2, 0x12) (async) syz_usbip_server_init(0x1) (async) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)={0x1c, r1, 0xc4fc9e906872338b, 0x70bd2a, 0x25dfdbff, {{0x15}, {@val={0x8}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x40084) 3.84218112s ago: executing program 6 (id=9339): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r0}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0x4, &(0x7f00000007c0)=ANY=[@ANYBLOB="18000000930d000000000000010000352b531400000000009500000000000000"], &(0x7f0000000800)='GPL\x00', 0x3, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xe3}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000071103e00000000009500000700000000cd1dea8f1da3b2092f99be7889"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x94) pwrite64(0xffffffffffffffff, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) rename(0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xbf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14304, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x72051052ae3513ca}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000006c0)='cp3\nW\xb0\x8aQtT\x87\x86\xf5\x13v&[\xa9\nF\xdf\x8d5\xe76\xd5\xe8\x9d\a\x17\x16\xfcc\xba\x1f\x85\'\x84^\xb0\x87m\xaa\x1dsM\x17\x99\xaf\x05\xd8\x96\xae%\x1e\xb2\xfc\xae+#c.5zY\x1a\xcb\xfe\x97\x8d\xcc\x8es\xfd11\xd0\"M\xebe\xdb\x11\xd0\xd38\xa6!\x97\xd7VQ\x8b\xa9>\x92x\x0f\xc5\xab\xc8\xd7\x03e\xed\x81G\xd2n\xb1Eu\a\x1c0\x82\x05\x84Hn\x9c=\x89\x85\xf7Z\x12\x0exA\xe1\xf9XI\xa1\xcf\xa2\xfe\xd8\xd3\x19\x1ba\x1c\xec\r\xe4\x1e\x19\xb2\x9f\xc9 8!\xe0\xb5\xeaH\x88\x1f\x98\x94\x18Q\xbe\xa1l\x93/\xb4f\xca\x1f\xb3O\r\xa8\x9bv\x05\x8c\x1b[XM\x176\x1c 0\xcd7\xef\x94T\xc8B\\2(b\x16\x85yi7\xa1\x00'/220) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x82080, 0x174) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000100)) socket(0x2a, 0x4, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) mmap$xdp(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1000008, 0x80010, r2, 0x0) setgroups(0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) socket$inet(0x2, 0x2, 0x1) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x14}, 0x4010) 3.761273757s ago: executing program 8 (id=9342): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) io_uring_register$IORING_REGISTER_RING_FDS(0xffffffffffffffff, 0x14, &(0x7f0000005bc0)=[{0x3, 0x1, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000540)=""/49, 0x31}, {&(0x7f0000000580)=""/97, 0x61}, {&(0x7f0000000740)=""/12, 0xc}], &(0x7f0000000800)=[0x8, 0x53d, 0x5, 0x5]}, {0x3, 0x1, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000900)=""/134, 0x86}, {&(0x7f0000000a40)=""/127, 0x7f}, {&(0x7f0000000840)=""/27, 0x1b}], &(0x7f0000000ac0)=[0x80, 0x1, 0x8, 0x77, 0x936, 0x457d]}, {0x6, 0x0, 0x0, &(0x7f0000000f80)=[{&(0x7f0000000b80)=""/163, 0xa3}, {&(0x7f0000002700)=""/4096, 0x1000}, {&(0x7f0000000b00)=""/46, 0x2e}, {&(0x7f0000000c40)=""/247, 0xf7}, {&(0x7f0000000d40)=""/94, 0x5e}, {&(0x7f0000000dc0)=""/217, 0xd9}], &(0x7f0000001000)=[0xd5bf, 0x0, 0x7fffffffffffffff, 0x253, 0xf, 0x4c, 0x9, 0x8, 0x7, 0x3]}, {0x3, 0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000000ec0)=""/53, 0x35}, {&(0x7f0000001080)=""/101, 0x65}, {&(0x7f0000001100)=""/102, 0x66}], &(0x7f00000011c0)=[0x2a0f, 0x7]}, {0x3, 0x1, 0x0, &(0x7f0000001440)=[{&(0x7f0000001200)=""/193, 0xc1}, {&(0x7f0000001300)=""/254, 0xfe}, {&(0x7f0000001400)=""/14, 0xe}], &(0x7f0000001480)=[0x9]}, {0x1, 0x0, 0x0, &(0x7f0000001580)=[{&(0x7f00000014c0)=""/186, 0xba}], &(0x7f00000015c0)=[0x5, 0x5, 0x6, 0x2, 0x7]}, {0x9, 0x1, 0x0, &(0x7f0000005b00)=[{&(0x7f0000001600)=""/71, 0x47}, {&(0x7f0000001680)=""/41, 0x29}, {&(0x7f0000003700)=""/254, 0xfe}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000004800)=""/4096, 0x1000}, {&(0x7f0000005800)=""/126, 0x7e}, {&(0x7f0000005880)=""/142, 0x8e}, {&(0x7f0000005940)=""/224, 0xe0}, {&(0x7f0000005a40)=""/138, 0x8a}], &(0x7f00000016c0)=[0x3, 0x3c525627, 0x4]}], 0x7) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000180)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x400000, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001740)=@newtaction={0x894, 0x30, 0x1, 0x0, 0x0, {0x7a}, [{0x880, 0x1, [@m_police={0x87c, 0x1, 0x0, 0x0, {{0xb}, {0x850, 0x2, 0x0, 0x1, [[@TCA_POLICE_TBF={0x3c, 0x1, {0x3, 0xffffffffffffffff, 0x0, 0x8420, 0x80000000, {0xa, 0x0, 0x3ff, 0xff, 0x3, 0x401}, {0x5, 0x1, 0x10, 0xff, 0x9, 0x9}, 0x15800, 0x1, 0x7}}, @TCA_POLICE_RATE={0x404, 0x2, [0xff, 0xef02, 0xef0a, 0x9, 0x23, 0x400000, 0x80000000, 0xfffffffb, 0xc, 0x3, 0x2, 0x6, 0x73f9e023, 0x6, 0x6, 0x7, 0xfb, 0xeb5, 0x7, 0x24, 0x35bad662, 0x5, 0x4, 0x29, 0x6, 0x8, 0x4, 0x5, 0x1ff, 0x140000, 0x0, 0x1a, 0x8, 0x5, 0x0, 0x8000005, 0x6, 0x9, 0x7, 0x2, 0x8, 0x0, 0xf, 0x2, 0x98, 0x800, 0x100, 0x8000, 0xca, 0x4, 0x2, 0x3, 0x4, 0x2, 0xe36, 0x4, 0xfffff2c2, 0x8001, 0x0, 0x1, 0x8, 0x7, 0x9, 0x0, 0x7, 0xb, 0x7, 0x6, 0x7f, 0x203ff, 0x6e09bc56, 0x81, 0x0, 0x400, 0x8, 0x21c30312, 0x6, 0x0, 0x80, 0xc, 0x2, 0x7, 0x9, 0x1, 0xfffffff8, 0x5, 0xb, 0x5, 0xbfc3, 0x3, 0xe8b3, 0x8, 0x1, 0x6252, 0x4, 0x5, 0xc, 0x0, 0x9e, 0x1, 0x27, 0x3, 0x8, 0x10, 0x8001, 0xfff, 0x6, 0x5, 0x3, 0xfff, 0x5, 0x9, 0x16, 0x5, 0x7fffffff, 0x7f, 0x4, 0xffffff81, 0x1, 0x8, 0x3, 0x3ff, 0x6, 0xfffffff2, 0x2b22, 0x2c5, 0x2db1, 0xfffffff7, 0x200, 0x8, 0x10000e46, 0x5, 0xc9b3, 0x0, 0x9, 0x9, 0x2, 0x8, 0x7, 0x8005, 0xfffffc00, 0x800, 0x400, 0x9, 0x6, 0x200, 0x48, 0x40, 0x1, 0x9, 0x7, 0x8000, 0x7, 0x1ff, 0x2237, 0x6, 0x5, 0x6, 0x0, 0x4b, 0x4, 0xffff8000, 0x80000001, 0xd, 0x3, 0x3, 0x5, 0x9, 0x5, 0x3ff, 0x800, 0x9, 0x0, 0x6, 0x2, 0x93b, 0x4, 0x9, 0x200, 0x9, 0x0, 0x9, 0x401, 0xb, 0x3, 0xffffffff, 0x3, 0x0, 0x7, 0x3, 0x1, 0x2, 0x8, 0x3, 0x3, 0x0, 0x9, 0xffffffff, 0x400, 0x9, 0x61a0, 0x7, 0x2, 0x9, 0x9, 0x203, 0x9, 0x1, 0x1, 0x0, 0x4, 0x6, 0x40, 0x7, 0xf, 0x40, 0x80, 0x3, 0x1ff, 0x1, 0x9, 0xff, 0x80, 0x0, 0x4, 0x3, 0x7, 0x9, 0x8, 0x0, 0xf17, 0x0, 0xfffffff7, 0x7, 0x9, 0x0, 0x6, 0x7, 0x3, 0x101, 0xfffffffd, 0x3723, 0xf8a, 0xa, 0xcdd6, 0x1, 0x369, 0x3, 0x9, 0x7fff, 0x8, 0x10, 0xfffffff3, 0x7, 0x3ff, 0x5]}], [@TCA_POLICE_AVRATE={0x8, 0x4, 0x10}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x9, 0x1000, 0x8000, 0x4, 0x4, 0x8, 0x8, 0x80000001, 0x10, 0x8, 0x4, 0x40000000, 0x101, 0xffff0a6a, 0x1, 0x7, 0x38, 0x8000, 0x5, 0x3, 0x3, 0x42d, 0x1, 0x9, 0x100, 0x4000001, 0x1, 0x81, 0x7ff800, 0x3, 0x4, 0x80000000, 0x0, 0x1, 0x6, 0xc, 0x5, 0x7, 0x4, 0xff, 0x2, 0x7, 0xe76, 0x10000, 0xfffffffa, 0x6, 0xd66, 0x9, 0x2, 0xb26, 0xb4, 0xa, 0x800, 0x7fffffff, 0x80, 0xade, 0x80000006, 0x3, 0x3, 0x380, 0x5, 0x100, 0x9, 0x9, 0x1000, 0x7f, 0x3, 0x7, 0x7, 0x18000000, 0x1, 0x10000, 0x2, 0x2, 0x7, 0xef, 0x3, 0x400, 0x0, 0x6, 0x5, 0x92b, 0x5, 0x1000, 0xb, 0x7, 0x5, 0x9, 0x7fffffff, 0x1000, 0x5, 0x76, 0x200, 0x8, 0x2, 0x6, 0x10, 0x7ff, 0x40008, 0x72, 0x7fffffff, 0x311, 0xff, 0x4, 0xffffff2f, 0x1, 0x8, 0x9, 0xa086, 0x1, 0x200, 0x800, 0x7, 0x5, 0x80000000, 0x3ff, 0x9, 0x100, 0x15d2, 0x6, 0x1, 0x1, 0x2, 0x241c1aaa, 0x2, 0x0, 0x2, 0x16b, 0x8, 0x9, 0xa, 0x981, 0x0, 0xb, 0x2, 0x2, 0x10000, 0x81, 0x3, 0x3, 0x7, 0x6, 0x4, 0x2, 0xfffffffd, 0x5, 0x40000000, 0x7a, 0x8f0a, 0x7, 0xd2c, 0x7, 0x0, 0x15, 0xfffffa0e, 0x2, 0x80000001, 0xfe2, 0xa, 0x8, 0x7f, 0x6, 0x4, 0x9, 0x7, 0x4, 0x6, 0xf, 0x51, 0xff, 0x2, 0xfffffffd, 0x2, 0x8, 0x1, 0xff, 0x8, 0x2c1efe9, 0x3e, 0x5d18, 0x81, 0x400, 0x4, 0x7326deb8, 0x8006, 0x7ff, 0xffffffff, 0x5, 0x0, 0x2, 0x1, 0x6, 0x9e8, 0x101, 0xb31, 0x5, 0xe2, 0x4, 0x7f1e7a56, 0x5, 0x83, 0x9, 0x203e, 0x5, 0x8, 0x5, 0x10001, 0x87, 0x9, 0x1, 0xff, 0x8, 0x9, 0x8001, 0xffffff42, 0x7, 0x0, 0xe, 0x9, 0x3, 0x3, 0x8001, 0x5, 0x401, 0xfffffff9, 0xed, 0x6, 0xb9, 0x100000c3, 0x200, 0x101, 0x10, 0xa, 0xc, 0x2, 0x101, 0x5, 0x1, 0xa, 0x6, 0x9, 0x7, 0x4, 0x6, 0xbdc0, 0x7, 0x9, 0x9, 0x100, 0x4, 0xfffffffe, 0x81, 0x1000, 0x3, 0x9, 0x4]}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa}}}]}]}, 0x894}}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fa540000850000008200000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="1400000004000000040000000300000004080000", @ANYRES32, @ANYBLOB="00000055ef3fed000000000000001b3b00000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6, 0x0, 0x3}, 0x18) syz_emit_ethernet(0xbe, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaa230180c20000000800450000b00000000000119078000000000000000000004e20009c907801000000000000007b4b14"], 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x18) capset(&(0x7f0000000080)={0x19980330}, &(0x7f0000000040)={0x200000, 0x200000}) munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r7 = io_uring_setup(0xa9e, &(0x7f0000000880)={0x0, 0xa793, 0x1, 0x5, 0x2a}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="0700000004000000800000000400000028"], 0x50) r9 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1f0519, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x3}, 0x6025, 0x4005, 0xb, 0x3, 0x2, 0x1f, 0xb, 0x0, 0x0, 0x0, 0x20000005}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x4000011, r9, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x8, 0x20510, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_bp={0x0, 0xd}, 0x120, 0xfffe, 0x33f7, 0x1, 0x8, 0x20009, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, r9, 0x2) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='mnt\x00', 0x4, &(0x7f0000000000), 0x0, 0x236, &(0x7f0000000300)="$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") r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r10}, 0x18) setrlimit(0x40000000000008, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS(r7, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) r11 = syz_open_dev$sg(&(0x7f0000000140), 0xfffffffffffffffb, 0x8401) ioctl$SG_BLKTRACETEARDOWN(r11, 0x1276, 0x0) 3.635587439s ago: executing program 6 (id=9344): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000240)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) syz_pidfd_open(0x0, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r4}, 0x18) bind$rds(r3, &(0x7f0000000000)={0x2, 0x4000, @loopback}, 0x10) sendmsg$rds(r3, &(0x7f0000000080)={&(0x7f00000017c0)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@rdma_map={0x30, 0x114, 0x3, {{0x0}, 0x0, 0x40}}], 0x30}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000700)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8002, &(0x7f0000000040), 0x0, 0x62c, &(0x7f00000000c0)="$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") 3.406131309s ago: executing program 6 (id=9345): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000c80)='kmem_cache_free\x00', r0}, 0x10) pipe2$9p(&(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) flistxattr(r1, 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x92}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffffffffff000000", @ANYRES32=r5, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}, 0x1, 0x0, 0x0, 0xc000}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000007c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001500)=@newqdisc={0x70, 0x24, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {0x0, 0x9}, {0xffff, 0xffff}, {0xfff1}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x40, 0x2, {{0x1ff, 0x4, 0x0, 0x0, 0xfffffffd, 0x8}, [@TCA_NETEM_ECN={0x8, 0x7, 0x1}, @TCA_NETEM_LOSS={0x1c, 0x5, 0x0, 0x1, [@NETEM_LOSS_GI={0x18, 0x1, {0x80000001, 0x20006, 0x8, 0x0, 0xd99d}}]}]}}}]}, 0x70}}, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x4000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) sendto$packet(r2, &(0x7f00000002c0)="44c33b69ebc9e05e9bdec0c288a8", 0x36, 0x830, &(0x7f0000000440)={0x11, 0x8100, r5, 0x1, 0x2, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xe}}, 0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 3.208538536s ago: executing program 8 (id=9349): r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000480)={0x2, 0x4e24, @loopback}, 0x10) sendmmsg(r1, &(0x7f00000040c0)=[{{0x0, 0x0, &(0x7f0000003ac0)=[{&(0x7f0000000880)="5102a78f2fbb00411f960d694b5f84691ae49b7ccf1bcdaaaa788d857e01684ea8e1e2fc7095253fa585d1c238af7990cf10ef0474563d30c0ec046531c62916bc188cea6fbe5d5ff31d5bbb7d957de0b0eb3400cd855a16643ae1aed5fa455c5b3f0988a581722a245652e82f32c201415ecad555310839cda8f385ebdf6e0e4a916dd2ea40deb40a4517663c06f6baa9cd7e5e97b52988d9c867ab19f4c9ba544f07baef55b9c7e4a0275430002f724c7737e4a3949eb048f2dc5b7e8d69c14bf146734a2c574777cda204de2850d714d6174ac259d4f44a2ddb4abf5a2cfcd52f6a3e41f20dc09d0347807f1741812ef962804df57fa9eb62d099ac2d6ef588e1f543234ffee806a90f8d48e902c523e9f84f5f23f1cd4910fd4e7e4b296fddb0449a86e8a5361d8d6045c190ecfa9b974f78d81cd1863641c15a71fe96a3f956e1b95270d2c3d98260ae7022d7d91dd11606b1f744c479dafbd89fb4cf93ec1b77935c25ca0592887a50216920b9d4db871c127fa54ef18be6d5fe26118f8d89797c1e61ed734086568dffac3b77e3dbf4e523a6824af9dd0c43d0f052cabab56eba8ab947a6518b1e6a2901694e9a63c38a83a530acdc767985b636f5b141e198e9eea90fac4eb7a3f1869920326c3125e1a6158c0e30ce07fce6bab2986019ddb9a2b83ad551a51330b53acc710f00a866633440073030b7bb1ace71807e6c86cab523d4c5a9c8052e43d6ffb832dbfdc4aac6cdf34278c55ec1b3ae6c7d210fe0aadf3304eebc4a4dc042e0bbf46918326f1ef58173e9fb19a214d4d81d3d86a5b1738db2af2ea94c9a51b68a9373c94fe4c09b3b726202fa0d078e29dbc56146c1b238635b86434738231de977879747ae2ad0747e200ef8528ab7c89ab7d8f7b237bf4bd3c34e1e8578b6e0a07d8eedd25b91ad6045ec885328c3f78f6fc563a48006756854988ad94dd103b6efb63b3fe5d0abe03339f3656f5dc58ea4eb690bf5cf54032e5fa8b8793737100cb7ee1bf6e2dd54423c8ed1f4a86bc3da04102185ca965347354402dd755c66de78756ecb41149db9512d247ef421c117ba98bb1cfb24a75785e7bc4940bdf7b551295e54d31db8852484bbac974ba9794f47f1020e44c0e47da386118bc343946cd2397fd47d32ca0609a8ec3eb5ea5ea759257cdf9384ba697a30e49602d180bdd39a301d781480c7567a09473e6b88b6ec9fe2a8a1e482f04be30fcdb112d414c069b37f827459d4c2926193fb9abb221e305460ed02de65cf893e84535fea2fb01384bef58d951dbf1d1b1bb0378136e15da51f6b30c1f35caa2b02e1c9a676765be8457f50632d373ea8e0be1f2e8213610aea62345b835b5c852932a015c1fee9b143c1e0e9045ecfc909c5c18989d54f08692363abcf3c3b0c6b8b46b8c027b6a3d0c373608b063555a72f11d498032eb671929fbb247a2e8ecd8f8584a23d3debc9d79b21dd3c1eb1fb829f909f3fd26d0022d45c77aa1edcdf047dcf5af65d7e103e13c8e0635e39aa", 0x43f}], 0x1, &(0x7f0000007e80)=ANY=[], 0x1270}}, {{0x0, 0x0, &(0x7f0000000340)=[{0x0}], 0x1, &(0x7f0000006d40)=ANY=[], 0x1074}}], 0x2, 0x4c055) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000000)) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) close_range(r2, 0xffffffffffffffff, 0x0) 2.819108481s ago: executing program 6 (id=9352): r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000d00000000080000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={r1}) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r3, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, 0x1403, 0x4, 0x70bd28, 0x25dfdbfe, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'lo\x00'}}, {{0x9, 0x2, 'syz0\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'veth0_to_batadv\x00'}}]}, 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000280)='netlink_extack\x00', r2}, 0x10) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000380)={{0x1, 0x1, 0x18, r2, {0x4}}, '\x00'}) write$P9_RSETATTR(r4, &(0x7f00000003c0)={0x7, 0x1b, 0x1}, 0x7) sendto$inet6(r0, &(0x7f0000000080)="ac", 0x34000, 0x44004, &(0x7f0000000100)={0xa, 0x4e24, 0x8, @loopback, 0xc5f}, 0x1c) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0xf) ioctl$TCFLSH(r5, 0x400455c8, 0x0) syz_usb_connect(0x2, 0xfffffffffffffe86, 0x0, 0x0) ioctl$TIOCVHANGUP(r5, 0x5437, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b000000000000000000000000800000000008"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000010000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r9}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) 2.412320477s ago: executing program 8 (id=9363): bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0xae, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000840)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x5, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000540)='kfree\x00', 0xffffffffffffffff, 0x0, 0x4}, 0x18) r2 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x4e, 0x1, 0x0, 0x0, 0x0, 0x210e, 0x2040e, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x2, @perf_bp={0x0, 0x8}, 0x11aa0, 0x30, 0x10000, 0x0, 0x18bb, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000000)='cpu>00||!') 2.38131561s ago: executing program 3 (id=9364): r0 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000160000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x60ac, 0x0, 0x0, 0x40f00, 0x11}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='sys_enter\x00', r2}, 0x10) shmdt(0x0) 2.138411291s ago: executing program 3 (id=9366): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xc94284a3061bb7fe, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r0, 0x0, 0x97}, 0x18) creat(&(0x7f00000002c0)='./file0\x00', 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x5a, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={r1, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[0xfffffffffffffff1], 0x0, 0x0, 0x1, 0x1}}, 0x40) 2.053760229s ago: executing program 3 (id=9368): socket$inet_udplite(0x2, 0x2, 0x88) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) write$P9_RUNLINKAT(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x4d, 0x1}, 0x7) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x1c0002, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x140, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[], 0x48) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f00000022c0)={0x0, 0x0, &(0x7f0000002280)={&(0x7f00000005c0)=ANY=[@ANYBLOB="14000000230001002abd7000fedbdf0100000000", @ANYRES16=r1], 0x14}, 0x1, 0x0, 0x0, 0x8881}, 0x800) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0x10, &(0x7f00000006c0)=ANY=[@ANYRES8=r2, @ANYRES32=r1, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000680)='cdev_update\x00', r3, 0x0, 0x3}, 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180200000020702500000000002020207b1af8ff00000000bfa100000000000007010000dbffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x23, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kfree\x00', r4, 0x0, 0x8}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000001140)=ANY=[@ANYBLOB="2100000000000000000000000000100000040000", @ANYRES32, @ANYBLOB="fdffffff03"], 0x50) socket$nl_generic(0x10, 0x3, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000000000"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='kfree\x00'}, 0x10) socket$kcm(0x10, 0x2, 0x0) lsetxattr$security_selinux(&(0x7f00000004c0)='./cgroup.net/devices.allow\x00', &(0x7f0000000c40), &(0x7f0000000c80)='system_u:object_r:pam_console_exec_t:s0\x00', 0x28, 0x2) r6 = syz_clone(0x20000000, 0x0, 0xf, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, 0x0, 0x0) ptrace(0x10, r6) sendmsg$NL80211_CMD_ASSOCIATE(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000091}, 0x24000051) ptrace$getregset(0x4205, r6, 0x202, &(0x7f0000000240)={&(0x7f0000000180)=""/120, 0xffffffffffffff28}) r7 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$KDFONTOP_SET(r7, 0x4b72, &(0x7f0000000080)={0x0, 0x0, 0x8, 0x1b, 0x100, &(0x7f00000000c0)="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"}) 2.0410638s ago: executing program 8 (id=9369): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000240)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) syz_pidfd_open(0x0, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r4}, 0x18) bind$rds(r3, &(0x7f0000000000)={0x2, 0x4000, @loopback}, 0x10) sendmsg$rds(r3, &(0x7f0000000080)={&(0x7f00000017c0)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@rdma_map={0x30, 0x114, 0x3, {{0x0}, 0x0, 0x40}}], 0x30}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000700)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8002, &(0x7f0000000040), 0x0, 0x62c, &(0x7f00000000c0)="$eJzs3c9rXNUeAPDvnfxO3ntJw+O917fQgGgL2qRJWyki2CK4qqX+WAhuHJu01E5/0EQ0tdIU6kYQNy4EVy6sC/8HLQiu/AdcuHEllSLSjVJ05E7ujNNk7mQSMzNt5vOByZwz586cc5t8e86cOedOAD1rKv1RiNgdEReTiMm6sv7ICqdWj7vzy5WT6S2Jcvmln5O4cjVZqX+tJLsfi4i04PfxSL6JiMm+9fUuLl8+WyyVFi5l+ZmlcxdnFpcv7ztzrnh64fTC+bkn5w4fOnjo8Oz+umedem6z57erLn3s+htvjb9//NXPPrmbzH7+/fEkjtQanZ7XZl97I1MxFeVM/ePpv+vh7a6sS/pqfyd/SdY+sNazbWwQm1L9/Q1ExH9jPPrqfpvj8d4LXW0c0FblJGp9FNBrEvEPPao6Dqi+t2/tffBgm0clQCfcPhrxWC3+ByKiGv/9q3ODMVyZGxi9k9wzz5NExP5tqD+t49uvj19Pb9GmeTigsZVrQ9kU+Nr+P6nE5kQMV3Kjdwr3xH8hm8adyOYPX2xezXhewdSafFb/0FbPB2jdyrWI+F+j8f++ys9m8f9adp8+/voW68+JfwAAAAAAAGALbh6NiCcaff5XqK3/GWyw/mcsIo5sQ/0bf/5XuLUN1QAN3D4a8XTD9b+F6iETfVnun5X1AAPJqTOlhf0R8a+I2BsDQ2l+tv5Fv6h7dkTs+2Dy47z669f/pbe0/upawKwdt/rXrAaaLy4Vt+HUoefdvhbx//5G8Z/U+v+kQf+fxvfFFuuYfPTGibyyjeMfaJfypxF7Gvb/Se2YpPn1OWYq44GZ6qhgvYfe+fDLvPrFP3RP2v+PNo//oaT+ej2Lm3v9wYg4sNxfzivfKP7ToX+j8f9g8nJf1O1EfLu4tHRpNmIwObb+8bnNtRkeJMOtH/puRFTioRovafzvfaT5/F9t/F8XhyPZNb5a8Z8/xn7IK9P/Q/ek8T/fvP+fuLf/33xi7sbEV3n1n2hp/u9gpU/fmz1i/g+aazVAu91OAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgQFSLiH5EUpmvpQmF6OmIsIv4do4XShcWlx09dePP8fFpW+f7/QvWbfsdX80n1+/8n6vJza/IHImJXRHzUN1LJT5+8UJrv9skDAAAAAAAAAAAAAAAAAADAfWJs9W7d/v/Uj33Nn/t8+5sHtFt/dr9BvAM7UH+3GwB0jfiH3iX+oXflx/+vd8sVHW0O0EGt9v/lq21uCNBxWxz/+7gAdgDv/6FXDbR22HC72wF0g/4fAAAAAAB2lF0P3/wuiYiVp0Yqt9RgVlb7YHCkW60D2qmQVzDU2XYAnWcNL/QuS3+gd7W4+BfYwZJa6reGm/3zV/8n7WkQAAAAAAAAAAAAALDOnt0t7P8HdqTc/f/Ajtdk/3+jjT0uFwA7iP3/0Ltc5guoDvbzvunf/n8AAAAAAAAAAAAAuA8MXz5bLJUWLi0ut5y4upmD/37ip8greqaTzdiuxErxvmjGg5AYiIg1ReXx1T/bs8XSK9HZ9lQjphN1DXawrpxEl/4/AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA1vkzAAD//y6EJ6E=") 1.890609153s ago: executing program 3 (id=9371): syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6, 0xff, 0x7, 0x7fc00002}]}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000540)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000000)) r3 = socket(0x2, 0x80805, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f00000000c0)={r2, 0x2, r1, 0x2}) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) mremap(&(0x7f0000000000/0x9000)=nil, 0x600a00, 0x200000, 0x3, &(0x7f0000a00000/0x600000)=nil) r4 = socket$inet6(0xa, 0x3, 0x3a) setsockopt$inet6_int(r4, 0x29, 0x24, &(0x7f0000000000)=0x400, 0x4) sendmmsg$inet(r3, &(0x7f0000000000)=[{{&(0x7f0000000080)={0x2, 0x4c21, @private=0xa01fdff}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000300)='Q', 0x1}], 0x1}, 0x20000000}, {{&(0x7f00000002c0)={0x2, 0x4e20, @local}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000ac0)="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", 0x541}], 0x1}}], 0x2, 0x0) 1.561992042s ago: executing program 8 (id=9374): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000120000007f00000001"], 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x68040200) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="5c00000002060108000000000000000000000000050005000a000000050001000700000005000400000000000900020073797a310000000015000300686173683a69702c706f72742c6e6574"], 0x5c}}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x51, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0xce) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) write$UHID_INPUT(0xffffffffffffffff, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x2) mlock2(&(0x7f0000ff5000/0x9000)=nil, 0x9000, 0x0) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) mlock2(&(0x7f0000495000/0x2000)=nil, 0x2000, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="6400000002060108000000000000000000000000050005000a000000050001000700000005000400000000000900020073797a310000000015000300686173683a69702c706f72742c6e65740000000014000780080006400056b20008001340000003"], 0x64}}, 0x0) sendmsg$IPSET_CMD_ADD(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000780)=ANY=[@ANYBLOB="74000000090601020000000000000000030000000900020073797a310000000005000100070000004c0007801800018014000240fe8000000000000000000300000000aa1800148014000240fc000000000000000000000000000000060004404e1f0000050007008400000006000540"], 0x74}, 0x1, 0x0, 0x0, 0x10040003}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x1018, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x8, 0x6}, 0x2021, 0x10000, 0x0, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x20004000) r4 = socket$nl_route(0x10, 0x3, 0x0) socket$unix(0x1, 0x1, 0x0) sendmsg$nl_route_sched(r4, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000240)={{r0}, &(0x7f00000001c0), &(0x7f0000000200)='%pI4 \x00'}, 0x20) 1.143136409s ago: executing program 9 (id=9379): keyctl$restrict_keyring(0xa, 0x0, &(0x7f0000000300)='asymmetric\x00', &(0x7f00000001c0)='dn:\xff\xffe{') 1.126552911s ago: executing program 9 (id=9381): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="040000eeffff0470aa7482ec762dfc2b6899c1e6f2fb7a230d8b7ba9770f1fd622cfde2c9cde6c3421efcdef8edd1c7a2f98f16bfa88c0d5a4560432472c557c9dab0530b1981211a94dc4aa4e6bf2dec090e5b00d3f5c5dfcaface6e0e1c4d5ccf51a8f97f139f7d38286b176cdfeba48acb8de467ac3f66577a0576ed2d9716713ba013ba34372f4576940f83cf8"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000380)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r5, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newtfilter={0x3c, 0x2c, 0xd27, 0x70bd25, 0x80002, {0x0, 0x0, 0x0, r5, {0x0, 0x1}, {}, {0x8, 0x4}}, [@filter_kind_options=@f_flower={{0xb}, {0xc, 0x2, [@TCA_FLOWER_KEY_ENC_UDP_DST_PORT={0x6}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4008081}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180200000200000000000000000000008500000041000000850000001100000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x0, 0xf, 0x0, &(0x7f0000000680)="87134bc662187ee76efc3628ab66b0", 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xb, &(0x7f0000000880)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000a000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='kfree\x00', r7}, 0x18) r8 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0026}]}) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r9, 0x6, 0xe, &(0x7f0000000300)={@in6={{0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x3a}, 0xfffffffc}}, 0x0, 0x0, 0x16, 0x0, "0af5a212a1bd3bbda613efd9c8b4965dca66db42f66a86e5781cf86717055a7c1d1408407e5a774ef95f2fc1b947e00f000000123f2f1d34b0882e83d41b67cb9ff147c6d33a097d2269351b3ed300"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r9, 0x6, 0xe, &(0x7f00000012c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x34, 0x0, "0c9e089c1b4a04000bde79f04103c458187eb46c2d996aff287154e786455261c425a7519cc275d04e6205abd307a0c4fa3838bf399ad5bd35f21907c7988d1300"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r9, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x3d}}}, 0x0, 0x0, 0x11, 0x0, "a1c1dd75a68473ba07d945c3b03e10950cd4b347113e55eb4285bf274bca67efbff2fdf98328de9434031348589bf28046d14810000000e3ffffff00"}, 0xd8) close_range(r8, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000c80)={'ip6gre0\x00', 0x0}) r11 = syz_open_dev$loop(&(0x7f0000000280), 0x1004000006, 0x188d60) r12 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r12, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r12, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000005c0)={{0x14}, [@NFT_MSG_NEWRULE={0x64, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2, 0x0, 0xfffe}, [@NFTA_RULE_EXPRESSIONS={0x38, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @xfrm={{0x9}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_XFRM_KEY={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_XFRM_SPNUM={0x8, 0x4, 0x1, 0x0, 0x6}, @NFTA_XFRM_DREG={0x8, 0x1, 0x1, 0x0, 0xc}, @NFTA_XFRM_DIR={0x5, 0x3, 0x1}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x8c}, 0x1, 0x0, 0x0, 0xc010}, 0x0) ioctl$LOOP_CONFIGURE(r11, 0x4c0a, &(0x7f0000000080)={0xffffffffffffffff, 0x0, {0x0, 0x0, 0x0, 0x4, 0x4000000000000ffd, 0x0, 0x0, 0xd, 0xc, "faf98317e5a1149989fc8dbe43ea6acc96e3a2503dc3bd3fe37d58128bbad0099cebdc25f5ab60c9e6d680f985881a7beda9d69098c8b534464c516bdd8a0f35", "32d8cc26f7061a74df2cfc06c89f3d9e234b30c50997d3bef409ff2176ff7bfe55cd4a5d83cd4a524bd3ffe70c7f3f800b2f7b6aa54cc50a1fcaed1e831fa79a", "675237601a8ca5b07dcc141802c4dae4162e43ac61b7ad3300", [0xfffffffffffffce8, 0xa]}}) readv(r11, &(0x7f0000000340)=[{&(0x7f0000001600)=""/4111, 0x100f}], 0x1) sendmsg$nl_route_sched(r2, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000cc0)=@newqdisc={0x45c, 0x24, 0x4ee4e6a52ff56541, 0x70bd25, 0x4000000, {0x0, 0x0, 0x0, r10, {0x0, 0x1}, {0xffff, 0xffff}, {0xe, 0xfff3}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_RTAB={0x404, 0x2, [0x7, 0x0, 0x1fc, 0x0, 0xfffffc80, 0x0, 0x1, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x21, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xfffffffe, 0xc000000, 0x0, 0x0, 0x8, 0x0, 0x8, 0x1, 0xffffffff, 0x0, 0x0, 0x2, 0xffffffff, 0x2, 0xc00, 0x0, 0x49, 0x20000000, 0x1ff, 0x0, 0x0, 0x80002, 0x0, 0x1000, 0xfffffffc, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x4000, 0x3, 0x0, 0xfffffffe, 0x5, 0x0, 0x0, 0x272, 0xb, 0x9, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0xe, 0x9, 0x2, 0xfffffffd, 0x0, 0x80007, 0x4, 0x0, 0x0, 0x0, 0x2, 0xfffffffd, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xb9a, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3, 0x5a, 0x6, 0x8, 0x0, 0x2, 0x1, 0x3, 0x0, 0x10, 0x0, 0x0, 0x3, 0x0, 0xfffffffc, 0x0, 0x0, 0x8, 0x0, 0x0, 0xffffffff, 0xffff8003, 0x0, 0xffffffff, 0x1, 0x38000, 0x800009, 0xfffffffd, 0x0, 0x8, 0x6, 0x9, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x3, 0xfff, 0x0, 0x0, 0x0, 0x2, 0x20, 0x80000001, 0x2, 0x2000000, 0x100, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0xb6, 0x0, 0x1, 0x0, 0x7, 0x8, 0x0, 0xffffffff, 0xffff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x4000, 0x0, 0x3, 0x0, 0x0, 0x8, 0x0, 0x7f, 0x800000, 0x0, 0x5, 0x0, 0x9, 0xfffffffd, 0x7, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x1, 0x0, 0x0, 0x2, 0x13, 0x0, 0x3, 0xd79, 0x0, 0x0, 0x0, 0xdd, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x26c, 0x4, 0x7, 0xffff, 0x0, 0x8, 0xfffffffd, 0x0, 0x0, 0x594, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe6]}, @TCA_TBF_PARMS={0x28, 0x1, {{0x1, 0x0, 0x0, 0x0, 0x0, 0x6}, {0xff, 0x2, 0x3, 0x0, 0x19, 0x40000000}, 0x0, 0x7, 0x2076}}]}}]}, 0x45c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 1.080410705s ago: executing program 2 (id=9382): r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7020000080000001823", @ANYRES32=r1, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r2}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 1.055963327s ago: executing program 2 (id=9383): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0x3, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020047b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000020000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x18) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f00000002c0)={'veth0_to_team\x00', &(0x7f0000000000)=@ethtool_cmd={0x26, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x8, 0xff, 0x4, 0x81, 0xffffffff, 0x0, 0x17, 0x4, 0x0, [0x0, 0x100000]}}) r3 = socket$inet6(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000190001000000000000000000021800000000fd000000ed0008000100ac1414000800080004"], 0x2c}}, 0x0) sendto$inet6(r3, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) r4 = socket$nl_rdma(0x10, 0x3, 0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000340)={@fallback=r4, 0x35, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0x40) r5 = socket(0x2b, 0x80801, 0x1) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8000000, 0x7fffffe, 0x2d0, 0x0, 0xffffffff, 0xffffffff, 0x110, 0xffffffff, 0x200, 0xffffffff, 0xffffffff, 0x200, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x3, 0x0}, @mcast1, [0x0, 0x0, 0x0, 0xffffff], [0x0, 0x0, 0x4c62d6309aaa1bde, 0xff000000], 'ip6tnl0\x00', 'nicvf0\x00', {}, {0xff}, 0x3a}, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x4, '\x00', 'syz1\x00'}}}, {{@ipv6={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1, [], [0x0, 0x0, 0xffffff00, 0xffffff00], 'veth1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', {0x1}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x330) 974.945924ms ago: executing program 9 (id=9384): sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x44}}, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={0x0, r0}, 0x18) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='xen_mc_entry_alloc\x00', 0xffffffffffffffff, 0x0, 0x7fffffffffffffff}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x8, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000084add879373a"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f0000000040)=@req3={0x4, 0x99f6, 0x7, 0x4, 0x2, 0x4, 0x1}, 0x1c) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f0000000100)=@req3={0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x861}, 0x1c) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYRES64=r1, @ANYRES8=r2], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE2(0xffffffffffffffff, 0xe, 0x0, 0x0) creat(0x0, 0x90) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70200001400001cb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@deltaction={0x44, 0x18, 0x1, 0x70bd2a, 0x25dfdc00, {0xa}, [@TCA_ACT_TAB={0x30, 0x1, [{0xc, 0x8f, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x14, 0x5, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}, {0xc, 0x9, 0x0, 0x0, @TCA_ACT_INDEX={0x8, 0x3, 0x37}}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x44000}, 0x40040) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r10, 0x0, 0x4040001) fsync(r10) r11 = socket(0x10, 0x3, 0x9) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000540)=ANY=[@ANYRES16=r1, @ANYRESOCT=r7, @ANYRESOCT=r3, @ANYRES16=r9, @ANYRESDEC=r5, @ANYRESOCT=r3, @ANYRES16=r4, @ANYRESOCT=r5, @ANYRESOCT=r3, @ANYRES64], 0xfe44, 0x0) sendmsg$NFT_BATCH(r11, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x64049}, 0x40000) socket(0x10, 0x3, 0x0) r12 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB="9000000010000305000000000000000000000700", @ANYRES32=0x0, @ANYBLOB="996e06004d4c0700540012800800010068737200480002800500060008000000050003000500000005000300fd00000008000200", @ANYRES32=r12, @ANYBLOB="08000100", @ANYRESHEX=r8], 0x90}}, 0x0) 860.805495ms ago: executing program 9 (id=9385): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000240)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) syz_pidfd_open(0x0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r3}, 0x18) bind$rds(r2, &(0x7f0000000000)={0x2, 0x4000, @loopback}, 0x10) sendmsg$rds(r2, &(0x7f0000000080)={&(0x7f00000017c0)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@rdma_map={0x30, 0x114, 0x3, {{0x0}, 0x0, 0x40}}], 0x30}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$nl_route(0x10, 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000700)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x8002, &(0x7f0000000040), 0x0, 0x62c, &(0x7f00000000c0)="$eJzs3c9rXNUeAPDvnfxO3ntJw+O917fQgGgL2qRJWyki2CK4qqX+WAhuHJu01E5/0EQ0tdIU6kYQNy4EVy6sC/8HLQiu/AdcuHEllSLSjVJ05E7ujNNk7mQSMzNt5vOByZwz586cc5t8e86cOedOAD1rKv1RiNgdEReTiMm6sv7ICqdWj7vzy5WT6S2Jcvmln5O4cjVZqX+tJLsfi4i04PfxSL6JiMm+9fUuLl8+WyyVFi5l+ZmlcxdnFpcv7ztzrnh64fTC+bkn5w4fOnjo8Oz+umedem6z57erLn3s+htvjb9//NXPPrmbzH7+/fEkjtQanZ7XZl97I1MxFeVM/ePpv+vh7a6sS/pqfyd/SdY+sNazbWwQm1L9/Q1ExH9jPPrqfpvj8d4LXW0c0FblJGp9FNBrEvEPPao6Dqi+t2/tffBgm0clQCfcPhrxWC3+ByKiGv/9q3ODMVyZGxi9k9wzz5NExP5tqD+t49uvj19Pb9GmeTigsZVrQ9kU+Nr+P6nE5kQMV3Kjdwr3xH8hm8adyOYPX2xezXhewdSafFb/0FbPB2jdyrWI+F+j8f++ys9m8f9adp8+/voW68+JfwAAAAAAAGALbh6NiCcaff5XqK3/GWyw/mcsIo5sQ/0bf/5XuLUN1QAN3D4a8XTD9b+F6iETfVnun5X1AAPJqTOlhf0R8a+I2BsDQ2l+tv5Fv6h7dkTs+2Dy47z669f/pbe0/upawKwdt/rXrAaaLy4Vt+HUoefdvhbx//5G8Z/U+v+kQf+fxvfFFuuYfPTGibyyjeMfaJfypxF7Gvb/Se2YpPn1OWYq44GZ6qhgvYfe+fDLvPrFP3RP2v+PNo//oaT+ej2Lm3v9wYg4sNxfzivfKP7ToX+j8f9g8nJf1O1EfLu4tHRpNmIwObb+8bnNtRkeJMOtH/puRFTioRovafzvfaT5/F9t/F8XhyPZNb5a8Z8/xn7IK9P/Q/ek8T/fvP+fuLf/33xi7sbEV3n1n2hp/u9gpU/fmz1i/g+aazVAu91OAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgQFSLiH5EUpmvpQmF6OmIsIv4do4XShcWlx09dePP8fFpW+f7/QvWbfsdX80n1+/8n6vJza/IHImJXRHzUN1LJT5+8UJrv9skDAAAAAAAAAAAAAAAAAADAfWJs9W7d/v/Uj33Nn/t8+5sHtFt/dr9BvAM7UH+3GwB0jfiH3iX+oXflx/+vd8sVHW0O0EGt9v/lq21uCNBxWxz/+7gAdgDv/6FXDbR22HC72wF0g/4fAAAAAAB2lF0P3/wuiYiVp0Yqt9RgVlb7YHCkW60D2qmQVzDU2XYAnWcNL/QuS3+gd7W4+BfYwZJa6reGm/3zV/8n7WkQAAAAAAAAAAAAALDOnt0t7P8HdqTc/f/Ajtdk/3+jjT0uFwA7iP3/0Ltc5guoDvbzvunf/n8AAAAAAAAAAAAAuA8MXz5bLJUWLi0ut5y4upmD/37ip8greqaTzdiuxErxvmjGg5AYiIg1ReXx1T/bs8XSK9HZ9lQjphN1DXawrpxEl/4/AgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA1vkzAAD//y6EJ6E=") 783.666352ms ago: executing program 3 (id=9386): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001540)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff010f77438cbce65d4da7423f3ded21512362ef5c630f807460bfee88882e9c187556b9deb44532ddeb7e409acf2389dbb8054d0a88e7bbabeda15a33c54238c4b1a630fbf3d3304a5f375013c158eb12d91a83819f6dd0d026fbba917f2139fff18cf06832"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3, 0x0, 0x7fff}, 0x18) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079d}) socketpair(0x1, 0x1, 0x1, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0x3}, 0x18) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1f, 0x11, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000000000000000000000c4ee8500000007000000b708000000000000dbaaf8fff1000000b5080000020000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b705000008000000850000006a00000095"], &(0x7f0000000600)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0x12, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r6}, 0xc) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a03000000000000000000070000010900010073797a30000000003c000000090a010400000300000000000700000008000a40000000000900020073797a31000000000900010073797a300000000008000540000000213c0000001e0a05010000000000000000070000070900020073797a31000000000900010073797a3000000000100003800c00008008000340"], 0xc0}}, 0x40000) r8 = syz_open_procfs(0x0, &(0x7f0000000100)='cmdline\x00') fcntl$setstatus(r8, 0x4, 0x40800) r9 = syz_io_uring_setup(0x416f, &(0x7f0000000780)={0x0, 0xfffffffd, 0x10100, 0x200, 0x1}, &(0x7f0000000100)=0x0, &(0x7f0000000300)=0x0) syz_io_uring_submit(r10, r11, &(0x7f0000000180)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r8, 0x792, &(0x7f0000000140)=[{&(0x7f0000000000)=""/4, 0x4}], 0x1}) io_uring_enter(r9, 0x567, 0x1000a387, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x800000, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sys_enter\x00', r12}, 0x10) lstat(0x0, 0x0) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000200100000102"], 0x50) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bc00551a000000000000000018120000", @ANYRES32=r13, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r14}, 0x18) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x63, 0xffffffffffffffff, {0x4}}, './file1\x00'}) 582.222669ms ago: executing program 9 (id=9387): socket$nl_generic(0x10, 0x3, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x140, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x8, 0x3, 0x420, 0x288, 0x43, 0xa0, 0x288, 0x98, 0x388, 0x178, 0x178, 0x388, 0x178, 0x49, 0x0, {[{{@ip={@loopback, @multicast1, 0x0, 0x0, 'bridge_slave_1\x00', 'ip6erspan0\x00'}, 0x12a, 0x228, 0x288, 0x0, {0x0, 0x7a010000}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x8, 0x0, 'syz0\x00'}}, @common=@unspec=@string={{0xc0}, {0x0, 0x3, 'kmp\x00', "7af8bdb4c056dc65949041982abfe9ed51b01289c0026e2e6034ed587be5f09017b907388134b0ede40eb8d493f20d534fc37f23ec524d91a7a041f36bb1d1c3ab474544c5ef3f2fa69a80a0d967ee4464257d28d31e6843bc1221dfb9a6a27ad13af7061b737fd97d94f50942c68242819c941c0b4d9ec154c7d327187e8198", 0x38, 0x2, {0x1}}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x4, 0x7, 0x5, 0x4, 0x3, 0x4], 0x2, 0x4}, {0xffffffffffffffff, [0x1, 0x1, 0x1, 0x1, 0x1, 0x2], 0x4}}}}, {{@uncond, 0x0, 0xe0, 0x100, 0x0, {}, [@common=@unspec=@cluster={{0x30}, {0x1b, 0x408, 0xfffffffb}}, @common=@set={{0x40}, {{0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x300], 0x0, 0x1}}}]}, @unspec=@NOTRACK={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x480) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x40800) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x39, &(0x7f0000e86000)="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", 0x118) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@getchain={0x24, 0x11, 0x1, 0x1fffffd, 0x0, {0x0, 0x0, 0x0, r2, {}, {0x7, 0xa}, {0xfff3}}}, 0x59}}, 0x0) 406.215915ms ago: executing program 2 (id=9388): r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r2}, 0x10) syz_open_procfs(0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 284.665205ms ago: executing program 9 (id=9389): sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x44}}, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={0x0, r0}, 0x18) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='xen_mc_entry_alloc\x00', 0xffffffffffffffff, 0x0, 0x7fffffffffffffff}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x8, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000084add879373a"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x808000, 0x4, 0x20300, 0xfc}, 0x1c) (fail_nth: 4) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f0000000100)=@req3={0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x861}, 0x1c) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYRES64=r1, @ANYRES8=r2], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE2(0xffffffffffffffff, 0xe, 0x0, 0x0) creat(0x0, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) syz_emit_ethernet(0xfa, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, 0x0, 0x4040001) fsync(r3) r4 = socket(0x10, 0x3, 0x9) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000200)=ANY=[], 0xfe44, 0x0) sendmsg$NFT_BATCH(r4, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x64049}, 0x40000) r5 = socket(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="9000000010000305000000000000000000000700", @ANYRES32=0x0, @ANYBLOB="996e06004d4c0700540012800800010068737200480002800500060008000000050003000500000005000300fd00000008000200", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32], 0x90}}, 0x0) sendmmsg(r5, &(0x7f0000000000), 0x4000000000001f2, 0x0) 280.813006ms ago: executing program 2 (id=9390): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = gettid() tkill(r1, 0x14) prlimit64(r1, 0xe, &(0x7f0000000300)={0x800000000, 0x40}, &(0x7f0000000340)) process_vm_readv(r1, &(0x7f0000000180)=[{&(0x7f0000000080)=""/37, 0x25}], 0x1, &(0x7f0000000640)=[{&(0x7f0000000a00)=""/4096, 0x1000}, {&(0x7f0000000340)=""/97, 0x61}, {&(0x7f00000003c0)=""/39, 0x27}, {&(0x7f0000000580)=""/180, 0xb4}, {&(0x7f0000000400)=""/18, 0x12}, {&(0x7f00000004c0)=""/51, 0x33}, {&(0x7f0000000780)=""/161, 0xa1}], 0x7, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) clock_gettime(0x1, &(0x7f0000000000)={0x0, 0x0}) r5 = syz_open_dev$usbfs(&(0x7f00000001c0), 0x800000001ff, 0x2) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r6}, 0x18) r7 = dup(r5) ioctl$USBDEVFS_CONTROL(r7, 0xc0185500, &(0x7f0000000040)={0x23, 0x3, 0x2, 0x5, 0x0, 0x0, 0x0}) clock_settime(0x0, &(0x7f0000000040)={r3, r4+10000000}) 73.051624ms ago: executing program 2 (id=9391): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xc94284a3061bb7fe, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r0, 0x0, 0x97}, 0x18) creat(&(0x7f00000002c0)='./file0\x00', 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff108500000007000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x5a, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={r1, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)=[0xfffffffffffffff1], 0x0, 0x0, 0x1, 0x1}}, 0x40) 329.65µs ago: executing program 3 (id=9392): fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000001680)=ANY=[@ANYBLOB="580100001000030400"/20, @ANYRES32=0x0, @ANYBLOB="15020000000000003001128009000100766c616e000000002001028006000100000000001c0004800c00010032d10000ffff00000c000100ae0200009e000000700004800c00010009000000010000e29b5d2a0008000000010100000c000100f8ffffff080000000c00010006000000040000000c00010007000000010000800c00010005000000060000000c00010001000000000000000c000100910a00000d0000000c0001000e00000032000000880003800c002100060000000c0000000c00010003000000400000000c00010004000000ffffffff0c00010002000000110000000c00010001000000020000000c0001000b000000270000000c000100ffff00005f0200000c000100ffffffff030000000c00010001000000030000000c00010000000000018000000c000100090000000900000008000500", @ANYRES8=r0], 0x158}, 0x1, 0xba01}, 0x44) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) 0s ago: executing program 2 (id=9393): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) socket(0x10, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) setsockopt(r0, 0x84, 0x81, &(0x7f0000000280)="1a00000012000000", 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x7a, 0x0, 0x0, 0x41000, 0x44, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r1}, &(0x7f0000000340), &(0x7f0000000300)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00', r2, 0x0, 0xfffffffffffffffe}, 0x18) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000540)=ANY=[], 0x9) (fail_nth: 4) kernel console output (not intermixed with test programs): 4][T28970] netlink_rcv_skb+0x123/0x220 [ 658.446673][T28970] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 658.446722][T28970] rtnetlink_rcv+0x1c/0x30 [ 658.446755][T28970] netlink_unicast+0x5c0/0x690 [ 658.446848][T28970] netlink_sendmsg+0x58b/0x6b0 [ 658.446889][T28970] ? __pfx_netlink_sendmsg+0x10/0x10 [ 658.446980][T28970] __sock_sendmsg+0x145/0x180 [ 658.447004][T28970] ____sys_sendmsg+0x31e/0x4a0 [ 658.447040][T28970] ___sys_sendmsg+0x17b/0x1d0 [ 658.447159][T28970] __x64_sys_sendmsg+0xd4/0x160 [ 658.447261][T28970] x64_sys_call+0x17ba/0x3000 [ 658.447350][T28970] do_syscall_64+0xca/0x2b0 [ 658.447392][T28970] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 658.447420][T28970] RIP: 0033:0x7fbf37bcf749 [ 658.447437][T28970] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 658.447457][T28970] RSP: 002b:00007fbf36637038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 658.447524][T28970] RAX: ffffffffffffffda RBX: 00007fbf37e25fa0 RCX: 00007fbf37bcf749 [ 658.447541][T28970] RDX: 0000000000000000 RSI: 0000200000000300 RDI: 000000000000000a [ 658.447595][T28970] RBP: 00007fbf36637090 R08: 0000000000000000 R09: 0000000000000000 [ 658.447611][T28970] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 658.447626][T28970] R13: 00007fbf37e26038 R14: 00007fbf37e25fa0 R15: 00007ffc416386a8 [ 658.447648][T28970] [ 658.711829][ T3505] hid-generic 0000:0000:0000.000A: hidraw0: HID v8.00 Device [syz0] on syz1 [ 658.780747][T27792] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 658.816136][T28998] FAULT_INJECTION: forcing a failure. [ 658.816136][T28998] name failslab, interval 1, probability 0, space 0, times 0 [ 658.828931][T28998] CPU: 0 UID: 0 PID: 28998 Comm: syz.9.8504 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 658.828973][T28998] Tainted: [W]=WARN [ 658.828982][T28998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 658.829057][T28998] Call Trace: [ 658.829075][T28998] [ 658.829086][T28998] __dump_stack+0x1d/0x30 [ 658.829120][T28998] dump_stack_lvl+0x95/0xd0 [ 658.829148][T28998] dump_stack+0x15/0x1b [ 658.829169][T28998] should_fail_ex+0x265/0x280 [ 658.829193][T28998] should_failslab+0x8c/0xb0 [ 658.829293][T28998] kmem_cache_alloc_noprof+0x69/0x4b0 [ 658.829321][T28998] ? security_file_alloc+0x32/0x100 [ 658.829350][T28998] security_file_alloc+0x32/0x100 [ 658.829376][T28998] init_file+0x5c/0x1c0 [ 658.829473][T28998] alloc_empty_file+0x8b/0x200 [ 658.829500][T28998] alloc_file_pseudo+0xc6/0x160 [ 658.829536][T28998] __shmem_file_setup+0x1de/0x210 [ 658.829566][T28998] shmem_file_setup+0x3b/0x50 [ 658.829655][T28998] __se_sys_memfd_create+0x2f7/0x6b0 [ 658.829717][T28998] __x64_sys_memfd_create+0x31/0x40 [ 658.829749][T28998] x64_sys_call+0x28cb/0x3000 [ 658.829776][T28998] do_syscall_64+0xca/0x2b0 [ 658.829874][T28998] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 658.829960][T28998] RIP: 0033:0x7fbf37bcf749 [ 658.829980][T28998] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 658.830024][T28998] RSP: 002b:00007fbf36636e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 658.830051][T28998] RAX: ffffffffffffffda RBX: 0000000000000483 RCX: 00007fbf37bcf749 [ 658.830063][T28998] RDX: 00007fbf36636ef0 RSI: 0000000000000000 RDI: 00007fbf37c54960 [ 658.830085][T28998] RBP: 0000200000001040 R08: 00007fbf36636bb7 R09: 00007fbf36636e40 [ 658.830101][T28998] R10: 000000000000000a R11: 0000000000000202 R12: 00002000000001c0 [ 658.830117][T28998] R13: 00007fbf36636ef0 R14: 00007fbf36636eb0 R15: 00002000000002c0 [ 658.830139][T28998] [ 658.856986][T28992] __nla_validate_parse: 2 callbacks suppressed [ 658.857105][T28992] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 658.930337][T29000] netlink: 12 bytes leftover after parsing attributes in process `syz.3.8503'. [ 658.998027][T28992] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 659.094051][T29004] x_tables: duplicate underflow at hook 1 [ 659.288961][T29017] netlink: 'syz.8.8513': attribute type 2 has an invalid length. [ 659.296916][T29017] netlink: 199776 bytes leftover after parsing attributes in process `syz.8.8513'. [ 659.327347][T29017] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 659.416084][T28907] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 659.921847][T29048] netlink: 8 bytes leftover after parsing attributes in process `syz.8.8523'. [ 659.941418][T29048] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8523'. [ 660.022659][T29054] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8526'. [ 660.032034][T29054] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8526'. [ 660.060974][T29060] SELinux: policydb version 1367335593 does not match my version range 15-35 [ 660.070149][T29060] SELinux: failed to load policy [ 660.078576][T29048] netlink: 16 bytes leftover after parsing attributes in process `syz.8.8523'. [ 660.142103][T29066] loop9: detected capacity change from 0 to 256 [ 660.142192][T29062] netlink: 12 bytes leftover after parsing attributes in process `syz.6.8528'. [ 660.170354][T29068] netlink: 'syz.3.8532': attribute type 1 has an invalid length. [ 660.180691][T29066] syz.9.8531: attempt to access beyond end of device [ 660.180691][T29066] loop9: rw=2049, sector=256, nr_sectors = 32 limit=256 [ 660.194476][T29066] syz.9.8531: attempt to access beyond end of device [ 660.194476][T29066] loop9: rw=2049, sector=352, nr_sectors = 36 limit=256 [ 660.316418][T29074] bridge0: port 3(gretap0) entered blocking state [ 660.323195][T29074] bridge0: port 3(gretap0) entered disabled state [ 660.351966][T29074] gretap0: entered allmulticast mode [ 660.358277][T29074] gretap0: entered promiscuous mode [ 660.370314][T29074] bridge0: port 3(gretap0) entered blocking state [ 660.376869][T29074] bridge0: port 3(gretap0) entered forwarding state [ 660.485770][T29080] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29080 comm=syz.9.8536 [ 660.599197][T29091] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8539'. [ 660.754036][T29102] syzkaller0: entered promiscuous mode [ 660.759641][T29102] syzkaller0: entered allmulticast mode [ 660.779498][T28907] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 660.846718][ T37] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 660.866103][ T37] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 660.882175][ T37] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 660.890972][ T37] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 661.366973][T29129] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 661.414948][T29129] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 661.488297][T29129] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 661.544639][T29144] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29144 comm=syz.9.8561 [ 661.593968][T29129] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 662.175042][ T267] Bluetooth: hci0: Frame reassembly failed (-84) [ 662.813696][T29183] loop9: detected capacity change from 0 to 128 [ 663.157508][T29193] batman_adv: batadv0: Interface deactivated: ipvlan2 [ 663.167767][T29193] batman_adv: batadv0: Removing interface: ipvlan2 [ 663.230122][T29196] FAULT_INJECTION: forcing a failure. [ 663.230122][T29196] name failslab, interval 1, probability 0, space 0, times 0 [ 663.242865][T29196] CPU: 1 UID: 0 PID: 29196 Comm: syz.8.8582 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 663.242894][T29196] Tainted: [W]=WARN [ 663.242900][T29196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 663.242912][T29196] Call Trace: [ 663.242925][T29196] [ 663.242932][T29196] __dump_stack+0x1d/0x30 [ 663.242956][T29196] dump_stack_lvl+0x95/0xd0 [ 663.242976][T29196] dump_stack+0x15/0x1b [ 663.242993][T29196] should_fail_ex+0x265/0x280 [ 663.243015][T29196] should_failslab+0x8c/0xb0 [ 663.243040][T29196] __kmalloc_noprof+0xb9/0x5a0 [ 663.243060][T29196] ? tcf_idr_create+0x41/0x4a0 [ 663.243090][T29196] ? radix_tree_iter_tag_clear+0x105/0x180 [ 663.243116][T29196] tcf_idr_create+0x41/0x4a0 [ 663.243279][T29196] tcf_idr_create_from_flags+0x60/0x80 [ 663.243311][T29196] tcf_ct_init+0x2ff/0xe80 [ 663.243428][T29196] ? __nla_validate_parse+0x1652/0x1d00 [ 663.243461][T29196] tcf_action_init_1+0x36a/0x4a0 [ 663.243488][T29196] tcf_action_init+0x267/0x6d0 [ 663.243560][T29196] tc_ctl_action+0x291/0x830 [ 663.243599][T29196] ? __pfx_tc_ctl_action+0x10/0x10 [ 663.243619][T29196] rtnetlink_rcv_msg+0x65a/0x6d0 [ 663.243769][T29196] netlink_rcv_skb+0x123/0x220 [ 663.243801][T29196] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 663.243841][T29196] rtnetlink_rcv+0x1c/0x30 [ 663.243909][T29196] netlink_unicast+0x5c0/0x690 [ 663.243955][T29196] netlink_sendmsg+0x58b/0x6b0 [ 663.244098][T29196] ? __pfx_netlink_sendmsg+0x10/0x10 [ 663.244186][T29196] __sock_sendmsg+0x145/0x180 [ 663.244204][T29196] ____sys_sendmsg+0x31e/0x4a0 [ 663.244233][T29196] ___sys_sendmsg+0x17b/0x1d0 [ 663.244330][T29196] __x64_sys_sendmsg+0xd4/0x160 [ 663.244360][T29196] x64_sys_call+0x17ba/0x3000 [ 663.244404][T29196] do_syscall_64+0xca/0x2b0 [ 663.244552][T29196] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 663.244571][T29196] RIP: 0033:0x7f74b442f749 [ 663.244585][T29196] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 663.244654][T29196] RSP: 002b:00007f74b2e97038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 663.244672][T29196] RAX: ffffffffffffffda RBX: 00007f74b4685fa0 RCX: 00007f74b442f749 [ 663.244683][T29196] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000006 [ 663.244694][T29196] RBP: 00007f74b2e97090 R08: 0000000000000000 R09: 0000000000000000 [ 663.244705][T29196] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 663.244717][T29196] R13: 00007f74b4686038 R14: 00007f74b4685fa0 R15: 00007fff8a822488 [ 663.244785][T29196] [ 663.549290][T29198] infiniband syz1: set down [ 663.553906][T29198] infiniband syz1: added veth0_to_bond [ 663.565887][T29198] RDS/IB: syz1: added [ 663.569931][T29198] smc: adding ib device syz1 with port count 1 [ 663.576514][T29198] smc: ib device syz1 port 1 has no pnetid [ 663.737277][ T29] kauditd_printk_skb: 571 callbacks suppressed [ 663.737295][ T29] audit: type=1326 audit(1767697122.823:69288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29206 comm="syz.9.8586" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbf37bcf749 code=0x7ffc0000 [ 663.767201][ T29] audit: type=1326 audit(1767697122.823:69289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29206 comm="syz.9.8586" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fbf37bcf749 code=0x7ffc0000 [ 663.790824][ T29] audit: type=1326 audit(1767697122.823:69290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29206 comm="syz.9.8586" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbf37bcf749 code=0x7ffc0000 [ 663.814504][ T29] audit: type=1326 audit(1767697122.823:69291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29206 comm="syz.9.8586" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbf37bcf749 code=0x7ffc0000 [ 663.838414][ T29] audit: type=1326 audit(1767697122.823:69292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29206 comm="syz.9.8586" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fbf37bcf749 code=0x7ffc0000 [ 663.862112][ T29] audit: type=1326 audit(1767697122.823:69293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29206 comm="syz.9.8586" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbf37bcf749 code=0x7ffc0000 [ 663.885938][ T29] audit: type=1326 audit(1767697122.823:69294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29206 comm="syz.9.8586" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fbf37bcf749 code=0x7ffc0000 [ 663.910125][ T29] audit: type=1326 audit(1767697122.823:69295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29206 comm="syz.9.8586" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbf37bcf749 code=0x7ffc0000 [ 663.933835][ T29] audit: type=1326 audit(1767697122.823:69296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29206 comm="syz.9.8586" exe="/root/syz-executor" sig=0 arch=c000003e syscall=137 compat=0 ip=0x7fbf37bcf749 code=0x7ffc0000 [ 663.957666][ T29] audit: type=1326 audit(1767697122.823:69297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29206 comm="syz.9.8586" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbf37bcf749 code=0x7ffc0000 [ 664.088621][ T44] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 664.092545][T22360] Bluetooth: hci0: command 0x1003 tx timeout [ 664.102574][T29229] SELinux: policydb version 1367335593 does not match my version range 15-35 [ 664.111665][T29229] SELinux: failed to load policy [ 664.193213][T29240] SELinux: policydb version 1367335593 does not match my version range 15-35 [ 664.202572][T29240] SELinux: failed to load policy [ 664.605458][T29258] __nla_validate_parse: 8 callbacks suppressed [ 664.605481][T29258] netlink: 36 bytes leftover after parsing attributes in process `syz.9.8607'. [ 664.625901][T29258] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 664.812668][T29268] loop9: detected capacity change from 0 to 1024 [ 664.820596][T29268] EXT4-fs (loop9): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 664.831625][T29268] EXT4-fs (loop9): ext4_check_descriptors: Checksum for group 0 failed (51554!=20869) [ 664.842356][T29268] JBD2: no valid journal superblock found [ 664.848343][T29268] EXT4-fs (loop9): Could not load journal inode [ 664.918842][T29275] netlink: 16 bytes leftover after parsing attributes in process `syz.8.8614'. [ 665.043048][T29286] netlink: 8 bytes leftover after parsing attributes in process `syz.8.8616'. [ 665.130867][T29299] netlink: 'syz.8.8623': attribute type 3 has an invalid length. [ 665.143754][T29299] netlink: 'syz.8.8623': attribute type 3 has an invalid length. [ 665.264264][T29311] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 665.489078][ T9796] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 665.497561][ T9796] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 665.541875][ T9796] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 665.550671][ T9796] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 665.894954][ T9795] netdevsim netdevsim9 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 665.907755][ T12] netdevsim netdevsim9 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 665.919829][ T12] netdevsim netdevsim9 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 665.944522][ T12] netdevsim netdevsim9 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 666.108970][T29386] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 666.116806][T29386] SELinux: failed to load policy [ 666.145608][T29388] netdevsim netdevsim9 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 666.220681][T29388] netdevsim netdevsim9 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 666.277906][T29388] netdevsim netdevsim9 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 666.325498][T29388] netdevsim netdevsim9 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 666.432032][T29403] netlink: 12 bytes leftover after parsing attributes in process `syz.2.8665'. [ 667.059778][T29452] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 667.069486][T29452] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 667.327983][T29460] hub 1-0:1.0: USB hub found [ 667.332725][T29460] hub 1-0:1.0: 8 ports detected [ 667.958197][T29473] netlink: 83992 bytes leftover after parsing attributes in process `syz.3.8693'. [ 667.969213][T29473] netlink: zone id is out of range [ 667.976046][T29473] netlink: zone id is out of range [ 667.982950][T29473] netlink: zone id is out of range [ 667.990754][T29473] netlink: zone id is out of range [ 668.058107][T29473] netlink: zone id is out of range [ 668.107310][T29482] SELinux: policydb version 1367335593 does not match my version range 15-35 [ 668.140301][T29482] SELinux: failed to load policy [ 668.521732][ T29] kauditd_printk_skb: 1234 callbacks suppressed [ 668.521749][ T29] audit: type=1326 audit(1767697127.884:70532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29472 comm="syz.3.8693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f0258692005 code=0x7ffc0000 [ 668.847304][T29473] netlink: set zone limit has 8 unknown bytes [ 668.875214][ T29] audit: type=1326 audit(1767697127.936:70533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29472 comm="syz.3.8693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f0258692005 code=0x7ffc0000 [ 668.898910][ T29] audit: type=1326 audit(1767697127.936:70534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29472 comm="syz.3.8693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f0258692005 code=0x7ffc0000 [ 668.922749][ T29] audit: type=1326 audit(1767697127.936:70535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29472 comm="syz.3.8693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f0258692005 code=0x7ffc0000 [ 668.946748][ T29] audit: type=1326 audit(1767697127.947:70536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29472 comm="syz.3.8693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f0258692005 code=0x7ffc0000 [ 668.970399][ T29] audit: type=1326 audit(1767697127.957:70537): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29472 comm="syz.3.8693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f0258692005 code=0x7ffc0000 [ 668.994144][ T29] audit: type=1326 audit(1767697127.957:70538): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29472 comm="syz.3.8693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f0258692005 code=0x7ffc0000 [ 669.017764][ T29] audit: type=1326 audit(1767697127.957:70539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29472 comm="syz.3.8693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f0258692005 code=0x7ffc0000 [ 669.041495][ T29] audit: type=1326 audit(1767697127.957:70540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29472 comm="syz.3.8693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f0258692005 code=0x7ffc0000 [ 669.065195][ T29] audit: type=1326 audit(1767697127.968:70541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29472 comm="syz.3.8693" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f0258692005 code=0x7ffc0000 [ 669.302543][T29512] SELinux: policydb version 1367335593 does not match my version range 15-35 [ 669.332276][T29514] serio: Serial port ptm0 [ 669.343038][T29512] SELinux: failed to load policy [ 669.458638][T29523] syzkaller0: entered promiscuous mode [ 669.464173][T29523] syzkaller0: entered allmulticast mode [ 669.480372][T29514] serio: Serial port ptm0 [ 669.518037][T29525] FAULT_INJECTION: forcing a failure. [ 669.518037][T29525] name failslab, interval 1, probability 0, space 0, times 0 [ 669.530853][T29525] CPU: 0 UID: 0 PID: 29525 Comm: syz.8.8715 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 669.530962][T29525] Tainted: [W]=WARN [ 669.530970][T29525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 669.530983][T29525] Call Trace: [ 669.530989][T29525] [ 669.530997][T29525] __dump_stack+0x1d/0x30 [ 669.531034][T29525] dump_stack_lvl+0x95/0xd0 [ 669.531056][T29525] dump_stack+0x15/0x1b [ 669.531171][T29525] should_fail_ex+0x265/0x280 [ 669.531201][T29525] should_failslab+0x8c/0xb0 [ 669.531230][T29525] kmem_cache_alloc_noprof+0x69/0x4b0 [ 669.531259][T29525] ? __anon_vma_prepare+0x70/0x2f0 [ 669.531290][T29525] ? __alloc_frozen_pages_noprof+0x18f/0x360 [ 669.531345][T29525] __anon_vma_prepare+0x70/0x2f0 [ 669.531380][T29525] do_wp_page+0x18ee/0x2510 [ 669.531508][T29525] ? css_rstat_updated+0xbb/0x280 [ 669.531553][T29525] ? __rcu_read_lock+0x37/0x50 [ 669.531583][T29525] handle_mm_fault+0x7b0/0x2c60 [ 669.531659][T29525] do_user_addr_fault+0x630/0x1080 [ 669.531736][T29525] ? ksys_mmap_pgoff+0xc2/0x310 [ 669.531766][T29525] exc_page_fault+0x62/0xa0 [ 669.531798][T29525] asm_exc_page_fault+0x26/0x30 [ 669.531825][T29525] RIP: 0033:0x7f74b42f0943 [ 669.531845][T29525] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 669.531926][T29525] RSP: 002b:00007f74b2e964a0 EFLAGS: 00010202 [ 669.531947][T29525] RAX: 0000000000000400 RBX: 00007f74b2e96540 RCX: 00007f74aaa77000 [ 669.531965][T29525] RDX: 00007f74b2e966e0 RSI: 0000000000000000 RDI: 00007f74b2e965e0 [ 669.531977][T29525] RBP: 00000000000000f9 R08: 0000000000000008 R09: 00000000000000a8 [ 669.531990][T29525] R10: 00000000000000be R11: 00007f74b2e96540 R12: 0000000000000001 [ 669.532002][T29525] R13: 00007f74b44cfc40 R14: 0000000000000020 R15: 00007f74b2e965e0 [ 669.532096][T29525] [ 669.532109][T29525] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 669.944877][T29543] SELinux: policydb version 1367335593 does not match my version range 15-35 [ 669.976456][T29543] SELinux: failed to load policy [ 670.348882][T29580] FAULT_INJECTION: forcing a failure. [ 670.348882][T29580] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 670.362626][T29580] CPU: 0 UID: 0 PID: 29580 Comm: syz.6.8728 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 670.362791][T29580] Tainted: [W]=WARN [ 670.362811][T29580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 670.362874][T29580] Call Trace: [ 670.362894][T29580] [ 670.362922][T29580] __dump_stack+0x1d/0x30 [ 670.363001][T29580] dump_stack_lvl+0x95/0xd0 [ 670.363052][T29580] dump_stack+0x15/0x1b [ 670.363164][T29580] should_fail_ex+0x265/0x280 [ 670.363248][T29580] should_fail_alloc_page+0xf2/0x100 [ 670.363287][T29580] __alloc_frozen_pages_noprof+0x109/0x360 [ 670.363439][T29580] alloc_pages_mpol+0xb3/0x260 [ 670.363557][T29580] alloc_pages_noprof+0x90/0x130 [ 670.363655][T29580] pte_alloc_one+0x1e/0xd0 [ 670.363704][T29580] __pte_alloc+0x32/0x2c0 [ 670.363738][T29580] handle_mm_fault+0x1c8e/0x2c60 [ 670.363834][T29580] do_user_addr_fault+0x630/0x1080 [ 670.363866][T29580] ? ksys_mmap_pgoff+0xc2/0x310 [ 670.363891][T29580] ? __x64_sys_mmap+0x49/0x70 [ 670.363968][T29580] exc_page_fault+0x62/0xa0 [ 670.364003][T29580] asm_exc_page_fault+0x26/0x30 [ 670.364028][T29580] RIP: 0033:0x7f60fed209e6 [ 670.364044][T29580] Code: f0 72 6e 48 63 cd 48 01 c1 49 39 4f 08 72 4c 8d 4d ff 85 ed 74 33 66 0f 1f 44 00 00 48 39 f0 72 1b 4d 8b 07 49 89 c1 49 29 f1 <47> 0f b6 0c 08 45 84 c9 74 08 45 88 0c 00 49 8b 47 10 48 83 c0 01 [ 670.364137][T29580] RSP: 002b:00007f60fd8c64a0 EFLAGS: 00010246 [ 670.364157][T29580] RAX: 0000000000000001 RBX: 00007f60fd8c6540 RCX: 0000000000000101 [ 670.364173][T29580] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 00007f60fd8c65e0 [ 670.364189][T29580] RBP: 0000000000000102 R08: 00007f60f54a7000 R09: 0000000000000000 [ 670.364232][T29580] R10: 0000000000000000 R11: 00007f60fd8c6550 R12: 0000000000000001 [ 670.364248][T29580] R13: 00007f60feeffc40 R14: 0000000000000000 R15: 00007f60fd8c65e0 [ 670.364273][T29580] [ 670.364286][T29580] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 670.674373][ T12] netdevsim netdevsim9 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 670.698759][ T9795] netdevsim netdevsim9 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 670.719213][ T9797] netdevsim netdevsim9 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 670.743671][ T9795] netdevsim netdevsim9 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 670.780545][T29600] netlink: 12 bytes leftover after parsing attributes in process `syz.6.8731'. [ 670.807988][T29600] netlink: 'syz.6.8731': attribute type 1 has an invalid length. [ 670.857989][T29608] SELinux: policydb version 1367335593 does not match my version range 15-35 [ 670.911069][T29608] SELinux: failed to load policy [ 670.983817][T29614] netlink: 132 bytes leftover after parsing attributes in process `syz.8.8732'. [ 671.586554][T29666] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 671.645705][T29666] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 671.766501][T29666] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 671.906652][T29666] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 672.028093][ T12] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 672.059730][ T12] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 672.086315][T29697] loop9: detected capacity change from 0 to 1024 [ 672.099570][ T12] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 672.101828][T29697] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 672.143113][ T12] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 672.155649][T29703] ip6gre0: entered promiscuous mode [ 672.194176][T29703] team0: Device ip6gre0 is of different type [ 672.392501][T29728] tipc: Started in network mode [ 672.397523][T29728] tipc: Node identity ac14140f, cluster identity 4711 [ 672.418359][T29728] tipc: New replicast peer: 0.0.0.0 [ 672.423853][T29728] tipc: Enabled bearer , priority 10 [ 672.502004][T29732] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 672.539096][T29732] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 672.551416][T27792] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 672.615111][ T2973] hid_parser_main: 42 callbacks suppressed [ 672.615137][ T2973] hid-generic 0000:0004:4002.000B: unknown main item tag 0x0 [ 672.639639][ T2973] hid-generic 0000:0004:4002.000B: hidraw0: HID v0.05 Device [syz1] on syz0 [ 673.171172][T29784] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 673.230624][T29784] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 673.288880][T29784] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 673.345216][T29784] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 673.381031][ T1039] tipc: Node number set to 2886997007 [ 673.440627][ T9783] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 673.466321][ T9783] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 673.482510][ T9783] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 673.503901][ T9783] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 673.556934][T29801] syzkaller0: entered promiscuous mode [ 673.562550][T29801] syzkaller0: entered allmulticast mode [ 673.576717][ T29] kauditd_printk_skb: 377 callbacks suppressed [ 673.576736][ T29] audit: type=1326 audit(1767697133.196:70919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29800 comm="syz.3.8767" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f025865f749 code=0x7ffc0000 [ 673.610053][ T29] audit: type=1326 audit(1767697133.196:70921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29800 comm="syz.3.8767" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f025865f749 code=0x7ffc0000 [ 673.633926][ T29] audit: type=1326 audit(1767697133.196:70922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29800 comm="syz.3.8767" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f025865f749 code=0x7ffc0000 [ 673.657802][ T29] audit: type=1326 audit(1767697133.196:70923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29800 comm="syz.3.8767" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f025865f749 code=0x7ffc0000 [ 673.681414][ T29] audit: type=1326 audit(1767697133.196:70920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29800 comm="syz.3.8767" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f025865f749 code=0x7ffc0000 [ 673.705258][ T29] audit: type=1326 audit(1767697133.196:70924): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29800 comm="syz.3.8767" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f025865f749 code=0x7ffc0000 [ 673.728900][ T29] audit: type=1326 audit(1767697133.196:70925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29800 comm="syz.3.8767" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f025865f749 code=0x7ffc0000 [ 673.752708][ T29] audit: type=1326 audit(1767697133.196:70926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29800 comm="syz.3.8767" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f025865f749 code=0x7ffc0000 [ 673.776380][ T29] audit: type=1326 audit(1767697133.196:70927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29800 comm="syz.3.8767" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f025865f749 code=0x7ffc0000 [ 673.800017][ T29] audit: type=1326 audit(1767697133.196:70928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29800 comm="syz.3.8767" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f025865f749 code=0x7ffc0000 [ 674.257745][T29811] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 674.277230][T29811] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 674.305773][T29821] netlink: 12 bytes leftover after parsing attributes in process `syz.8.8769'. [ 674.328177][T29823] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 674.364243][T29823] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 674.431268][T29823] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 674.488075][T29823] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 674.821926][T29832] loop9: detected capacity change from 0 to 1764 [ 674.981196][ T44] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 674.981211][T22360] Bluetooth: hci0: command 0x1003 tx timeout [ 675.231193][T29837] netlink: 64 bytes leftover after parsing attributes in process `syz.8.8780'. [ 676.064524][T29861] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8790'. [ 676.087540][T29861] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8790'. [ 676.099687][T29861] FAULT_INJECTION: forcing a failure. [ 676.099687][T29861] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 676.113009][T29861] CPU: 0 UID: 0 PID: 29861 Comm: syz.3.8790 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 676.113043][T29861] Tainted: [W]=WARN [ 676.113052][T29861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 676.113069][T29861] Call Trace: [ 676.113078][T29861] [ 676.113089][T29861] __dump_stack+0x1d/0x30 [ 676.113248][T29861] dump_stack_lvl+0x95/0xd0 [ 676.113276][T29861] dump_stack+0x15/0x1b [ 676.113300][T29861] should_fail_ex+0x265/0x280 [ 676.113362][T29861] should_fail_alloc_page+0xf2/0x100 [ 676.113394][T29861] __alloc_frozen_pages_noprof+0x109/0x360 [ 676.113440][T29861] alloc_pages_mpol+0xb3/0x260 [ 676.113492][T29861] vma_alloc_folio_noprof+0x1aa/0x300 [ 676.113528][T29861] do_wp_page+0xf60/0x2510 [ 676.113559][T29861] ? ref_tracker_free+0x37d/0x3e0 [ 676.113587][T29861] ? __rcu_read_lock+0x37/0x50 [ 676.113634][T29861] handle_mm_fault+0x7b0/0x2c60 [ 676.113681][T29861] ? __rcu_read_unlock+0x4f/0x70 [ 676.113707][T29861] ? mt_find+0x21b/0x330 [ 676.113743][T29861] do_user_addr_fault+0x3fe/0x1080 [ 676.113788][T29861] exc_page_fault+0x62/0xa0 [ 676.113823][T29861] asm_exc_page_fault+0x26/0x30 [ 676.113857][T29861] RIP: 0010:__put_user_nocheck_4+0x3/0x10 [ 676.113944][T29861] Code: d9 0f 01 cb 89 01 31 c9 0f 01 ca e9 07 9f 01 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 01 cb <89> 01 31 c9 0f 01 ca c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 [ 676.113967][T29861] RSP: 0018:ffffc90008fffb70 EFLAGS: 00050206 [ 676.113983][T29861] RAX: 0000000000000020 RBX: 0000000000000020 RCX: 0000200000007730 [ 676.113996][T29861] RDX: ffff88810d2f2100 RSI: 0000000000000fc0 RDI: 00000000ffffffff [ 676.114009][T29861] RBP: 0000000000000fc0 R08: 0001c90008fffe37 R09: 0000000000000000 [ 676.114064][T29861] R10: 0001c90008fffa24 R11: 0001c90008fffa27 R12: 0000200000007700 [ 676.114081][T29861] R13: 0000000000000000 R14: ffffc90008fffe34 R15: 0000000000000000 [ 676.114106][T29861] ____sys_recvmsg+0x1a1/0x280 [ 676.114152][T29861] ___sys_recvmsg+0x11f/0x370 [ 676.114271][T29861] do_recvmmsg+0x1ef/0x540 [ 676.114317][T29861] ? fput+0x8f/0xc0 [ 676.114349][T29861] __x64_sys_recvmmsg+0xe5/0x170 [ 676.114380][T29861] x64_sys_call+0x2b75/0x3000 [ 676.114444][T29861] do_syscall_64+0xca/0x2b0 [ 676.114486][T29861] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 676.114517][T29861] RIP: 0033:0x7f025865f749 [ 676.114612][T29861] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 676.114635][T29861] RSP: 002b:00007f02570c7038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 676.114667][T29861] RAX: ffffffffffffffda RBX: 00007f02588b5fa0 RCX: 00007f025865f749 [ 676.114701][T29861] RDX: 0000000004000267 RSI: 0000200000007700 RDI: 0000000000000006 [ 676.114717][T29861] RBP: 00007f02570c7090 R08: 0000000000000000 R09: 0000000000000000 [ 676.114734][T29861] R10: 0000000000000fc0 R11: 0000000000000246 R12: 0000000000000001 [ 676.114750][T29861] R13: 00007f02588b6038 R14: 00007f02588b5fa0 R15: 00007ffe8dd32508 [ 676.114828][T29861] [ 676.698606][T29915] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8811'. [ 676.712601][T29892] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 676.725285][T29892] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 676.816614][T29892] bridge0: entered promiscuous mode [ 676.831704][T29892] bridge0: port 4(macvtap1) entered blocking state [ 676.838479][T29892] bridge0: port 4(macvtap1) entered disabled state [ 676.858005][T29892] macvtap1: entered allmulticast mode [ 676.864091][T29892] bridge0: entered allmulticast mode [ 676.951697][T29892] macvtap1: left allmulticast mode [ 676.957320][T29892] bridge0: left allmulticast mode [ 676.982600][T29892] bridge0: left promiscuous mode [ 678.222532][T29954] IPv6: Can't replace route, no match found [ 678.644020][T29954] netlink: 8 bytes leftover after parsing attributes in process `syz.8.8822'. [ 679.650925][T29958] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=259 sclass=netlink_route_socket pid=29958 comm=syz.3.8823 [ 680.442067][ T29] kauditd_printk_skb: 44 callbacks suppressed [ 680.442086][ T29] audit: type=1400 audit(1767697140.399:70973): avc: denied { connect } for pid=30000 comm="syz.2.8833" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 680.479623][T30016] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 680.507632][ T29] audit: type=1326 audit(1767697140.472:70974): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30011 comm="syz.8.8834" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f74b442f749 code=0x7ffc0000 [ 680.535240][T30009] netlink: 576 bytes leftover after parsing attributes in process `syz.2.8833'. [ 680.544450][T30016] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 680.552726][T30016] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 680.579655][ T29] audit: type=1326 audit(1767697140.493:70975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30011 comm="syz.8.8834" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f74b442f749 code=0x7ffc0000 [ 680.596404][T30016] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 680.603595][ T29] audit: type=1326 audit(1767697140.493:70976): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30011 comm="syz.8.8834" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f74b442f749 code=0x7ffc0000 [ 680.635392][ T29] audit: type=1326 audit(1767697140.493:70977): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30011 comm="syz.8.8834" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f74b442f749 code=0x7ffc0000 [ 680.659140][ T29] audit: type=1326 audit(1767697140.504:70978): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30011 comm="syz.8.8834" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f74b442f749 code=0x7ffc0000 [ 680.682804][ T29] audit: type=1326 audit(1767697140.504:70979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30011 comm="syz.8.8834" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f74b442f749 code=0x7ffc0000 [ 680.706686][ T29] audit: type=1326 audit(1767697140.504:70980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30011 comm="syz.8.8834" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f74b442f749 code=0x7ffc0000 [ 680.730317][ T29] audit: type=1326 audit(1767697140.504:70981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30011 comm="syz.8.8834" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f74b442f749 code=0x7ffc0000 [ 680.753925][ T29] audit: type=1326 audit(1767697140.504:70982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30011 comm="syz.8.8834" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f74b442f749 code=0x7ffc0000 [ 680.810559][T30028] netlink: 'syz.9.8835': attribute type 13 has an invalid length. [ 680.833302][T30028] bridge0: port 3(gretap0) entered disabled state [ 680.912417][T30028] bridge0: port 2(bridge_slave_1) entered disabled state [ 680.919737][T30028] bridge0: port 1(bridge_slave_0) entered disabled state [ 680.971508][T30028] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 680.999389][T30028] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 681.067942][T30040] : renamed from bond0 (while UP) [ 681.076677][T30007] netdevsim netdevsim9 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 681.085363][T30007] netdevsim netdevsim9 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 681.115584][T30007] netdevsim netdevsim9 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 681.118990][T30044] netlink: 3 bytes leftover after parsing attributes in process `syz.8.8843'. [ 681.124035][T30007] netdevsim netdevsim9 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 681.144230][T30044] 0ªX¹¦À: renamed from caif0 [ 681.151365][T30044] 0ªX¹¦À: entered allmulticast mode [ 681.157050][T30044] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 681.261781][T30058] FAULT_INJECTION: forcing a failure. [ 681.261781][T30058] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 681.275818][T30058] CPU: 1 UID: 0 PID: 30058 Comm: syz.3.8850 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 681.275863][T30058] Tainted: [W]=WARN [ 681.275873][T30058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 681.275888][T30058] Call Trace: [ 681.275936][T30058] [ 681.275948][T30058] __dump_stack+0x1d/0x30 [ 681.275983][T30058] dump_stack_lvl+0x95/0xd0 [ 681.276011][T30058] dump_stack+0x15/0x1b [ 681.276036][T30058] should_fail_ex+0x265/0x280 [ 681.276128][T30058] should_fail_alloc_page+0xf2/0x100 [ 681.276239][T30058] __alloc_frozen_pages_noprof+0x109/0x360 [ 681.276279][T30058] alloc_pages_mpol+0xb3/0x260 [ 681.276312][T30058] vma_alloc_folio_noprof+0x1aa/0x300 [ 681.276363][T30058] do_wp_page+0xf60/0x2510 [ 681.276406][T30058] ? selinux_socket_sendmsg+0x175/0x1b0 [ 681.276443][T30058] ? __rcu_read_lock+0x37/0x50 [ 681.276475][T30058] handle_mm_fault+0x7b0/0x2c60 [ 681.276514][T30058] ? __rcu_read_unlock+0x4f/0x70 [ 681.276536][T30058] ? mt_find+0x21b/0x330 [ 681.276648][T30058] do_user_addr_fault+0x3fe/0x1080 [ 681.276693][T30058] exc_page_fault+0x62/0xa0 [ 681.276726][T30058] asm_exc_page_fault+0x26/0x30 [ 681.276814][T30058] RIP: 0010:__put_user_4+0xd/0x20 [ 681.276857][T30058] Code: 66 89 01 31 c9 0f 01 ca c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 48 89 cb 48 c1 fb 3f 48 09 d9 0f 01 cb <89> 01 31 c9 0f 01 ca e9 07 9f 01 00 90 90 90 90 90 90 90 90 90 90 [ 681.276942][T30058] RSP: 0018:ffffc90011443d70 EFLAGS: 00050202 [ 681.276965][T30058] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000200000001c38 [ 681.276979][T30058] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 681.276991][T30058] RBP: 0000000000040840 R08: 0001c90011443bf7 R09: 0000000000000000 [ 681.277003][T30058] R10: 000188813b152c00 R11: 000188813b152cef R12: 0000000000000000 [ 681.277016][T30058] R13: 0000200000001c00 R14: 0000200000001c00 R15: 0000000000000158 [ 681.277116][T30058] __sys_sendmmsg+0x19b/0x300 [ 681.277165][T30058] __x64_sys_sendmmsg+0x57/0x70 [ 681.277194][T30058] x64_sys_call+0x1e28/0x3000 [ 681.277225][T30058] do_syscall_64+0xca/0x2b0 [ 681.277345][T30058] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 681.277367][T30058] RIP: 0033:0x7f025865f749 [ 681.277383][T30058] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 681.277402][T30058] RSP: 002b:00007f02570c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 681.277424][T30058] RAX: ffffffffffffffda RBX: 00007f02588b5fa0 RCX: 00007f025865f749 [ 681.277441][T30058] RDX: 0400000000000159 RSI: 0000200000001c00 RDI: 0000000000000003 [ 681.277505][T30058] RBP: 00007f02570c7090 R08: 0000000000000000 R09: 0000000000000000 [ 681.277522][T30058] R10: 0000000000040840 R11: 0000000000000246 R12: 0000000000000001 [ 681.277576][T30058] R13: 00007f02588b6038 R14: 00007f02588b5fa0 R15: 00007ffe8dd32508 [ 681.277597][T30058] [ 681.647295][T30067] netlink: 68 bytes leftover after parsing attributes in process `syz.9.8854'. [ 681.744229][T30042] FAULT_INJECTION: forcing a failure. [ 681.744229][T30042] name failslab, interval 1, probability 0, space 0, times 0 [ 681.757060][T30042] CPU: 1 UID: 0 PID: 30042 Comm: syz.6.8842 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 681.757097][T30042] Tainted: [W]=WARN [ 681.757106][T30042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 681.757122][T30042] Call Trace: [ 681.757131][T30042] [ 681.757173][T30042] __dump_stack+0x1d/0x30 [ 681.757202][T30042] dump_stack_lvl+0x95/0xd0 [ 681.757227][T30042] dump_stack+0x15/0x1b [ 681.757258][T30042] should_fail_ex+0x265/0x280 [ 681.757282][T30042] should_failslab+0x8c/0xb0 [ 681.757307][T30042] __kvmalloc_node_noprof+0x149/0x6b0 [ 681.757340][T30042] ? xt_alloc_entry_offsets+0x4d/0x60 [ 681.757401][T30042] ? refill_obj_stock+0x275/0x2e0 [ 681.757437][T30042] xt_alloc_entry_offsets+0x4d/0x60 [ 681.757468][T30042] translate_table+0xa9/0xf90 [ 681.757488][T30042] ? __rcu_read_unlock+0x4f/0x70 [ 681.757537][T30042] ? should_fail_ex+0xdb/0x280 [ 681.757567][T30042] ? _copy_from_user+0x89/0xb0 [ 681.757703][T30042] do_ipt_set_ctl+0x66f/0x820 [ 681.757723][T30042] ? __local_bh_enable_ip+0x70/0x80 [ 681.757762][T30042] ? _raw_spin_unlock_bh+0x36/0x40 [ 681.757800][T30042] ? tcp_release_cb+0xf1/0x370 [ 681.757841][T30042] ? __local_bh_enable_ip+0x70/0x80 [ 681.757889][T30042] nf_setsockopt+0x199/0x1b0 [ 681.757998][T30042] ip_setsockopt+0x102/0x110 [ 681.758040][T30042] tcp_setsockopt+0x98/0xb0 [ 681.758079][T30042] sock_common_setsockopt+0x69/0x80 [ 681.758101][T30042] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 681.758144][T30042] __sys_setsockopt+0x184/0x200 [ 681.758180][T30042] __x64_sys_setsockopt+0x64/0x80 [ 681.758214][T30042] x64_sys_call+0x21d5/0x3000 [ 681.758289][T30042] do_syscall_64+0xca/0x2b0 [ 681.758382][T30042] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 681.758411][T30042] RIP: 0033:0x7f60fee5f749 [ 681.758468][T30042] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 681.758491][T30042] RSP: 002b:00007f60fd8c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 681.758578][T30042] RAX: ffffffffffffffda RBX: 00007f60ff0b5fa0 RCX: 00007f60fee5f749 [ 681.758590][T30042] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000007 [ 681.758603][T30042] RBP: 00007f60fd8c7090 R08: 0000000000000480 R09: 0000000000000000 [ 681.758621][T30042] R10: 0000200000000480 R11: 0000000000000246 R12: 0000000000000001 [ 681.758637][T30042] R13: 00007f60ff0b6038 R14: 00007f60ff0b5fa0 R15: 00007ffc9f81d028 [ 681.758663][T30042] [ 682.015759][T30075] unsupported nla_type 52263 [ 682.024565][T30075] loop9: detected capacity change from 0 to 512 [ 682.110172][T30087] netlink: 'syz.9.8861': attribute type 39 has an invalid length. [ 682.135808][T30092] netlink: 'syz.6.8863': attribute type 10 has an invalid length. [ 682.147198][T30092] team0: Failed to send options change via netlink (err -105) [ 682.154838][T30092] team0: Port device dummy0 added [ 682.160353][T30092] netlink: 'syz.6.8863': attribute type 10 has an invalid length. [ 682.169185][T30092] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 682.179531][T30092] team0: Failed to send options change via netlink (err -105) [ 682.187352][T30092] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 682.196406][T30092] team0: Port device dummy0 removed [ 682.204256][T30092] : (slave dummy0): Enslaving as an active interface with an up link [ 682.232014][T30096] syzkaller0: entered promiscuous mode [ 682.237602][T30096] syzkaller0: entered allmulticast mode [ 682.274858][T30100] FAULT_INJECTION: forcing a failure. [ 682.274858][T30100] name failslab, interval 1, probability 0, space 0, times 0 [ 682.287767][T30100] CPU: 1 UID: 0 PID: 30100 Comm: syz.6.8867 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 682.287806][T30100] Tainted: [W]=WARN [ 682.287819][T30100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 682.287834][T30100] Call Trace: [ 682.287840][T30100] [ 682.287849][T30100] __dump_stack+0x1d/0x30 [ 682.287876][T30100] dump_stack_lvl+0x95/0xd0 [ 682.287899][T30100] dump_stack+0x15/0x1b [ 682.287996][T30100] should_fail_ex+0x265/0x280 [ 682.288022][T30100] should_failslab+0x8c/0xb0 [ 682.288046][T30100] __kvmalloc_node_noprof+0x149/0x6b0 [ 682.288142][T30100] ? xt_alloc_entry_offsets+0x4d/0x60 [ 682.288180][T30100] xt_alloc_entry_offsets+0x4d/0x60 [ 682.288213][T30100] translate_table+0xa9/0x1070 [ 682.288238][T30100] ? __rcu_read_unlock+0x4f/0x70 [ 682.288416][T30100] ? should_fail_ex+0xdb/0x280 [ 682.288440][T30100] ? _copy_from_user+0x89/0xb0 [ 682.288470][T30100] do_ip6t_set_ctl+0x678/0x840 [ 682.288493][T30100] ? kstrtoull+0x111/0x140 [ 682.288512][T30100] ? __rcu_read_unlock+0x4f/0x70 [ 682.288554][T30100] nf_setsockopt+0x199/0x1b0 [ 682.288582][T30100] ipv6_setsockopt+0x11a/0x130 [ 682.288653][T30100] tcp_setsockopt+0x98/0xb0 [ 682.288729][T30100] sock_common_setsockopt+0x69/0x80 [ 682.288763][T30100] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 682.288785][T30100] __sys_setsockopt+0x184/0x200 [ 682.288867][T30100] __x64_sys_setsockopt+0x64/0x80 [ 682.288895][T30100] x64_sys_call+0x21d5/0x3000 [ 682.288921][T30100] do_syscall_64+0xca/0x2b0 [ 682.289031][T30100] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 682.289054][T30100] RIP: 0033:0x7f60fee5f749 [ 682.289086][T30100] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 682.289143][T30100] RSP: 002b:00007f60fd8c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 682.289164][T30100] RAX: ffffffffffffffda RBX: 00007f60ff0b5fa0 RCX: 00007f60fee5f749 [ 682.289177][T30100] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000003 [ 682.289190][T30100] RBP: 00007f60fd8c7090 R08: 00000000000003c0 R09: 0000000000000000 [ 682.289204][T30100] R10: 0000200000001040 R11: 0000000000000246 R12: 0000000000000001 [ 682.289217][T30100] R13: 00007f60ff0b6038 R14: 00007f60ff0b5fa0 R15: 00007ffc9f81d028 [ 682.289313][T30100] [ 682.726016][T30104] netlink: 'syz.6.8868': attribute type 2 has an invalid length. [ 682.733843][T30104] netlink: 132 bytes leftover after parsing attributes in process `syz.6.8868'. [ 682.834002][T30118] program syz.8.8871 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 683.106624][ T10] IPVS: starting estimator thread 0... [ 683.200870][T30137] IPVS: using max 1728 ests per chain, 86400 per kthread [ 683.635577][T30149] FAULT_INJECTION: forcing a failure. [ 683.635577][T30149] name failslab, interval 1, probability 0, space 0, times 0 [ 683.648328][T30149] CPU: 1 UID: 0 PID: 30149 Comm: syz.2.8883 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 683.648371][T30149] Tainted: [W]=WARN [ 683.648381][T30149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 683.648398][T30149] Call Trace: [ 683.648406][T30149] [ 683.648415][T30149] __dump_stack+0x1d/0x30 [ 683.648507][T30149] dump_stack_lvl+0x95/0xd0 [ 683.648530][T30149] dump_stack+0x15/0x1b [ 683.648552][T30149] should_fail_ex+0x265/0x280 [ 683.648583][T30149] should_failslab+0x8c/0xb0 [ 683.648642][T30149] __kmalloc_cache_noprof+0x65/0x4c0 [ 683.648673][T30149] ? __xdp_reg_mem_model+0x173/0x3e0 [ 683.648728][T30149] __xdp_reg_mem_model+0x173/0x3e0 [ 683.648759][T30149] xdp_reg_mem_model+0x22/0x40 [ 683.648888][T30149] bpf_test_run_xdp_live+0x177/0x11d0 [ 683.648972][T30149] ? __pfx_wait_rcu_exp_gp+0x10/0x10 [ 683.649002][T30149] ? __pfx_autoremove_wake_function+0x10/0x10 [ 683.649049][T30149] ? mutex_unlock+0x4f/0x90 [ 683.649076][T30149] ? 0xffffffffa0205080 [ 683.649140][T30149] ? bpf_dispatcher_change_prog+0x6ec/0x7f0 [ 683.649196][T30149] ? 0xffffffffa0205080 [ 683.649288][T30149] ? __pfx_xdp_test_run_init_page+0x10/0x10 [ 683.649384][T30149] bpf_prog_test_run_xdp+0x525/0x970 [ 683.649445][T30149] ? __rcu_read_unlock+0x4f/0x70 [ 683.649473][T30149] ? __pfx_bpf_prog_test_run_xdp+0x10/0x10 [ 683.649510][T30149] bpf_prog_test_run+0x204/0x340 [ 683.649553][T30149] __sys_bpf+0x4c0/0x7c0 [ 683.649590][T30149] __x64_sys_bpf+0x41/0x50 [ 683.649624][T30149] x64_sys_call+0x28e1/0x3000 [ 683.649700][T30149] do_syscall_64+0xca/0x2b0 [ 683.649746][T30149] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 683.649784][T30149] RIP: 0033:0x7f229e4af749 [ 683.649800][T30149] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 683.649883][T30149] RSP: 002b:00007f229cf17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 683.649908][T30149] RAX: ffffffffffffffda RBX: 00007f229e705fa0 RCX: 00007f229e4af749 [ 683.649926][T30149] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 000000000000000a [ 683.649943][T30149] RBP: 00007f229cf17090 R08: 0000000000000000 R09: 0000000000000000 [ 683.649960][T30149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 683.649972][T30149] R13: 00007f229e706038 R14: 00007f229e705fa0 R15: 00007ffd093951f8 [ 683.649998][T30149] [ 684.004377][T30153] netlink: 188 bytes leftover after parsing attributes in process `syz.8.8885'. [ 684.079257][T30158] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8192 sclass=netlink_route_socket pid=30158 comm=syz.8.8885 [ 684.133299][T30158] netlink: 188 bytes leftover after parsing attributes in process `syz.8.8885'. [ 684.289466][T30176] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 684.347000][T30176] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 684.403510][T30176] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 684.460729][T30176] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 684.523606][T30184] netlink: 300 bytes leftover after parsing attributes in process `syz.9.8894'. [ 684.643513][T30190] FAULT_INJECTION: forcing a failure. [ 684.643513][T30190] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 684.656843][T30190] CPU: 0 UID: 0 PID: 30190 Comm: syz.9.8897 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 684.656905][T30190] Tainted: [W]=WARN [ 684.656911][T30190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 684.656923][T30190] Call Trace: [ 684.656929][T30190] [ 684.656938][T30190] __dump_stack+0x1d/0x30 [ 684.657038][T30190] dump_stack_lvl+0x95/0xd0 [ 684.657058][T30190] dump_stack+0x15/0x1b [ 684.657075][T30190] should_fail_ex+0x265/0x280 [ 684.657117][T30190] should_fail_alloc_page+0xf2/0x100 [ 684.657149][T30190] __alloc_frozen_pages_noprof+0x109/0x360 [ 684.657258][T30190] alloc_pages_mpol+0xb3/0x260 [ 684.657294][T30190] vma_alloc_folio_noprof+0x1aa/0x300 [ 684.657323][T30190] do_wp_page+0xf60/0x2510 [ 684.657358][T30190] ? css_rstat_updated+0xbb/0x280 [ 684.657425][T30190] ? __rcu_read_lock+0x37/0x50 [ 684.657445][T30190] handle_mm_fault+0x7b0/0x2c60 [ 684.657542][T30190] ? __rcu_read_unlock+0x4f/0x70 [ 684.657560][T30190] ? mt_find+0x21b/0x330 [ 684.657585][T30190] do_user_addr_fault+0x3fe/0x1080 [ 684.657680][T30190] exc_page_fault+0x62/0xa0 [ 684.657704][T30190] asm_exc_page_fault+0x26/0x30 [ 684.657723][T30190] RIP: 0010:rep_movs_alternative+0x4a/0x90 [ 684.657746][T30190] Code: 17 02 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 48 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 db 83 f9 08 73 e8 eb c5 a4 c3 cc cc cc cc 48 8b 06 48 89 07 48 8d 47 08 48 83 e0 f8 48 [ 684.657825][T30190] RSP: 0018:ffffc9000163bd68 EFLAGS: 00050206 [ 684.657868][T30190] RAX: ffff8881008cab90 RBX: 000000000000b161 RCX: 00000000000098e1 [ 684.657879][T30190] RDX: 0000000000000000 RSI: ffff888171321880 RDI: 0000200000003000 [ 684.657890][T30190] RBP: 000000000000b161 R08: 000000000000039a R09: 0000000000000000 [ 684.657901][T30190] R10: 0001888171320000 R11: 000188817132b160 R12: 000020000000c8e1 [ 684.657913][T30190] R13: 00007ffffffff000 R14: 0000200000001780 R15: ffff888171320000 [ 684.657957][T30190] _copy_to_user+0x7c/0xa0 [ 684.657983][T30190] map_lookup_elem+0x467/0x570 [ 684.658004][T30190] __sys_bpf+0x3b9/0x7c0 [ 684.658029][T30190] __x64_sys_bpf+0x41/0x50 [ 684.658057][T30190] x64_sys_call+0x28e1/0x3000 [ 684.658109][T30190] do_syscall_64+0xca/0x2b0 [ 684.658150][T30190] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 684.658177][T30190] RIP: 0033:0x7fbf37bcf749 [ 684.658195][T30190] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 684.658268][T30190] RSP: 002b:00007fbf36637038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 684.658284][T30190] RAX: ffffffffffffffda RBX: 00007fbf37e25fa0 RCX: 00007fbf37bcf749 [ 684.658295][T30190] RDX: 0000000000000020 RSI: 0000200000001200 RDI: 0000000000000001 [ 684.658307][T30190] RBP: 00007fbf36637090 R08: 0000000000000000 R09: 0000000000000000 [ 684.658317][T30190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 684.658349][T30190] R13: 00007fbf37e26038 R14: 00007fbf37e25fa0 R15: 00007ffc416386a8 [ 684.658367][T30190] [ 685.130655][T30204] SELinux: policydb version 1367335593 does not match my version range 15-35 [ 685.162689][T30204] SELinux: failed to load policy [ 685.239875][T30214] netlink: 188 bytes leftover after parsing attributes in process `syz.8.8909'. [ 685.293536][ T1039] IPVS: starting estimator thread 0... [ 685.317229][T30223] IPVS: sh: SCTP 172.20.20.187:0 - no destination available [ 685.325482][T30229] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8192 sclass=netlink_route_socket pid=30229 comm=syz.8.8909 [ 685.339223][T30229] netlink: 188 bytes leftover after parsing attributes in process `syz.8.8909'. [ 685.354163][ T29] kauditd_printk_skb: 266 callbacks suppressed [ 685.354188][ T29] audit: type=1326 audit(1767697145.564:71247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30222 comm="syz.9.8913" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbf37bcf749 code=0x7ffc0000 [ 685.384412][ T29] audit: type=1326 audit(1767697145.564:71248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30222 comm="syz.9.8913" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fbf37bcf749 code=0x7ffc0000 [ 685.408038][T30224] IPVS: using max 1728 ests per chain, 86400 per kthread [ 685.415318][ T29] audit: type=1326 audit(1767697145.564:71249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30222 comm="syz.9.8913" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbf37bcf749 code=0x7ffc0000 [ 685.438945][ T29] audit: type=1326 audit(1767697145.564:71250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30222 comm="syz.9.8913" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbf37bcf749 code=0x7ffc0000 [ 685.462745][ T29] audit: type=1326 audit(1767697145.564:71251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30222 comm="syz.9.8913" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fbf37bcf749 code=0x7ffc0000 [ 685.486455][ T29] audit: type=1326 audit(1767697145.564:71252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30222 comm="syz.9.8913" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbf37bcf749 code=0x7ffc0000 [ 685.510242][ T29] audit: type=1326 audit(1767697145.564:71253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30222 comm="syz.9.8913" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbf37bcf749 code=0x7ffc0000 [ 685.534031][ T29] audit: type=1326 audit(1767697145.564:71254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30222 comm="syz.9.8913" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fbf37bcf749 code=0x7ffc0000 [ 685.557758][ T29] audit: type=1326 audit(1767697145.564:71255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30222 comm="syz.9.8913" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbf37bcf749 code=0x7ffc0000 [ 685.581670][ T29] audit: type=1326 audit(1767697145.564:71256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30222 comm="syz.9.8913" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fbf37bcf749 code=0x7ffc0000 [ 686.804572][T30275] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 686.984732][T30292] netlink: 188 bytes leftover after parsing attributes in process `syz.9.8937'. [ 687.043627][T30293] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8192 sclass=netlink_route_socket pid=30293 comm=syz.9.8937 [ 687.056914][T30293] netlink: 188 bytes leftover after parsing attributes in process `syz.9.8937'. [ 687.289842][T30297] FAULT_INJECTION: forcing a failure. [ 687.289842][T30297] name failslab, interval 1, probability 0, space 0, times 0 [ 687.302668][T30297] CPU: 0 UID: 0 PID: 30297 Comm: syz.3.8939 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 687.302768][T30297] Tainted: [W]=WARN [ 687.302779][T30297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 687.302796][T30297] Call Trace: [ 687.302806][T30297] [ 687.302817][T30297] __dump_stack+0x1d/0x30 [ 687.302853][T30297] dump_stack_lvl+0x95/0xd0 [ 687.302882][T30297] dump_stack+0x15/0x1b [ 687.302966][T30297] should_fail_ex+0x265/0x280 [ 687.302995][T30297] should_failslab+0x8c/0xb0 [ 687.303023][T30297] kmem_cache_alloc_node_noprof+0x6b/0x4c0 [ 687.303129][T30297] ? __alloc_skb+0x2ff/0x4b0 [ 687.303161][T30297] __alloc_skb+0x2ff/0x4b0 [ 687.303191][T30297] ? __alloc_skb+0x228/0x4b0 [ 687.303274][T30297] netlink_alloc_large_skb+0xbf/0xf0 [ 687.303306][T30297] netlink_sendmsg+0x3cf/0x6b0 [ 687.303340][T30297] ? __pfx_netlink_sendmsg+0x10/0x10 [ 687.303438][T30297] __sock_sendmsg+0x145/0x180 [ 687.303464][T30297] ____sys_sendmsg+0x31e/0x4a0 [ 687.303498][T30297] ___sys_sendmsg+0x17b/0x1d0 [ 687.303552][T30297] __x64_sys_sendmsg+0xd4/0x160 [ 687.303609][T30297] x64_sys_call+0x17ba/0x3000 [ 687.303634][T30297] do_syscall_64+0xca/0x2b0 [ 687.303678][T30297] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 687.303744][T30297] RIP: 0033:0x7f025865f749 [ 687.303761][T30297] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 687.303780][T30297] RSP: 002b:00007f02570c7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 687.303800][T30297] RAX: ffffffffffffffda RBX: 00007f02588b5fa0 RCX: 00007f025865f749 [ 687.303818][T30297] RDX: 0000000060044084 RSI: 0000200000000000 RDI: 0000000000000005 [ 687.303835][T30297] RBP: 00007f02570c7090 R08: 0000000000000000 R09: 0000000000000000 [ 687.303852][T30297] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 687.303946][T30297] R13: 00007f02588b6038 R14: 00007f02588b5fa0 R15: 00007ffe8dd32508 [ 687.303971][T30297] [ 687.579524][T30301] netlink: 'syz.3.8940': attribute type 13 has an invalid length. [ 687.594645][T30301] gretap0: refused to change device tx_queue_len [ 687.602832][T30301] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 687.646221][T30006] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 687.659587][T30006] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 687.687380][T30006] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 687.708797][T30006] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 688.066135][T30326] $Hÿ: renamed from  [ 688.085033][T30326] $Hÿ: entered promiscuous mode [ 688.103166][T30330] SELinux: policydb version 1367335593 does not match my version range 15-35 [ 688.114062][T30330] SELinux: failed to load policy [ 688.133492][T30331] loop9: detected capacity change from 0 to 1024 [ 688.152771][T30331] EXT4-fs: Ignoring removed nomblk_io_submit option [ 688.178281][T30333] syzkaller0: entered promiscuous mode [ 688.183926][T30333] syzkaller0: entered allmulticast mode [ 688.190170][T30331] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 688.428841][T30363] FAULT_INJECTION: forcing a failure. [ 688.428841][T30363] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 688.442020][T30363] CPU: 0 UID: 0 PID: 30363 Comm: syz.6.8963 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 688.442070][T30363] Tainted: [W]=WARN [ 688.442080][T30363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 688.442098][T30363] Call Trace: [ 688.442108][T30363] [ 688.442120][T30363] __dump_stack+0x1d/0x30 [ 688.442159][T30363] dump_stack_lvl+0x95/0xd0 [ 688.442186][T30363] dump_stack+0x15/0x1b [ 688.442220][T30363] should_fail_ex+0x265/0x280 [ 688.442251][T30363] should_fail+0xb/0x20 [ 688.442275][T30363] should_fail_usercopy+0x1a/0x20 [ 688.442367][T30363] _copy_from_user+0x1c/0xb0 [ 688.442401][T30363] ucma_resolve_ip+0x4a/0x1e0 [ 688.442445][T30363] ucma_write+0x1b3/0x250 [ 688.442476][T30363] vfs_writev+0x406/0x8b0 [ 688.442510][T30363] ? __pfx_ucma_write+0x10/0x10 [ 688.442556][T30363] do_writev+0xe7/0x210 [ 688.442647][T30363] __x64_sys_writev+0x45/0x50 [ 688.442739][T30363] x64_sys_call+0x1ba5/0x3000 [ 688.442897][T30363] do_syscall_64+0xca/0x2b0 [ 688.442933][T30363] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 688.442956][T30363] RIP: 0033:0x7f60fee5f749 [ 688.442976][T30363] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 688.443000][T30363] RSP: 002b:00007f60fd8a6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 688.443051][T30363] RAX: ffffffffffffffda RBX: 00007f60ff0b6090 RCX: 00007f60fee5f749 [ 688.443068][T30363] RDX: 0000000000000002 RSI: 0000200000000040 RDI: 000000000000000f [ 688.443082][T30363] RBP: 00007f60fd8a6090 R08: 0000000000000000 R09: 0000000000000000 [ 688.443095][T30363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 688.443107][T30363] R13: 00007f60ff0b6128 R14: 00007f60ff0b6090 R15: 00007ffc9f81d028 [ 688.443130][T30363] [ 688.479602][T30364] netlink: 12 bytes leftover after parsing attributes in process `syz.8.8961'. [ 688.847064][T27792] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 688.926249][T30375] loop9: detected capacity change from 0 to 512 [ 688.934235][T30375] EXT4-fs (loop9): mounting ext3 file system using the ext4 subsystem [ 688.942913][T30375] EXT4-fs error (device loop9): ext4_get_journal_inode:5849: comm syz.9.8968: inode #1792: comm syz.9.8968: iget: illegal inode # [ 688.956853][T30375] EXT4-fs (loop9): Remounting filesystem read-only [ 688.963557][T30375] EXT4-fs (loop9): no journal found [ 688.968810][T30375] EXT4-fs (loop9): can't get journal size [ 688.975557][T30375] EXT4-fs (loop9): warning: mounting fs with errors, running e2fsck is recommended [ 688.985296][T30375] EXT4-fs (loop9): Errors on filesystem, clearing orphan list. [ 688.993543][T30375] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 689.017553][T27792] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 689.051709][T30382] netlink: 12 bytes leftover after parsing attributes in process `syz.3.8969'. [ 689.089104][T30384] syzkaller0: entered promiscuous mode [ 689.094751][T30384] syzkaller0: entered allmulticast mode [ 690.049449][T30416] ucma_write: process 145 (syz.2.8980) changed security contexts after opening file descriptor, this is not allowed. [ 690.144247][T30427] syzkaller0: entered promiscuous mode [ 690.150215][T30427] syzkaller0: entered allmulticast mode [ 690.164842][ T29] kauditd_printk_skb: 140 callbacks suppressed [ 690.164859][ T29] audit: type=1326 audit(1767697150.614:71397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30425 comm="syz.3.8986" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f025865f749 code=0x7ffc0000 [ 690.195719][ T29] audit: type=1326 audit(1767697150.614:71398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30425 comm="syz.3.8986" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f025865f749 code=0x7ffc0000 [ 690.219666][ T29] audit: type=1326 audit(1767697150.614:71399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30425 comm="syz.3.8986" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f025865f749 code=0x7ffc0000 [ 690.231974][T30429] netlink: 12 bytes leftover after parsing attributes in process `syz.9.8984'. [ 690.243373][ T29] audit: type=1326 audit(1767697150.614:71400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30425 comm="syz.3.8986" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f025865f749 code=0x7ffc0000 [ 690.243412][ T29] audit: type=1326 audit(1767697150.614:71401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30425 comm="syz.3.8986" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f025865f749 code=0x7ffc0000 [ 690.243446][ T29] audit: type=1326 audit(1767697150.614:71402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30425 comm="syz.3.8986" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f025865f749 code=0x7ffc0000 [ 690.243494][ T29] audit: type=1326 audit(1767697150.614:71403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30425 comm="syz.3.8986" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f025865f749 code=0x7ffc0000 [ 690.243528][ T29] audit: type=1326 audit(1767697150.614:71404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30425 comm="syz.3.8986" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f025865f749 code=0x7ffc0000 [ 690.346002][T30430] Set syz1 is full, maxelem 2 reached [ 690.346939][ T29] audit: type=1326 audit(1767697150.614:71405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30425 comm="syz.3.8986" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f025865f749 code=0x7ffc0000 [ 690.399684][ T29] audit: type=1326 audit(1767697150.614:71406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30425 comm="syz.3.8986" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f025865f749 code=0x7ffc0000 [ 690.827412][T30461] syzkaller0: entered promiscuous mode [ 690.833067][T30461] syzkaller0: entered allmulticast mode [ 690.892421][T30466] netlink: 'syz.8.8999': attribute type 4 has an invalid length. [ 690.987479][T30471] FAULT_INJECTION: forcing a failure. [ 690.987479][T30471] name failslab, interval 1, probability 0, space 0, times 0 [ 691.000336][T30471] CPU: 0 UID: 0 PID: 30471 Comm: syz.3.9001 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 691.000381][T30471] Tainted: [W]=WARN [ 691.000390][T30471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 691.000480][T30471] Call Trace: [ 691.000491][T30471] [ 691.000566][T30471] __dump_stack+0x1d/0x30 [ 691.000601][T30471] dump_stack_lvl+0x95/0xd0 [ 691.000700][T30471] dump_stack+0x15/0x1b [ 691.000724][T30471] should_fail_ex+0x265/0x280 [ 691.000752][T30471] should_failslab+0x8c/0xb0 [ 691.000776][T30471] kmem_cache_alloc_node_noprof+0x6b/0x4c0 [ 691.000864][T30471] ? __alloc_skb+0x2ff/0x4b0 [ 691.000931][T30471] __alloc_skb+0x2ff/0x4b0 [ 691.000960][T30471] ? __alloc_skb+0x228/0x4b0 [ 691.000997][T30471] audit_log_start+0x3a0/0x720 [ 691.001025][T30471] ? kstrtouint+0x76/0xc0 [ 691.001096][T30471] audit_seccomp+0x48/0x100 [ 691.001136][T30471] ? __seccomp_filter+0x832/0x1260 [ 691.001174][T30471] __seccomp_filter+0x843/0x1260 [ 691.001213][T30471] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 691.001286][T30471] ? vfs_write+0x7e8/0x960 [ 691.001317][T30471] __secure_computing+0x82/0x150 [ 691.001351][T30471] syscall_trace_enter+0xcf/0x1e0 [ 691.001384][T30471] do_syscall_64+0xa4/0x2b0 [ 691.001476][T30471] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 691.001504][T30471] RIP: 0033:0x7f025865f749 [ 691.001524][T30471] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 691.001548][T30471] RSP: 002b:00007f02570c7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000e2 [ 691.001607][T30471] RAX: ffffffffffffffda RBX: 00007f02588b5fa0 RCX: 00007f025865f749 [ 691.001623][T30471] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 691.001677][T30471] RBP: 00007f02570c7090 R08: 0000000000000000 R09: 0000000000000000 [ 691.001691][T30471] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 691.001703][T30471] R13: 00007f02588b6038 R14: 00007f02588b5fa0 R15: 00007ffe8dd32508 [ 691.001722][T30471] [ 691.279865][T30479] FAULT_INJECTION: forcing a failure. [ 691.279865][T30479] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 691.293042][T30479] CPU: 1 UID: 0 PID: 30479 Comm: syz.8.9004 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 691.293085][T30479] Tainted: [W]=WARN [ 691.293095][T30479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 691.293111][T30479] Call Trace: [ 691.293176][T30479] [ 691.293187][T30479] __dump_stack+0x1d/0x30 [ 691.293296][T30479] dump_stack_lvl+0x95/0xd0 [ 691.293325][T30479] dump_stack+0x15/0x1b [ 691.293351][T30479] should_fail_ex+0x265/0x280 [ 691.293382][T30479] should_fail+0xb/0x20 [ 691.293408][T30479] should_fail_usercopy+0x1a/0x20 [ 691.293439][T30479] strncpy_from_user+0x27/0x260 [ 691.293484][T30479] getname_flags+0xae/0x3b0 [ 691.293572][T30479] __x64_sys_renameat2+0x6c/0x90 [ 691.293604][T30479] x64_sys_call+0x35f/0x3000 [ 691.293637][T30479] do_syscall_64+0xca/0x2b0 [ 691.293746][T30479] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 691.293775][T30479] RIP: 0033:0x7f74b442f749 [ 691.293795][T30479] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 691.293814][T30479] RSP: 002b:00007f74b2e97038 EFLAGS: 00000246 ORIG_RAX: 000000000000013c [ 691.293846][T30479] RAX: ffffffffffffffda RBX: 00007f74b4685fa0 RCX: 00007f74b442f749 [ 691.293863][T30479] RDX: ffffffffffffff9c RSI: 0000200000000440 RDI: ffffffffffffff9c [ 691.293879][T30479] RBP: 00007f74b2e97090 R08: 0000000000000000 R09: 0000000000000000 [ 691.293926][T30479] R10: 0000200000000140 R11: 0000000000000246 R12: 0000000000000001 [ 691.293948][T30479] R13: 00007f74b4686038 R14: 00007f74b4685fa0 R15: 00007fff8a822488 [ 691.293979][T30479] [ 691.500353][T30494] bridge: RTM_NEWNEIGH bridge0 with NTF_USE is not supported [ 691.630129][T30504] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 691.771261][T30527] FAULT_INJECTION: forcing a failure. [ 691.771261][T30527] name failslab, interval 1, probability 0, space 0, times 0 [ 691.784125][T30527] CPU: 0 UID: 0 PID: 30527 Comm: syz.8.9025 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 691.784176][T30527] Tainted: [W]=WARN [ 691.784185][T30527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 691.784200][T30527] Call Trace: [ 691.784209][T30527] [ 691.784291][T30527] __dump_stack+0x1d/0x30 [ 691.784323][T30527] dump_stack_lvl+0x95/0xd0 [ 691.784349][T30527] dump_stack+0x15/0x1b [ 691.784378][T30527] should_fail_ex+0x265/0x280 [ 691.784404][T30527] should_failslab+0x8c/0xb0 [ 691.784429][T30527] kmem_cache_alloc_noprof+0x69/0x4b0 [ 691.784459][T30527] ? security_file_alloc+0x32/0x100 [ 691.784540][T30527] security_file_alloc+0x32/0x100 [ 691.784568][T30527] init_file+0x5c/0x1c0 [ 691.784598][T30527] alloc_empty_file+0x8b/0x200 [ 691.784659][T30527] alloc_file_pseudo+0xc6/0x160 [ 691.784768][T30527] __shmem_file_setup+0x1de/0x210 [ 691.784799][T30527] shmem_file_setup+0x3b/0x50 [ 691.784826][T30527] __se_sys_memfd_create+0x2f7/0x6b0 [ 691.784909][T30527] __x64_sys_memfd_create+0x31/0x40 [ 691.784986][T30527] x64_sys_call+0x28cb/0x3000 [ 691.785016][T30527] do_syscall_64+0xca/0x2b0 [ 691.785076][T30527] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 691.785101][T30527] RIP: 0033:0x7f74b442f749 [ 691.785120][T30527] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 691.785213][T30527] RSP: 002b:00007f74b2e96e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 691.785237][T30527] RAX: ffffffffffffffda RBX: 0000000000000483 RCX: 00007f74b442f749 [ 691.785251][T30527] RDX: 00007f74b2e96ef0 RSI: 0000000000000000 RDI: 00007f74b44b4960 [ 691.785266][T30527] RBP: 0000200000001040 R08: 00007f74b2e96bb7 R09: 00007f74b2e96e40 [ 691.785280][T30527] R10: 000000000000000a R11: 0000000000000202 R12: 00002000000001c0 [ 691.785294][T30527] R13: 00007f74b2e96ef0 R14: 00007f74b2e96eb0 R15: 00002000000002c0 [ 691.785316][T30527] [ 692.124903][T30545] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 692.176863][T30549] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30549 comm=syz.6.9033 [ 692.454674][T30565] netlink: 3 bytes leftover after parsing attributes in process `syz.2.9039'. [ 692.516003][T30565] 0ªX¹¦À: renamed from caif0 [ 692.520891][T30565] FAULT_INJECTION: forcing a failure. [ 692.520891][T30565] name failslab, interval 1, probability 0, space 0, times 0 [ 692.533738][T30565] CPU: 0 UID: 0 PID: 30565 Comm: syz.2.9039 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 692.533807][T30565] Tainted: [W]=WARN [ 692.533816][T30565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 692.533834][T30565] Call Trace: [ 692.533842][T30565] [ 692.533851][T30565] __dump_stack+0x1d/0x30 [ 692.533887][T30565] dump_stack_lvl+0x95/0xd0 [ 692.533928][T30565] dump_stack+0x15/0x1b [ 692.533954][T30565] should_fail_ex+0x265/0x280 [ 692.533979][T30565] should_failslab+0x8c/0xb0 [ 692.534014][T30565] kmem_cache_alloc_node_noprof+0x6b/0x4c0 [ 692.534081][T30565] ? __alloc_skb+0x2ff/0x4b0 [ 692.534113][T30565] __alloc_skb+0x2ff/0x4b0 [ 692.534179][T30565] ? __alloc_skb+0x228/0x4b0 [ 692.534210][T30565] alloc_uevent_skb+0x5c/0x120 [ 692.534272][T30565] kobject_uevent_net_broadcast+0xfb/0x410 [ 692.534301][T30565] kobject_uevent_env+0x43d/0x570 [ 692.534332][T30565] kobject_rename+0x2d3/0x350 [ 692.534410][T30565] ? sysfs_rename_link_ns+0x106/0x120 [ 692.534456][T30565] device_rename+0x11f/0x180 [ 692.534483][T30565] netif_change_name+0x1d7/0x720 [ 692.534608][T30565] ? css_rstat_updated+0xbb/0x280 [ 692.534714][T30565] ? nla_strscpy+0xec/0x120 [ 692.534778][T30565] do_setlink+0x710/0x2780 [ 692.534886][T30565] ? _raw_spin_unlock+0x26/0x50 [ 692.534915][T30565] ? finish_task_switch+0x7a/0x2a0 [ 692.534954][T30565] ? __schedule+0x85f/0xcd0 [ 692.534987][T30565] rtnl_setlink+0x341/0x490 [ 692.535053][T30565] ? selinux_capable+0x31/0x40 [ 692.535083][T30565] ? security_capable+0x83/0x90 [ 692.535128][T30565] ? ns_capable+0x7d/0xb0 [ 692.535164][T30565] ? __pfx_rtnl_setlink+0x10/0x10 [ 692.535189][T30565] rtnetlink_rcv_msg+0x5fe/0x6d0 [ 692.535237][T30565] netlink_rcv_skb+0x123/0x220 [ 692.535300][T30565] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 692.535431][T30565] rtnetlink_rcv+0x1c/0x30 [ 692.535469][T30565] netlink_unicast+0x5c0/0x690 [ 692.535508][T30565] netlink_sendmsg+0x58b/0x6b0 [ 692.535556][T30565] ? __pfx_netlink_sendmsg+0x10/0x10 [ 692.535601][T30565] __sock_sendmsg+0x145/0x180 [ 692.535628][T30565] sock_write_iter+0x1a7/0x1f0 [ 692.535718][T30565] do_iter_readv_writev+0x4a1/0x540 [ 692.535750][T30565] vfs_writev+0x2df/0x8b0 [ 692.535790][T30565] do_writev+0xe7/0x210 [ 692.535826][T30565] __x64_sys_writev+0x45/0x50 [ 692.535856][T30565] x64_sys_call+0x1ba5/0x3000 [ 692.535949][T30565] do_syscall_64+0xca/0x2b0 [ 692.536000][T30565] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 692.536067][T30565] RIP: 0033:0x7f229e4af749 [ 692.536083][T30565] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 692.536107][T30565] RSP: 002b:00007f229cf17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 692.536132][T30565] RAX: ffffffffffffffda RBX: 00007f229e705fa0 RCX: 00007f229e4af749 [ 692.536150][T30565] RDX: 0000000000000001 RSI: 00002000000000c0 RDI: 0000000000000003 [ 692.536167][T30565] RBP: 00007f229cf17090 R08: 0000000000000000 R09: 0000000000000000 [ 692.536225][T30565] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 692.536242][T30565] R13: 00007f229e706038 R14: 00007f229e705fa0 R15: 00007ffd093951f8 [ 692.536268][T30565] [ 692.975734][T30565] 0ªX¹¦À: entered allmulticast mode [ 692.980993][T30565] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 693.020264][T30579] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 694.108617][T30643] FAULT_INJECTION: forcing a failure. [ 694.108617][T30643] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 694.121828][T30643] CPU: 0 UID: 0 PID: 30643 Comm: syz.8.9070 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 694.121870][T30643] Tainted: [W]=WARN [ 694.121880][T30643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 694.121969][T30643] Call Trace: [ 694.121975][T30643] [ 694.121984][T30643] __dump_stack+0x1d/0x30 [ 694.122008][T30643] dump_stack_lvl+0x95/0xd0 [ 694.122032][T30643] dump_stack+0x15/0x1b [ 694.122119][T30643] should_fail_ex+0x265/0x280 [ 694.122145][T30643] should_fail+0xb/0x20 [ 694.122164][T30643] should_fail_usercopy+0x1a/0x20 [ 694.122188][T30643] _copy_to_user+0x20/0xa0 [ 694.122284][T30643] simple_read_from_buffer+0xb5/0x130 [ 694.122313][T30643] proc_fail_nth_read+0x10e/0x150 [ 694.122344][T30643] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 694.122413][T30643] vfs_read+0x1a8/0x770 [ 694.122434][T30643] ? lockref_put_return+0xf7/0x130 [ 694.122521][T30643] ? __rcu_read_unlock+0x4f/0x70 [ 694.122574][T30643] ? __fget_files+0x184/0x1c0 [ 694.122596][T30643] ? mutex_lock+0x58/0x90 [ 694.122628][T30643] ksys_read+0xda/0x1a0 [ 694.122654][T30643] __x64_sys_read+0x40/0x50 [ 694.122728][T30643] x64_sys_call+0x2889/0x3000 [ 694.122753][T30643] do_syscall_64+0xca/0x2b0 [ 694.122849][T30643] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 694.122871][T30643] RIP: 0033:0x7f74b442e15c [ 694.122887][T30643] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 694.122906][T30643] RSP: 002b:00007f74b2e97030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 694.122963][T30643] RAX: ffffffffffffffda RBX: 00007f74b4685fa0 RCX: 00007f74b442e15c [ 694.122980][T30643] RDX: 000000000000000f RSI: 00007f74b2e970a0 RDI: 0000000000000004 [ 694.122996][T30643] RBP: 00007f74b2e97090 R08: 0000000000000000 R09: 0000000000000000 [ 694.123011][T30643] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 694.123026][T30643] R13: 00007f74b4686038 R14: 00007f74b4685fa0 R15: 00007fff8a822488 [ 694.123056][T30643] [ 694.147443][T30646] netlink: 'syz.9.9071': attribute type 11 has an invalid length. [ 694.338233][T30646] netlink: 44 bytes leftover after parsing attributes in process `syz.9.9071'. [ 694.496156][T30674] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 694.696552][T30698] netlink: 40 bytes leftover after parsing attributes in process `syz.9.9093'. [ 694.705811][T30698] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 694.713041][T30698] IPv6: NLM_F_CREATE should be set when creating new route [ 694.720316][T30698] IPv6: NLM_F_CREATE should be set when creating new route [ 694.954686][ T29] kauditd_printk_skb: 1162 callbacks suppressed [ 694.954745][ T29] audit: type=1400 audit(1767697155.644:72567): avc: denied { create } for pid=30711 comm="syz.9.9100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 695.015929][ T29] audit: type=1400 audit(1767697155.675:72568): avc: denied { map_create } for pid=30711 comm="syz.9.9100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 695.035944][ T29] audit: type=1400 audit(1767697155.675:72569): avc: denied { prog_load } for pid=30711 comm="syz.9.9100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 695.055523][ T29] audit: type=1400 audit(1767697155.675:72570): avc: denied { prog_load } for pid=30711 comm="syz.9.9100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 695.074893][ T29] audit: type=1400 audit(1767697155.675:72571): avc: denied { create } for pid=30711 comm="syz.9.9100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 695.096264][ T29] audit: type=1400 audit(1767697155.675:72572): avc: denied { create } for pid=30711 comm="syz.9.9100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 695.113581][T30717] audit: audit_lost=15 audit_rate_limit=0 audit_backlog_limit=64 [ 695.117186][ T29] audit: type=1400 audit(1767697155.675:72573): avc: denied { setcheckreqprot } for pid=30711 comm="syz.9.9100" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=0 [ 695.124852][T30717] audit: out of memory in audit_log_start [ 695.147144][ T29] audit: type=1400 audit(1767697155.780:72574): avc: denied { read write } for pid=27792 comm="syz-executor" name="loop9" dev="devtmpfs" ino=109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 695.183982][T30715] bond2 (unregistering): Released all slaves [ 695.218360][T30722] FAULT_INJECTION: forcing a failure. [ 695.218360][T30722] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 695.231520][T30722] CPU: 0 UID: 0 PID: 30722 Comm: syz.9.9104 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 695.231623][T30722] Tainted: [W]=WARN [ 695.231629][T30722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 695.231644][T30722] Call Trace: [ 695.231716][T30722] [ 695.231724][T30722] __dump_stack+0x1d/0x30 [ 695.231761][T30722] dump_stack_lvl+0x95/0xd0 [ 695.231829][T30722] dump_stack+0x15/0x1b [ 695.231852][T30722] should_fail_ex+0x265/0x280 [ 695.231881][T30722] should_fail+0xb/0x20 [ 695.231906][T30722] should_fail_usercopy+0x1a/0x20 [ 695.231994][T30722] _copy_to_user+0x20/0xa0 [ 695.232028][T30722] simple_read_from_buffer+0xb5/0x130 [ 695.232051][T30722] proc_fail_nth_read+0x10e/0x150 [ 695.232131][T30722] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 695.232159][T30722] vfs_read+0x1a8/0x770 [ 695.232177][T30722] ? kmem_cache_free+0xe3/0x3a0 [ 695.232211][T30722] ? putname+0x90/0x100 [ 695.232247][T30722] ksys_read+0xda/0x1a0 [ 695.232266][T30722] __x64_sys_read+0x40/0x50 [ 695.232339][T30722] x64_sys_call+0x2889/0x3000 [ 695.232368][T30722] do_syscall_64+0xca/0x2b0 [ 695.232476][T30722] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 695.232504][T30722] RIP: 0033:0x7fbf37bce15c [ 695.232523][T30722] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 695.232546][T30722] RSP: 002b:00007fbf36637030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 695.232570][T30722] RAX: ffffffffffffffda RBX: 00007fbf37e25fa0 RCX: 00007fbf37bce15c [ 695.232646][T30722] RDX: 000000000000000f RSI: 00007fbf366370a0 RDI: 0000000000000003 [ 695.232658][T30722] RBP: 00007fbf36637090 R08: 0000000000000000 R09: 0000000000000000 [ 695.232670][T30722] R10: 000000000000007d R11: 0000000000000246 R12: 0000000000000001 [ 695.232683][T30722] R13: 00007fbf37e26038 R14: 00007fbf37e25fa0 R15: 00007ffc416386a8 [ 695.232767][T30722] [ 695.525936][T30741] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 696.688780][T30819] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 696.707190][T30820] netlink: 4 bytes leftover after parsing attributes in process `syz.2.9142'. [ 697.307894][T30833] netlink: 4 bytes leftover after parsing attributes in process `syz.3.9148'. [ 697.580077][T30852] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 697.826575][T30865] netlink: 71 bytes leftover after parsing attributes in process `syz.6.9162'. [ 698.241528][T30877] netlink: 96 bytes leftover after parsing attributes in process `syz.9.9167'. [ 698.384168][T30887] vlan2: entered promiscuous mode [ 698.389278][T30887] bridge0: entered promiscuous mode [ 698.465956][T30892] netlink: 24 bytes leftover after parsing attributes in process `syz.6.9173'. [ 698.502722][T30892] netlink: 24 bytes leftover after parsing attributes in process `syz.6.9173'. [ 698.535840][T30892] netlink: 24 bytes leftover after parsing attributes in process `syz.6.9173'. [ 698.555319][T30892] netlink: 24 bytes leftover after parsing attributes in process `syz.6.9173'. [ 698.605986][T30892] netlink: 24 bytes leftover after parsing attributes in process `syz.6.9173'. [ 698.618923][T30892] netlink: 24 bytes leftover after parsing attributes in process `syz.6.9173'. [ 698.640225][T30892] netlink: 24 bytes leftover after parsing attributes in process `syz.6.9173'. [ 698.705799][T30912] syzkaller0: entered promiscuous mode [ 698.711404][T30912] syzkaller0: entered allmulticast mode [ 698.853134][ T3429] Process accounting resumed [ 699.094225][T30924] FAULT_INJECTION: forcing a failure. [ 699.094225][T30924] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 699.107687][T30924] CPU: 0 UID: 0 PID: 30924 Comm: syz.3.9185 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 699.107798][T30924] Tainted: [W]=WARN [ 699.107809][T30924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 699.107828][T30924] Call Trace: [ 699.107838][T30924] [ 699.107850][T30924] __dump_stack+0x1d/0x30 [ 699.107886][T30924] dump_stack_lvl+0x95/0xd0 [ 699.107915][T30924] dump_stack+0x15/0x1b [ 699.107996][T30924] should_fail_ex+0x265/0x280 [ 699.108029][T30924] should_fail+0xb/0x20 [ 699.108106][T30924] should_fail_usercopy+0x1a/0x20 [ 699.108138][T30924] _copy_from_user+0x1c/0xb0 [ 699.108176][T30924] kstrtouint_from_user+0x69/0xf0 [ 699.108251][T30924] ? 0xffffffff81000000 [ 699.108338][T30924] ? selinux_file_permission+0x1e2/0x320 [ 699.108391][T30924] proc_fail_nth_write+0x50/0x160 [ 699.108426][T30924] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 699.108460][T30924] vfs_write+0x269/0x960 [ 699.108522][T30924] ? vfs_read+0x4e6/0x770 [ 699.108611][T30924] ? __rcu_read_unlock+0x4f/0x70 [ 699.108688][T30924] ? __fget_files+0x184/0x1c0 [ 699.108715][T30924] ? mutex_lock+0x58/0x90 [ 699.108820][T30924] ksys_write+0xda/0x1a0 [ 699.108848][T30924] __x64_sys_write+0x40/0x50 [ 699.108872][T30924] x64_sys_call+0x2847/0x3000 [ 699.108903][T30924] do_syscall_64+0xca/0x2b0 [ 699.108940][T30924] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 699.108966][T30924] RIP: 0033:0x7f025865e1ff [ 699.108985][T30924] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 699.109009][T30924] RSP: 002b:00007f02570c7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 699.109031][T30924] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f025865e1ff [ 699.109044][T30924] RDX: 0000000000000001 RSI: 00007f02570c70a0 RDI: 0000000000000003 [ 699.109108][T30924] RBP: 00007f02570c7090 R08: 0000000000000000 R09: 0000000000000000 [ 699.109121][T30924] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 699.109133][T30924] R13: 00007f02588b6038 R14: 00007f02588b5fa0 R15: 00007ffe8dd32508 [ 699.109153][T30924] [ 699.726854][ T29] kauditd_printk_skb: 1696 callbacks suppressed [ 699.726874][ T29] audit: type=1326 audit(1767697160.652:74271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30937 comm="syz.3.9193" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f0258692005 code=0x7ffc0000 [ 699.778063][T30961] audit: audit_backlog=65 > audit_backlog_limit=64 [ 699.784687][T30961] audit: audit_lost=16 audit_rate_limit=0 audit_backlog_limit=64 [ 699.788814][ T29] audit: type=1326 audit(1767697160.652:74272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30937 comm="syz.3.9193" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f0258692005 code=0x7ffc0000 [ 699.792699][T30961] audit: backlog limit exceeded [ 699.816349][ T29] audit: type=1326 audit(1767697160.652:74273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30937 comm="syz.3.9193" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f0258692005 code=0x7ffc0000 [ 699.845142][ T29] audit: type=1326 audit(1767697160.652:74274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30937 comm="syz.3.9193" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f0258692005 code=0x7ffc0000 [ 699.869054][ T29] audit: type=1326 audit(1767697160.652:74275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30937 comm="syz.3.9193" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f0258692005 code=0x7ffc0000 [ 699.892704][ T29] audit: type=1326 audit(1767697160.652:74276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30937 comm="syz.3.9193" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f0258692005 code=0x7ffc0000 [ 699.916648][ T29] audit: type=1326 audit(1767697160.652:74277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30937 comm="syz.3.9193" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f0258692005 code=0x7ffc0000 [ 700.320645][T30976] netlink: 'syz.8.9205': attribute type 4 has an invalid length. [ 700.329401][T30976] netlink: 'syz.8.9205': attribute type 4 has an invalid length. [ 700.501395][T30979] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 700.579376][T30983] syzkaller0: entered promiscuous mode [ 700.584972][T30983] syzkaller0: entered allmulticast mode [ 700.996878][T31000] SET target dimension over the limit! [ 701.073474][T31006] syzkaller0: entered promiscuous mode [ 701.079091][T31006] syzkaller0: entered allmulticast mode [ 701.142252][T31009] ip6_tunnel: non-ECT from fc00:0000:0000:0000:0000:0000:0000:0000 with DS=0xf [ 701.286101][T31021] syzkaller0: entered promiscuous mode [ 701.292030][T31021] syzkaller0: entered allmulticast mode [ 701.431198][ T44] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 701.776187][T31037] syzkaller0: entered promiscuous mode [ 701.781730][T31037] syzkaller0: entered allmulticast mode [ 702.162685][T31059] netlink: 'syz.9.9240': attribute type 13 has an invalid length. [ 702.195022][T31064] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=31064 comm=syz.3.9243 [ 702.569712][T31098] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=31098 comm=syz.2.9256 [ 702.647694][T31101] __nla_validate_parse: 60 callbacks suppressed [ 702.647711][T31101] netlink: 4 bytes leftover after parsing attributes in process `syz.2.9257'. [ 702.927143][T31106] netlink: 8 bytes leftover after parsing attributes in process `syz.9.9259'. [ 703.164805][T31141] netlink: 8 bytes leftover after parsing attributes in process `syz.9.9274'. [ 703.247227][T31151] netlink: 4 bytes leftover after parsing attributes in process `syz.9.9274'. [ 703.443698][T31177] FAULT_INJECTION: forcing a failure. [ 703.443698][T31177] name failslab, interval 1, probability 0, space 0, times 0 [ 703.456588][T31177] CPU: 1 UID: 0 PID: 31177 Comm: syz.2.9288 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 703.456631][T31177] Tainted: [W]=WARN [ 703.456641][T31177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 703.456658][T31177] Call Trace: [ 703.456667][T31177] [ 703.456677][T31177] __dump_stack+0x1d/0x30 [ 703.456778][T31177] dump_stack_lvl+0x95/0xd0 [ 703.456808][T31177] dump_stack+0x15/0x1b [ 703.456836][T31177] should_fail_ex+0x265/0x280 [ 703.456868][T31177] should_failslab+0x8c/0xb0 [ 703.456892][T31177] kmem_cache_alloc_lru_noprof+0x6d/0x4c0 [ 703.456938][T31177] ? __d_alloc+0x37/0x340 [ 703.457023][T31177] __d_alloc+0x37/0x340 [ 703.457054][T31177] ? mpol_shared_policy_init+0xbd/0x4c0 [ 703.457173][T31177] d_alloc_pseudo+0x1e/0x80 [ 703.457218][T31177] alloc_file_pseudo+0x71/0x160 [ 703.457272][T31177] __shmem_file_setup+0x1de/0x210 [ 703.457306][T31177] shmem_file_setup+0x3b/0x50 [ 703.457331][T31177] __se_sys_memfd_create+0x2f7/0x6b0 [ 703.457390][T31177] __x64_sys_memfd_create+0x31/0x40 [ 703.457427][T31177] x64_sys_call+0x28cb/0x3000 [ 703.457460][T31177] do_syscall_64+0xca/0x2b0 [ 703.457508][T31177] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 703.457542][T31177] RIP: 0033:0x7f229e4af749 [ 703.457558][T31177] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 703.457577][T31177] RSP: 002b:00007f229cf16d68 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 703.457664][T31177] RAX: ffffffffffffffda RBX: 00000000000005c2 RCX: 00007f229e4af749 [ 703.457677][T31177] RDX: 00007f229cf16dec RSI: 0000000000000000 RDI: 00007f229e534960 [ 703.457742][T31177] RBP: 0000200000000000 R08: 00007f229cf16b07 R09: 00007f229cf1701f [ 703.457758][T31177] R10: 000000000000000a R11: 0000000000000202 R12: 0000000000000001 [ 703.457771][T31177] R13: 00007f229cf16dec R14: 00007f229cf16df0 R15: 00007ffd093951f8 [ 703.457790][T31177] [ 703.668569][T31180] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 703.675850][T31180] IPv6: NLM_F_CREATE should be set when creating new route [ 703.683092][T31180] IPv6: NLM_F_CREATE should be set when creating new route [ 703.721038][T31186] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 704.042288][T31204] FAULT_INJECTION: forcing a failure. [ 704.042288][T31204] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 704.056092][T31204] CPU: 1 UID: 0 PID: 31204 Comm: syz.6.9299 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 704.056142][T31204] Tainted: [W]=WARN [ 704.056158][T31204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 704.056234][T31204] Call Trace: [ 704.056242][T31204] [ 704.056250][T31204] __dump_stack+0x1d/0x30 [ 704.056278][T31204] dump_stack_lvl+0x95/0xd0 [ 704.056364][T31204] dump_stack+0x15/0x1b [ 704.056387][T31204] should_fail_ex+0x265/0x280 [ 704.056425][T31204] should_fail+0xb/0x20 [ 704.056449][T31204] should_fail_usercopy+0x1a/0x20 [ 704.056513][T31204] _copy_from_iter+0xcf/0xe70 [ 704.056544][T31204] ? lockref_put_return+0xf7/0x130 [ 704.056582][T31204] ? __rcu_read_unlock+0x4f/0x70 [ 704.056629][T31204] tun_get_user+0x3d0/0x2670 [ 704.056693][T31204] ? _parse_integer_limit+0x170/0x190 [ 704.056717][T31204] ? ref_tracker_alloc+0x1f2/0x2f0 [ 704.056746][T31204] ? selinux_file_permission+0x1e2/0x320 [ 704.056847][T31204] tun_chr_write_iter+0x15e/0x210 [ 704.056878][T31204] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 704.056963][T31204] vfs_write+0x52a/0x960 [ 704.057002][T31204] ksys_write+0xda/0x1a0 [ 704.057022][T31204] __x64_sys_write+0x40/0x50 [ 704.057041][T31204] x64_sys_call+0x2847/0x3000 [ 704.057070][T31204] do_syscall_64+0xca/0x2b0 [ 704.057196][T31204] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 704.057225][T31204] RIP: 0033:0x7f60fee5f749 [ 704.057242][T31204] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 704.057266][T31204] RSP: 002b:00007f60fd8c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 704.057291][T31204] RAX: ffffffffffffffda RBX: 00007f60ff0b5fa0 RCX: 00007f60fee5f749 [ 704.057333][T31204] RDX: 00000000000000dc RSI: 00002000000003c0 RDI: 0000000000000003 [ 704.057368][T31204] RBP: 00007f60fd8c7090 R08: 0000000000000000 R09: 0000000000000000 [ 704.057380][T31204] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 704.057393][T31204] R13: 00007f60ff0b6038 R14: 00007f60ff0b5fa0 R15: 00007ffc9f81d028 [ 704.057519][T31204] [ 704.309376][T31207] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 704.320959][T31207] IPVS: dh: FWM 3 0x00000003 - no destination available [ 704.327984][T31206] IPVS: set_ctl: invalid protocol: 20 0.0.0.0:256 [ 704.469525][T31230] ip6_tunnel: non-ECT from fc00:0000:0000:0000:0000:0000:0000:0000 with DS=0xf [ 704.529357][ T29] kauditd_printk_skb: 1283 callbacks suppressed [ 704.529394][ T29] audit: type=1400 audit(710.923:75561): avc: denied { create } for pid=31237 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 704.555786][ T29] audit: type=1400 audit(710.923:75562): avc: denied { create } for pid=31235 comm="syz.3.9313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 704.575224][ T29] audit: type=1400 audit(710.923:75563): avc: denied { read } for pid=31235 comm="syz.3.9313" name="mISDNtimer" dev="devtmpfs" ino=250 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 704.598107][ T29] audit: type=1400 audit(710.923:75564): avc: denied { open } for pid=31235 comm="syz.3.9313" path="/dev/mISDNtimer" dev="devtmpfs" ino=250 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 704.607559][T31241] netlink: 4 bytes leftover after parsing attributes in process `syz.8.9314'. [ 704.621232][ T29] audit: type=1400 audit(710.923:75565): avc: denied { ioctl } for pid=31235 comm="syz.3.9313" path="/dev/mISDNtimer" dev="devtmpfs" ino=250 ioctlcmd=0x4940 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 704.655081][ T29] audit: type=1400 audit(710.923:75566): avc: denied { remount } for pid=31235 comm="syz.3.9313" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 704.675167][T31238] x_tables: ip_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 704.698610][ T29] audit: type=1400 audit(710.954:75567): avc: denied { write } for pid=31237 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 704.718106][ T29] audit: type=1400 audit(710.954:75568): avc: denied { read } for pid=31237 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 704.737859][ T29] audit: type=1400 audit(710.954:75569): avc: denied { ioctl } for pid=31237 comm="+}[@" path="socket:[119247]" dev="sockfs" ino=119247 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 704.763013][ T29] audit: type=1400 audit(710.954:75570): avc: denied { module_request } for pid=31237 comm="+}[@" kmod="netdev-wpan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 704.839400][T31243] rdma_rxe: rxe_newlink: failed to add lo [ 705.034081][T23811] hid-generic 0003:0004:FFFFFFFF.000C: unknown main item tag 0x0 [ 705.041981][T23811] hid-generic 0003:0004:FFFFFFFF.000C: unknown main item tag 0x0 [ 705.049771][T23811] hid-generic 0003:0004:FFFFFFFF.000C: unknown main item tag 0x0 [ 705.057584][T23811] hid-generic 0003:0004:FFFFFFFF.000C: unknown main item tag 0x0 [ 705.065498][T23811] hid-generic 0003:0004:FFFFFFFF.000C: unknown main item tag 0x0 [ 705.073397][T23811] hid-generic 0003:0004:FFFFFFFF.000C: unknown main item tag 0x0 [ 705.081406][T23811] hid-generic 0003:0004:FFFFFFFF.000C: unknown main item tag 0x0 [ 705.089355][T23811] hid-generic 0003:0004:FFFFFFFF.000C: unknown main item tag 0x0 [ 705.097330][T23811] hid-generic 0003:0004:FFFFFFFF.000C: unknown main item tag 0x0 [ 705.105128][T23811] hid-generic 0003:0004:FFFFFFFF.000C: unknown main item tag 0x0 [ 705.583575][T31277] SELinux: failed to load policy [ 706.064933][T23811] hid-generic 0003:0004:FFFFFFFF.000C: hidraw0: USB HID v0.02 Device [syz0] on syz1 [ 706.090502][T31290] syzkaller1: entered promiscuous mode [ 706.096039][T31290] syzkaller1: entered allmulticast mode [ 706.243166][T31306] netlink: 4 bytes leftover after parsing attributes in process `syz.3.9337'. [ 706.728253][T31329] netlink: 12 bytes leftover after parsing attributes in process `syz.6.9345'. [ 706.766221][T31331] netlink: 12 bytes leftover after parsing attributes in process `syz.3.9347'. [ 706.849755][T31334] FAULT_INJECTION: forcing a failure. [ 706.849755][T31334] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 706.863130][T31334] CPU: 1 UID: 0 PID: 31334 Comm: syz.2.9348 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 706.863170][T31334] Tainted: [W]=WARN [ 706.863177][T31334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 706.863191][T31334] Call Trace: [ 706.863200][T31334] [ 706.863212][T31334] __dump_stack+0x1d/0x30 [ 706.863244][T31334] dump_stack_lvl+0x95/0xd0 [ 706.863329][T31334] dump_stack+0x15/0x1b [ 706.863355][T31334] should_fail_ex+0x265/0x280 [ 706.863386][T31334] should_fail_alloc_page+0xf2/0x100 [ 706.863510][T31334] __alloc_frozen_pages_noprof+0x109/0x360 [ 706.863545][T31334] alloc_pages_mpol+0xb3/0x260 [ 706.863573][T31334] ? css_rstat_updated+0xbb/0x280 [ 706.863617][T31334] vma_alloc_folio_noprof+0x1aa/0x300 [ 706.863668][T31334] handle_mm_fault+0xef5/0x2c60 [ 706.863730][T31334] do_user_addr_fault+0x630/0x1080 [ 706.863763][T31334] ? ksys_mmap_pgoff+0xc2/0x310 [ 706.863826][T31334] exc_page_fault+0x62/0xa0 [ 706.863855][T31334] asm_exc_page_fault+0x26/0x30 [ 706.863875][T31334] RIP: 0033:0x7f229e370943 [ 706.863897][T31334] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 706.863993][T31334] RSP: 002b:00007f229cf164a0 EFLAGS: 00010202 [ 706.864014][T31334] RAX: 0000000000002000 RBX: 00007f229cf16540 RCX: 00007f2294af7000 [ 706.864029][T31334] RDX: 00007f229cf166e0 RSI: 0000000000000000 RDI: 00007f229cf165e0 [ 706.864041][T31334] RBP: 00000000000000fb R08: 000000000000000a R09: 00000000000003dd [ 706.864054][T31334] R10: 00000000000003e2 R11: 00007f229cf16540 R12: 0000000000000001 [ 706.864066][T31334] R13: 00007f229e54fc40 R14: 000000000000000b R15: 00007f229cf165e0 [ 706.864137][T31334] [ 706.864149][T31334] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 707.265682][T31346] IPv6: NLM_F_CREATE should be specified when creating new route [ 707.509149][T31359] loop9: detected capacity change from 0 to 512 [ 707.566615][T31359] EXT4-fs: Ignoring removed oldalloc option [ 707.584986][T31362] netlink: 19 bytes leftover after parsing attributes in process `syz.2.9358'. [ 707.599397][T31359] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 707.641377][T27792] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 707.668030][T31371] loop9: detected capacity change from 0 to 512 [ 707.675500][T31371] EXT4-fs (loop9): encrypted files will use data=ordered instead of data journaling mode [ 707.696567][T31372] FAULT_INJECTION: forcing a failure. [ 707.696567][T31372] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 707.709776][T31372] CPU: 1 UID: 0 PID: 31372 Comm: syz.2.9360 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 707.709890][T31372] Tainted: [W]=WARN [ 707.709900][T31372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 707.709986][T31372] Call Trace: [ 707.709993][T31372] [ 707.710001][T31372] __dump_stack+0x1d/0x30 [ 707.710025][T31372] dump_stack_lvl+0x95/0xd0 [ 707.710052][T31372] dump_stack+0x15/0x1b [ 707.710145][T31372] should_fail_ex+0x265/0x280 [ 707.710174][T31372] should_fail+0xb/0x20 [ 707.710200][T31372] should_fail_usercopy+0x1a/0x20 [ 707.710307][T31372] _copy_from_user+0x1c/0xb0 [ 707.710406][T31372] memdup_user+0x5e/0xd0 [ 707.710429][T31372] strndup_user+0x68/0xb0 [ 707.710450][T31372] __se_sys_request_key+0xea/0x290 [ 707.710557][T31372] ? fput+0x8f/0xc0 [ 707.710598][T31372] __x64_sys_request_key+0x55/0x70 [ 707.710695][T31372] x64_sys_call+0x2321/0x3000 [ 707.710719][T31372] do_syscall_64+0xca/0x2b0 [ 707.710758][T31372] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 707.710786][T31372] RIP: 0033:0x7f229e4af749 [ 707.710805][T31372] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 707.710866][T31372] RSP: 002b:00007f229cf17038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 707.710890][T31372] RAX: ffffffffffffffda RBX: 00007f229e705fa0 RCX: 00007f229e4af749 [ 707.710906][T31372] RDX: 0000000000000000 RSI: 0000200000000440 RDI: 0000200000000400 [ 707.710922][T31372] RBP: 00007f229cf17090 R08: 0000000000000000 R09: 0000000000000000 [ 707.710938][T31372] R10: 00000000193e7537 R11: 0000000000000246 R12: 0000000000000001 [ 707.710953][T31372] R13: 00007f229e706038 R14: 00007f229e705fa0 R15: 00007ffd093951f8 [ 707.711031][T31372] [ 707.905305][T31371] EXT4-fs (loop9): 1 truncate cleaned up [ 707.914452][T31371] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 708.031016][T27792] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 708.107492][T31384] SELinux: Context system_u:object_r:pam_console_exec_t:s0 is not valid (left unmapped). [ 708.226847][T31392] FAULT_INJECTION: forcing a failure. [ 708.226847][T31392] name failslab, interval 1, probability 0, space 0, times 0 [ 708.239836][T31392] CPU: 1 UID: 0 PID: 31392 Comm: syz.9.9370 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 708.239872][T31392] Tainted: [W]=WARN [ 708.239880][T31392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 708.239906][T31392] Call Trace: [ 708.239913][T31392] [ 708.239971][T31392] __dump_stack+0x1d/0x30 [ 708.239998][T31392] dump_stack_lvl+0x95/0xd0 [ 708.240023][T31392] dump_stack+0x15/0x1b [ 708.240100][T31392] should_fail_ex+0x265/0x280 [ 708.240125][T31392] should_failslab+0x8c/0xb0 [ 708.240150][T31392] __kmalloc_cache_noprof+0x65/0x4c0 [ 708.240222][T31392] ? genl_start+0x117/0x390 [ 708.240247][T31392] genl_start+0x117/0x390 [ 708.240324][T31392] __netlink_dump_start+0x334/0x520 [ 708.240359][T31392] genl_family_rcv_msg_dumpit+0x115/0x180 [ 708.240385][T31392] ? __pfx_genl_start+0x10/0x10 [ 708.240432][T31392] ? __pfx_genl_dumpit+0x10/0x10 [ 708.240518][T31392] ? __pfx_genl_done+0x10/0x10 [ 708.240546][T31392] genl_rcv_msg+0x3f0/0x460 [ 708.240571][T31392] ? __pfx_nl80211_dump_interface+0x10/0x10 [ 708.240624][T31392] netlink_rcv_skb+0x123/0x220 [ 708.240661][T31392] ? __pfx_genl_rcv_msg+0x10/0x10 [ 708.240699][T31392] genl_rcv+0x28/0x40 [ 708.240723][T31392] netlink_unicast+0x5c0/0x690 [ 708.240806][T31392] netlink_sendmsg+0x58b/0x6b0 [ 708.240923][T31392] ? __pfx_netlink_sendmsg+0x10/0x10 [ 708.240965][T31392] __sock_sendmsg+0x145/0x180 [ 708.240990][T31392] ____sys_sendmsg+0x31e/0x4a0 [ 708.241085][T31392] ___sys_sendmsg+0x17b/0x1d0 [ 708.241146][T31392] __x64_sys_sendmsg+0xd4/0x160 [ 708.241188][T31392] x64_sys_call+0x17ba/0x3000 [ 708.241276][T31392] do_syscall_64+0xca/0x2b0 [ 708.241317][T31392] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 708.241340][T31392] RIP: 0033:0x7fbf37bcf749 [ 708.241355][T31392] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 708.241454][T31392] RSP: 002b:00007fbf36637038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 708.241474][T31392] RAX: ffffffffffffffda RBX: 00007fbf37e25fa0 RCX: 00007fbf37bcf749 [ 708.241488][T31392] RDX: 0000000024000040 RSI: 0000200000000340 RDI: 0000000000000005 [ 708.241501][T31392] RBP: 00007fbf36637090 R08: 0000000000000000 R09: 0000000000000000 [ 708.241514][T31392] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 708.241527][T31392] R13: 00007fbf37e26038 R14: 00007fbf37e25fa0 R15: 00007ffc416386a8 [ 708.241630][T31392] [ 708.549429][T31400] loop9: detected capacity change from 0 to 2048 [ 708.556496][T31400] EXT4-fs: Ignoring removed orlov option [ 708.577677][T31400] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 708.642716][T31409] netlink: 12 bytes leftover after parsing attributes in process `syz.8.9374'. [ 708.668177][T27792] EXT4-fs error (device loop9): ext4_mb_generate_buddy:1306: group 0, block bitmap and bg descriptor inconsistent: 0 vs 150994969 free clusters [ 708.688362][T27792] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 708.713365][T31413] FAULT_INJECTION: forcing a failure. [ 708.713365][T31413] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 708.726597][T31413] CPU: 1 UID: 0 PID: 31413 Comm: syz.9.9376 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 708.726640][T31413] Tainted: [W]=WARN [ 708.726654][T31413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 708.726669][T31413] Call Trace: [ 708.726678][T31413] [ 708.726687][T31413] __dump_stack+0x1d/0x30 [ 708.726755][T31413] dump_stack_lvl+0x95/0xd0 [ 708.726779][T31413] dump_stack+0x15/0x1b [ 708.726800][T31413] should_fail_ex+0x265/0x280 [ 708.726827][T31413] should_fail+0xb/0x20 [ 708.726868][T31413] should_fail_usercopy+0x1a/0x20 [ 708.726894][T31413] _copy_from_user+0x1c/0xb0 [ 708.726924][T31413] ___sys_sendmsg+0xc1/0x1d0 [ 708.727055][T31413] __sys_sendmmsg+0x178/0x300 [ 708.727098][T31413] __x64_sys_sendmmsg+0x57/0x70 [ 708.727158][T31413] x64_sys_call+0x1e28/0x3000 [ 708.727185][T31413] do_syscall_64+0xca/0x2b0 [ 708.727222][T31413] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 708.727291][T31413] RIP: 0033:0x7fbf37bcf749 [ 708.727319][T31413] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 708.727340][T31413] RSP: 002b:00007fbf36637038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 708.727362][T31413] RAX: ffffffffffffffda RBX: 00007fbf37e25fa0 RCX: 00007fbf37bcf749 [ 708.727376][T31413] RDX: 040000000000009f RSI: 00002000000002c0 RDI: 0000000000000006 [ 708.727390][T31413] RBP: 00007fbf36637090 R08: 0000000000000000 R09: 0000000000000000 [ 708.727405][T31413] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 708.727424][T31413] R13: 00007fbf37e26038 R14: 00007fbf37e25fa0 R15: 00007ffc416386a8 [ 708.727486][T31413] [ 708.996579][T31423] ip6gre0: Caught tx_queue_len zero misconfig [ 709.002768][T31423] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 709.061214][T31428] netlink: 71 bytes leftover after parsing attributes in process `syz.2.9383'. [ 709.152019][T31432] IPv6: NLM_F_CREATE should be specified when creating new route [ 709.427597][T31434] loop9: detected capacity change from 0 to 1024 [ 709.434969][T31434] EXT4-fs (loop9): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 709.445816][T31434] JBD2: no valid journal superblock found [ 709.451856][T31434] EXT4-fs (loop9): Could not load journal inode [ 709.471299][T31436] syzkaller0: entered promiscuous mode [ 709.476822][T31436] syzkaller0: entered allmulticast mode [ 709.542282][ T29] kauditd_printk_skb: 650 callbacks suppressed [ 709.542301][ T29] audit: type=1326 audit(716.187:76221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31435 comm="syz.3.9386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f025865f749 code=0x7ffc0000 [ 709.580308][T31443] netlink: 4 bytes leftover after parsing attributes in process `syz.9.9387'. [ 709.589491][ T29] audit: type=1326 audit(716.187:76222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31435 comm="syz.3.9386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f025865f749 code=0x7ffc0000 [ 709.612706][ T29] audit: type=1326 audit(716.187:76223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31435 comm="syz.3.9386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f025865f749 code=0x7ffc0000 [ 709.635821][ T29] audit: type=1326 audit(716.187:76224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31435 comm="syz.3.9386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f025865f749 code=0x7ffc0000 [ 709.658927][ T29] audit: type=1326 audit(716.187:76225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31435 comm="syz.3.9386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f025865f749 code=0x7ffc0000 [ 709.681945][ T29] audit: type=1326 audit(716.187:76226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31435 comm="syz.3.9386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f025865f749 code=0x7ffc0000 [ 709.705075][ T29] audit: type=1326 audit(716.187:76227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31435 comm="syz.3.9386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f025865f749 code=0x7ffc0000 [ 709.728256][ T29] audit: type=1326 audit(716.187:76228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31435 comm="syz.3.9386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f025865f749 code=0x7ffc0000 [ 709.751714][ T29] audit: type=1326 audit(716.187:76229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31435 comm="syz.3.9386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f025865f749 code=0x7ffc0000 [ 709.774740][ T29] audit: type=1326 audit(716.187:76230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31435 comm="syz.3.9386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f025865f749 code=0x7ffc0000 [ 709.825342][T31448] FAULT_INJECTION: forcing a failure. [ 709.825342][T31448] name failslab, interval 1, probability 0, space 0, times 0 [ 709.838513][T31448] CPU: 1 UID: 0 PID: 31448 Comm: syz.9.9389 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 709.838548][T31448] Tainted: [W]=WARN [ 709.838555][T31448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 709.838568][T31448] Call Trace: [ 709.838575][T31448] [ 709.838583][T31448] __dump_stack+0x1d/0x30 [ 709.838674][T31448] dump_stack_lvl+0x95/0xd0 [ 709.838720][T31448] dump_stack+0x15/0x1b [ 709.838745][T31448] should_fail_ex+0x265/0x280 [ 709.838770][T31448] should_failslab+0x8c/0xb0 [ 709.838798][T31448] kmem_cache_alloc_node_noprof+0x6b/0x4c0 [ 709.838831][T31448] ? alloc_vmap_area+0x241/0xea0 [ 709.838912][T31448] ? should_fail_ex+0x30/0x280 [ 709.838934][T31448] alloc_vmap_area+0x241/0xea0 [ 709.839020][T31448] ? avc_has_perm_noaudit+0xab/0x130 [ 709.839070][T31448] ? should_fail_ex+0xdb/0x280 [ 709.839101][T31448] ? __kmalloc_cache_node_noprof+0x2b3/0x4d0 [ 709.839128][T31448] __get_vm_area_node+0x173/0x1d0 [ 709.839194][T31448] __vmalloc_node_range_noprof+0x28e/0x1310 [ 709.839230][T31448] ? packet_set_ring+0x504/0x1130 [ 709.839262][T31448] ? path_openat+0x1d88/0x23b0 [ 709.839309][T31448] ? path_openat+0x1e82/0x23b0 [ 709.839352][T31448] ? alloc_pages_mpol+0x217/0x260 [ 709.839387][T31448] ? packet_set_ring+0x504/0x1130 [ 709.839491][T31448] vzalloc_noprof+0x82/0xc0 [ 709.839516][T31448] ? packet_set_ring+0x504/0x1130 [ 709.839540][T31448] packet_set_ring+0x504/0x1130 [ 709.839623][T31448] ? selinux_netlbl_socket_setsockopt+0x1f9/0x2d0 [ 709.839654][T31448] ? _raw_spin_lock_bh+0x56/0xb0 [ 709.839675][T31448] ? should_fail_ex+0xdb/0x280 [ 709.839773][T31448] ? _copy_from_user+0x89/0xb0 [ 709.839805][T31448] packet_setsockopt+0xaa7/0xfd0 [ 709.839831][T31448] ? __pfx_packet_setsockopt+0x10/0x10 [ 709.839857][T31448] __sys_setsockopt+0x184/0x200 [ 709.839977][T31448] __x64_sys_setsockopt+0x64/0x80 [ 709.840005][T31448] x64_sys_call+0x21d5/0x3000 [ 709.840098][T31448] do_syscall_64+0xca/0x2b0 [ 709.840142][T31448] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 709.840169][T31448] RIP: 0033:0x7fbf37bcf749 [ 709.840189][T31448] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 709.840314][T31448] RSP: 002b:00007fbf36637038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 709.840335][T31448] RAX: ffffffffffffffda RBX: 00007fbf37e25fa0 RCX: 00007fbf37bcf749 [ 709.840357][T31448] RDX: 0000000000000005 RSI: 0000000000000107 RDI: 0000000000000004 [ 709.840370][T31448] RBP: 00007fbf36637090 R08: 000000000000001c R09: 0000000000000000 [ 709.840388][T31448] R10: 00002000000000c0 R11: 0000000000000246 R12: 0000000000000001 [ 709.840400][T31448] R13: 00007fbf37e26038 R14: 00007fbf37e25fa0 R15: 00007ffc416386a8 [ 709.840420][T31448] [ 709.840485][T31448] warn_alloc: 1 callbacks suppressed [ 709.840498][T31448] syz.9.9389: vmalloc error: size 16777216, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 710.138034][T31448] CPU: 1 UID: 0 PID: 31448 Comm: syz.9.9389 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 710.138067][T31448] Tainted: [W]=WARN [ 710.138074][T31448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 710.138087][T31448] Call Trace: [ 710.138094][T31448] [ 710.138162][T31448] __dump_stack+0x1d/0x30 [ 710.138253][T31448] dump_stack_lvl+0x95/0xd0 [ 710.138282][T31448] dump_stack+0x15/0x1b [ 710.138348][T31448] warn_alloc+0x12b/0x1a0 [ 710.138398][T31448] __vmalloc_node_range_noprof+0x2b3/0x1310 [ 710.138438][T31448] ? path_openat+0x1d88/0x23b0 [ 710.138480][T31448] ? path_openat+0x1e82/0x23b0 [ 710.138567][T31448] ? alloc_pages_mpol+0x217/0x260 [ 710.138605][T31448] ? packet_set_ring+0x504/0x1130 [ 710.138633][T31448] vzalloc_noprof+0x82/0xc0 [ 710.138665][T31448] ? packet_set_ring+0x504/0x1130 [ 710.138691][T31448] packet_set_ring+0x504/0x1130 [ 710.138777][T31448] ? selinux_netlbl_socket_setsockopt+0x1f9/0x2d0 [ 710.138810][T31448] ? _raw_spin_lock_bh+0x56/0xb0 [ 710.138836][T31448] ? should_fail_ex+0xdb/0x280 [ 710.138865][T31448] ? _copy_from_user+0x89/0xb0 [ 710.138966][T31448] packet_setsockopt+0xaa7/0xfd0 [ 710.139001][T31448] ? __pfx_packet_setsockopt+0x10/0x10 [ 710.139028][T31448] __sys_setsockopt+0x184/0x200 [ 710.139087][T31448] __x64_sys_setsockopt+0x64/0x80 [ 710.139123][T31448] x64_sys_call+0x21d5/0x3000 [ 710.139154][T31448] do_syscall_64+0xca/0x2b0 [ 710.139206][T31448] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 710.139238][T31448] RIP: 0033:0x7fbf37bcf749 [ 710.139253][T31448] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 710.139273][T31448] RSP: 002b:00007fbf36637038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 710.139299][T31448] RAX: ffffffffffffffda RBX: 00007fbf37e25fa0 RCX: 00007fbf37bcf749 [ 710.139315][T31448] RDX: 0000000000000005 RSI: 0000000000000107 RDI: 0000000000000004 [ 710.139331][T31448] RBP: 00007fbf36637090 R08: 000000000000001c R09: 0000000000000000 [ 710.139333][T31455] ================================================================== [ 710.139347][T31448] R10: 00002000000000c0 R11: 0000000000000246 R12: 0000000000000001 [ 710.139391][T31448] R13: 00007fbf37e26038 R14: 00007fbf37e25fa0 R15: 00007ffc416386a8 [ 710.139518][T31448] [ 710.139558][T31448] Mem-Info: [ 710.151351][T31455] BUG: KCSAN: data-race in data_alloc / prb_reserve [ 710.155196][T31448] active_anon:27246 inactive_anon:56 isolated_anon:0 [ 710.155196][T31448] active_file:25781 inactive_file:3121 isolated_file:0 [ 710.155196][T31448] unevictable:10820 dirty:190 writeback:0 [ 710.155196][T31448] slab_reclaimable:3595 slab_unreclaimable:21221 [ 710.155196][T31448] mapped:31855 shmem:17784 pagetables:1546 [ 710.155196][T31448] sec_pagetables:0 bounce:0 [ 710.155196][T31448] kernel_misc_reclaimable:0 [ 710.155196][T31448] free:1760004 free_pcp:20049 free_cma:0 [ 710.165346][T31455] [ 710.165356][T31455] write to 0xffffffff8686b3e0 of 8 bytes by task 31448 on cpu 1: [ 710.165375][T31455] data_alloc+0x31c/0x390 [ 710.165404][T31455] prb_reserve+0x8d7/0xad0 [ 710.165429][T31455] vprintk_store+0x53c/0x830 [ 710.168838][T31448] Node 0 active_anon:108984kB inactive_anon:224kB active_file:103124kB inactive_file:12484kB unevictable:43280kB isolated(anon):0kB isolated(file):0kB mapped:127420kB dirty:760kB writeback:0kB shmem:71136kB kernel_stack:3888kB pagetables:6184kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 710.171762][T31455] vprintk_emit+0x15a/0x5c0 [ 710.176137][T31448] Node 0 [ 710.180697][T31455] vprintk_default+0x26/0x30 [ 710.184872][T31448] DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 710.189211][T31455] vprintk+0x1d/0x30 [ 710.189240][T31455] _printk+0x79/0xa0 [ 710.189258][T31455] __show_trace_log_lvl+0x4e3/0x560 [ 710.189291][T31455] __dump_stack+0x1d/0x30 [ 710.189316][T31455] dump_stack_lvl+0x95/0xd0 [ 710.189340][T31455] dump_stack+0x15/0x1b [ 710.189363][T31455] warn_alloc+0x12b/0x1a0 [ 710.189390][T31455] __vmalloc_node_range_noprof+0x2b3/0x1310 [ 710.189418][T31455] vzalloc_noprof+0x82/0xc0 [ 710.189445][T31455] packet_set_ring+0x504/0x1130 [ 710.189468][T31455] packet_setsockopt+0xaa7/0xfd0 [ 710.189489][T31455] __sys_setsockopt+0x184/0x200 [ 710.189519][T31455] __x64_sys_setsockopt+0x64/0x80 [ 710.189549][T31455] x64_sys_call+0x21d5/0x3000 [ 710.189580][T31455] do_syscall_64+0xca/0x2b0 [ 710.195866][T31448] lowmem_reserve[]: [ 710.200286][T31455] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 710.200314][T31455] [ 710.200320][T31455] read to 0xffffffff8686b3e0 of 8 bytes by task 31455 on cpu 0: [ 710.200336][T31455] prb_reserve+0x207/0xad0 [ 710.205183][T31448] 0 [ 710.210244][T31455] vprintk_store+0x53c/0x830 [ 710.215311][T31448] 2880 [ 710.219785][T31455] vprintk_emit+0x15a/0x5c0 [ 710.224949][T31448] 7859 [ 710.229791][T31455] vprintk_default+0x26/0x30 [ 710.236321][T31448] 7859 [ 710.241176][T31455] vprintk+0x1d/0x30 [ 710.245989][T31448] [ 710.250719][T31455] _printk+0x79/0xa0 [ 710.255712][T31448] Node 0 [ 710.261148][T31455] __nla_validate_parse+0x1738/0x1d00 [ 710.266159][T31448] DMA32 free:2945988kB boost:0kB min:4132kB low:7060kB high:9988kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:3129332kB managed:2949516kB mlocked:0kB bounce:0kB free_pcp:3528kB local_pcp:0kB free_cma:0kB [ 710.271124][T31455] __nla_validate+0x40/0x60 [ 710.275843][T31448] lowmem_reserve[]: 0 [ 710.280348][T31455] vlan_validate+0x2ad/0x450 [ 710.286473][T31448] 0 [ 710.290704][T31455] rtnl_newlink+0x87c/0x1360 [ 710.310424][T31448] 4978 [ 710.318865][T31455] rtnetlink_rcv_msg+0x5fe/0x6d0 [ 710.326880][T31448] 4978 [ 710.334912][T31455] netlink_rcv_skb+0x123/0x220 [ 710.343097][T31448] [ 710.351093][T31455] rtnetlink_rcv+0x1c/0x30 [ 710.359105][T31448] Node 0 [ 710.367071][T31455] netlink_unicast+0x5c0/0x690 [ 710.370131][T31448] Normal free:4078668kB boost:0kB min:7188kB low:12284kB high:17380kB reserved_highatomic:0KB free_highatomic:0KB active_anon:108984kB inactive_anon:224kB active_file:103124kB inactive_file:12484kB unevictable:43280kB writepending:760kB zspages:0kB present:5242880kB managed:5098240kB mlocked:43308kB bounce:0kB free_pcp:76668kB local_pcp:2924kB free_cma:0kB [ 710.373248][T31455] netlink_sendmsg+0x58b/0x6b0 [ 710.379857][T31448] lowmem_reserve[]: [ 710.425535][T31455] __sock_sendmsg+0x145/0x180 [ 710.425563][T31455] ____sys_sendmsg+0x31e/0x4a0 [ 710.425601][T31455] ___sys_sendmsg+0x17b/0x1d0 [ 710.427962][T31448] 0 0 [ 710.435681][T31455] __x64_sys_sendmsg+0xd4/0x160 [ 710.435716][T31455] x64_sys_call+0x17ba/0x3000 [ 710.435747][T31455] do_syscall_64+0xca/0x2b0 [ 710.435782][T31455] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 710.435807][T31455] [ 710.435813][T31455] value changed: 0x0000000000078738 -> 0x00000000001240c8 [ 710.435825][T31455] [ 710.435829][T31455] Reported by Kernel Concurrency Sanitizer on: [ 710.435844][T31455] CPU: 0 UID: 0 PID: 31455 Comm: syz.3.9392 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 710.435874][T31455] Tainted: [W]=WARN [ 710.435883][T31455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 710.440215][T31448] 0 0 [ 710.444636][T31455] ================================================================== [ 710.139192][T31455] netlink: 96 bytes leftover after parsing attributes in process `syz.3.9392'. [ 710.449244][T31448] [ 710.449253][T31448] Node 0 [ 710.506118][T31457] FAULT_INJECTION: forcing a failure. [ 710.506118][T31457] name failslab, interval 1, probability 0, space 0, times 0 [ 710.518471][T31448] DMA: [ 710.522409][T31457] CPU: 0 UID: 0 PID: 31457 Comm: syz.2.9393 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 710.522441][T31457] Tainted: [W]=WARN [ 710.522448][T31457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 710.522534][T31457] Call Trace: [ 710.522580][T31457] [ 710.522624][T31457] __dump_stack+0x1d/0x30 [ 710.522716][T31457] dump_stack_lvl+0x95/0xd0 [ 710.522790][T31457] dump_stack+0x15/0x1b [ 710.522862][T31457] should_fail_ex+0x265/0x280 [ 710.522948][T31457] should_failslab+0x8c/0xb0 [ 710.523024][T31457] __kmalloc_noprof+0xb9/0x5a0 [ 710.523092][T31457] ? sctp_auth_set_key+0x18a/0x4f0 [ 710.523241][T31457] ? sctp_auth_set_key+0x115/0x4f0 [ 710.523331][T31457] sctp_auth_set_key+0x18a/0x4f0 [ 710.523477][T31457] sctp_setsockopt_auth_key+0x2d7/0x3e0 [ 710.523556][T31457] sctp_setsockopt+0x4ba/0xe30 [ 710.523671][T31457] sock_common_setsockopt+0x69/0x80 [ 710.523818][T31457] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 710.523914][T31457] __sys_setsockopt+0x184/0x200 [ 710.524125][T31457] __x64_sys_setsockopt+0x64/0x80 [ 710.524211][T31457] x64_sys_call+0x21d5/0x3000 [ 710.524296][T31457] do_syscall_64+0xca/0x2b0 [ 710.524400][T31457] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 710.524481][T31457] RIP: 0033:0x7f229e4af749 [ 710.524526][T31457] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 710.524597][T31457] RSP: 002b:00007f229cf17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 710.524653][T31457] RAX: ffffffffffffffda RBX: 00007f229e705fa0 RCX: 00007f229e4af749 [ 710.524688][T31457] RDX: 0000000000000017 RSI: 0000000000000084 RDI: 0000000000000003 [ 710.524750][T31457] RBP: 00007f229cf17090 R08: 0000000000000009 R09: 0000000000000000 [ 710.524791][T31457] R10: 0000200000000540 R11: 0000000000000246 R12: 0000000000000001 [ 710.524827][T31457] R13: 00007f229e706038 R14: 00007f229e705fa0 R15: 00007ffd093951f8 [ 710.524961][T31457] [ 710.706167][T31455] vlan3: entered allmulticast mode [ 710.707536][T31448] 0*4kB 0*8kB [ 710.710471][T31455] erspan0: entered allmulticast mode [ 710.715324][T31448] 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 711.122168][T31448] Node 0 DMA32: 3*4kB (M) 3*8kB (M) 4*16kB (M) 3*32kB (M) 4*64kB (M) 2*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (M) 3*2048kB (M) 716*4096kB (M) = 2945988kB [ 711.138595][T31448] Node 0 Normal: 365*4kB (UME) 578*8kB (UME) 83*16kB (UME) 415*32kB (UME) 470*64kB (UME) 774*128kB (UME) 484*256kB (UME) 522*512kB (UM) 456*1024kB (UM) 298*2048kB (UM) 619*4096kB (UM) = 4153684kB [ 711.158066][T31448] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 711.167374][T31448] 46744 total pagecache pages [ 711.172051][T31448] 67 pages in swap cache [ 711.176464][T31448] Free swap = 124728kB [ 711.180668][T31448] Total swap = 124996kB [ 711.184903][T31448] 2097051 pages RAM [ 711.188854][T31448] 0 pages HighMem/MovableOnly [ 711.193727][T31448] 81272 pages reserved