last executing test programs: 10m4.399291751s ago: executing program 32 (id=7534): socket$kcm(0x10, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYRES32=r5, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}, 0x1, 0x0, 0x0, 0xc000}, 0x0) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300), r0) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="94000000", @ANYRES16=r6, @ANYBLOB="040029bd7000fddbdf250f0000007c00028004000400080002000d0000002c0003800800020007000000080002000f0000000800010004000000080001000400000008000200f50000003400038008000200090000000800020008000000080002000300000008000200000001000800010005000000080001000000000008000200010000000400040004000180fbae7ef00ff14c6833f5a6e2fdbc4ff12c51acbcc4de975c3ffb0f84abe733"], 0x94}, 0x1, 0x0, 0x0, 0x40081}, 0x200000d0) sendmsg$nl_route_sched(r4, 0x0, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="b80000001300e9990000000000000000fc010000000000000000000000000001", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) r8 = syz_open_dev$usbfs(&(0x7f0000000480), 0x76, 0x160341) ioctl$USBDEVFS_IOCTL(r8, 0xc0105512, &(0x7f00000000c0)) ioctl$USBDEVFS_IOCTL(r8, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect) syz_emit_ethernet(0x4e, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff0800470000400000000000069078ac1414aa0a0101020706f8156b3c00", @ANYRES32=0x41424344, @ANYBLOB="bc00000090780000040222098909e8aabd570d941e577f01"], 0x0) r9 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000380)=ANY=[@ANYBLOB="380000001b1401"], 0x38}, 0x1, 0x0, 0x0, 0x844}, 0x4840) setsockopt$sock_linger(r9, 0x1, 0xd, &(0x7f0000000140)={0x1, 0x715c}, 0xfffffffffffffd86) 9m32.220610015s ago: executing program 33 (id=7767): socket$kcm(0x10, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x0, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x8}, 0x2, 0x0, 0x10ffd, 0x8, 0x4, 0x80000011, 0x6, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}, 0x1, 0x0, 0x0, 0xc000}, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300), r0) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="94000000", @ANYRES16=r5, @ANYBLOB="040029bd7000fddbdf250f0000007c00028004000400080002000d0000002c0003800800020007000000080002000f0000000800010004000000080001000400000008000200f50000003400038008000200090000000800020008000000080002000300000008000200000001000800010005000000080001000000000008000200010000000400040004000180fbae7ef00ff14c6833f5a6e2fdbc4ff12c51acbcc4de975c3ffb0f84abe733"], 0x94}, 0x1, 0x0, 0x0, 0x40081}, 0x200000d0) sendmsg$nl_route_sched(r3, 0x0, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="b80000001300e9990000000000000000fc010000000000000000000000000001", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) r7 = syz_open_dev$usbfs(&(0x7f0000000480), 0x76, 0x160341) ioctl$USBDEVFS_IOCTL(r7, 0xc0105512, &(0x7f00000000c0)) ioctl$USBDEVFS_IOCTL(r7, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect) syz_emit_ethernet(0x4e, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff0800470000400000000000069078ac1414aa0a0101020706f8156b3c00", @ANYRES32=0x41424344, @ANYBLOB="bc00000090780000040222098909e8aabd570d941e577f01"], 0x0) r8 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000380)=ANY=[@ANYBLOB="380000001b1401"], 0x38}, 0x1, 0x0, 0x0, 0x844}, 0x4840) setsockopt$sock_linger(r8, 0x1, 0xd, &(0x7f0000000140)={0x1, 0x715c}, 0xfffffffffffffd86) 9m29.797394974s ago: executing program 34 (id=7783): socket$kcm(0x10, 0x2, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x0, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x8}, 0x2, 0x0, 0x10ffd, 0x8, 0x4, 0x80000011, 0x6, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}, 0x1, 0x0, 0x0, 0xc000}, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300), r0) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="94000000", @ANYRES16=r5, @ANYBLOB="040029bd7000fddbdf250f0000007c00028004000400080002000d0000002c0003800800020007000000080002000f0000000800010004000000080001000400000008000200f50000003400038008000200090000000800020008000000080002000300000008000200000001000800010005000000080001000000000008000200010000000400040004000180fbae7ef00ff14c6833f5a6e2fdbc4ff12c51acbcc4de975c3ffb0f84abe733"], 0x94}, 0x1, 0x0, 0x0, 0x40081}, 0x200000d0) sendmsg$nl_route_sched(r3, 0x0, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="b80000001300e9990000000000000000fc010000000000000000000000000001", @ANYRES32=0x0, @ANYRES32=0x0], 0xb8}}, 0x0) r7 = syz_open_dev$usbfs(&(0x7f0000000480), 0x76, 0x160341) ioctl$USBDEVFS_IOCTL(r7, 0xc0105512, &(0x7f00000000c0)) ioctl$USBDEVFS_IOCTL(r7, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect) syz_emit_ethernet(0x4e, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff0800470000400000000000069078ac1414aa0a0101020706f8156b3c00", @ANYRES32=0x41424344, @ANYBLOB="bc00000090780000040222098909e8aabd570d941e577f01"], 0x0) r8 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000380)=ANY=[@ANYBLOB="380000001b1401"], 0x38}, 0x1, 0x0, 0x0, 0x844}, 0x4840) setsockopt$sock_linger(r8, 0x1, 0xd, &(0x7f0000000140)={0x1, 0x715c}, 0xfffffffffffffd86) 8m29.601657761s ago: executing program 35 (id=8325): perf_event_open(&(0x7f00000004c0)={0x4, 0x80, 0x22, 0x0, 0x9, 0x4, 0x0, 0x5, 0xa16ae, 0xa, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={0x0, 0x4}, 0x8084, 0xa2, 0x3, 0x7, 0x7f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f00000026c0), 0x1, 0x0) writev(r0, 0x0, 0x0) 8m20.609008008s ago: executing program 36 (id=8517): r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, 0xffffffffffffffff) ioctl$EVIOCGKEY(r0, 0x80404518, 0x0) 8m16.177203618s ago: executing program 37 (id=8617): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x301, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x40, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x14, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}, @NFTA_HOOK_HOOKNUM={0x8}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWRULE={0x14, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}}], {0x14}}, 0x9c}}, 0x0) 8m13.806191796s ago: executing program 38 (id=8702): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="540000000906010200000000000000000500000205000100070000002c0007800c00148008000140e00000020c0001800800014064010100060004404e2000000500070088000000090002"], 0x54}, 0x1, 0x0, 0x0, 0x4000}, 0x4800) 8m10.816695773s ago: executing program 39 (id=8782): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)=@newqdisc={0x74, 0x24, 0x4ee4e6a52ff56541, 0x70bd23, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0x0, 0xb}, {0xffff, 0xffff}, {0xf}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0x3, 0x3, 0x6361, 0x81, 0xfffffffd, 0x3}}}}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x5, 0x7, 0x6b, 0x80000003, 0x2, 0x2, 0x5, 0x1}}, {0x6, 0x2, [0x3]}}]}]}, 0x74}}, 0x0) sendmsg$nl_route_sched(r2, 0x0, 0x4890) r4 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r4, &(0x7f0000000240)="800000800000210ee7decd7a0000", 0xe, 0x40, &(0x7f00000001c0)={0x11, 0x8100, r3, 0x1, 0xd8, 0x6, @broadcast}, 0x14) 8m7.404775893s ago: executing program 40 (id=8861): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000000c0)={0xfffc, 0xc}, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x1e, &(0x7f00000001c0)=[@in6={0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x8}]}, &(0x7f0000000640)=0x10) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000140)=0x8) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x1000002, 0x31, 0xffffffffffffffff, 0xf679000) 8m6.541921886s ago: executing program 41 (id=8885): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(0x0, r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)={0x50, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5, 0x3, 0x2}, {0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x3}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}]}, 0x50}, 0x1, 0x0, 0x0, 0x24004080}, 0x80) 7m59.80730993s ago: executing program 42 (id=8988): socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="19000000041300000400"/19], 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002d80)={0xffffffffffffffff, 0xe0, &(0x7f0000002c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002a40), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a, 0x8, 0x8, &(0x7f0000002c40)}}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB, @ANYBLOB], 0x134}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x59, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'syz_tun\x00'}) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_emit_ethernet(0x16, &(0x7f00000007c0)={@local, @broadcast, @void, {@llc={0x4, {@snap={0x1, 0xaa, "b5", "f9aec5"}}}}}, 0x0) 7m52.489775593s ago: executing program 43 (id=9093): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000"], 0x7c}, 0x1, 0x0, 0x0, 0x8080}, 0x20004450) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWRULE={0x80, 0x6, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_EXPRESSIONS={0x54, 0x4, 0x0, 0x1, [{0x34, 0x1, 0x0, 0x1, @payload={{0xc}, @val={0x24, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_DREG={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_PAYLOAD_OFFSET={0x8, 0x3, 0x1, 0x0, 0x4f}, @NFTA_PAYLOAD_LEN={0x8, 0x4, 0x1, 0x0, 0x39}, @NFTA_PAYLOAD_BASE={0x8, 0x2, 0x1, 0x0, 0x2}]}}}, {0x1c, 0x1, 0x0, 0x1, @redir={{0xa}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_REDIR_REG_PROTO_MIN={0x8, 0x1, 0x1, 0x0, 0xa}]}}}]}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0xa8}, 0x1, 0x0, 0x0, 0x40}, 0x24000840) 7m45.608033834s ago: executing program 44 (id=9247): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0xa2f01, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000200"/16], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2d}, 0x94) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000004c0)={'syzkaller1\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000200)={r2, r4, 0x25, 0x2, @void}, 0x10) write$tun(r0, &(0x7f00000003c0)={@void, @void, @eth={@multicast, @remote, @void, {@ipv6={0x86dd, @generic={0x4, 0x6, "90e818", 0x0, 0x2, 0x0, @private0, @remote}}}}}, 0x36) 7m35.728530755s ago: executing program 45 (id=9590): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="7800000010000304000000000000000000007400", @ANYRES32=0x0, @ANYBLOB="00000000600000005800128008000100677470004c00028008000100"], 0x78}}, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) write$tun(r0, &(0x7f0000000100)={@val={0x8, 0x800}, @val={0x7, 0x0, 0x0, 0x0, 0x14}, @ipv4=@udp={{0x5, 0x4, 0x3, 0x1b, 0x5c, 0x66, 0x0, 0x2, 0x11, 0x0, @private=0xa010102, @dev={0xac, 0x14, 0x14, 0x12}}, {0x4e24, 0x4e20, 0x48, 0x0, @wg=@cookie={0x3, 0x4, "ad6f2e797c9821a3b38eeaea9597d008ba813e8171f6c745", "f5ed35bdf4f5540a80c4eccdc85598ce658825e40ca848831da8f614bc9921fc"}}}}, 0x6a) 7m26.936822331s ago: executing program 46 (id=9878): r0 = socket(0x840000000002, 0x3, 0x100) connect$inet(r0, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000005240), 0x4000095, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, 0x0, 0x0) 7m26.651168905s ago: executing program 47 (id=9889): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r2) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) close(r4) r5 = socket$unix(0x1, 0x1, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {0x0, 0xb}, {0xffff, 0xffff}, {0x0, 0xe}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0x100, 0x3, 0x6361, 0x5, 0xfffffffd, 0xfffffff3}}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc04c001}, 0x20000804) sendmsg$nl_route_sched(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)=@newqdisc={0x30, 0x24, 0x4ee4e6a52ff56541, 0x70b923, 0x80000, {0x0, 0x0, 0x0, r7, {0x0, 0xe}, {0xfff2, 0xb}, {0xd, 0xd}}, [@qdisc_kind_options=@q_fq={{0x7}, {0x4}}]}, 0x30}, 0x1, 0x0, 0x0, 0x240081d4}, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) 7m26.16247295s ago: executing program 48 (id=9900): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x70bd26, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18, 0x2, {0x3, 0x8, 0x4}}]}}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x20040084) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) sendmsg$nl_route_sched(r4, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400dc}, 0x0) r6 = socket(0x400000000010, 0x3, 0x0) r7 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000940)=@delqdisc={0x24, 0x25, 0x1, 0x70bd25, 0x25dfdbfc, {0x0, 0x0, 0x0, r8, {}, {0x0, 0xfff1}, {0xfff4, 0xfff1}}}, 0x24}, 0x1, 0x0, 0x0, 0x20001005}, 0x20040080) 6m32.961758969s ago: executing program 49 (id=11055): syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101b01) socket$inet6(0xa, 0x800000000000002, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_tables_names\x00') syz_usb_connect(0x0, 0x5a, &(0x7f00000000c0)=ANY=[@ANYBLOB="12010000ec13b2106d04f308280b0102030109024800010000000009046900000e0100002b4101", @ANYRESHEX=0x0, @ANYRES64=r0], 0x0) 3m31.37725244s ago: executing program 50 (id=13609): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="c40000001900674c2cbd70000000000000000000000000000000000000000000ac1eff0100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0100000000000000000000000000000000000020000000000000000000000000000000000000000000008000000000000000000000000000fcffffffffffffff0000000000000000b0ac00000000000000000000000000000000000000000000000400000000000000000002000000000a00100001"], 0xc4}}, 0x4c050) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c01000013000100000000000000000000000000000000000000000000000001ffffffff0000000000000000000000000000000d040000090a00000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="020000000000000000000000000000000000000000000000ffffffffffffffff00000000000000000300000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000feffffff000000000000000000000000840005000a010100000000000000000000000000000000002b0000000a000000ac1414aa0000000000000000000000000000000002000000040000007f00000000000000fc020000000000000000000000000000000000002b"], 0x13c}}, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r1, &(0x7f0000000080)=ANY=[], 0xfdef) 3m25.903342702s ago: executing program 51 (id=13674): r0 = socket(0x840000000002, 0x3, 0x100) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) sendmmsg$inet(r0, &(0x7f0000005240), 0x4000095, 0x0) 3m24.959281229s ago: executing program 52 (id=13681): sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="8d283272e64fc9c6aec802ac0eee09c8f85a2b5ce4a1576a9c514556fed48c38c19797078855a3e6bcf03026960e72c6b9e43a75d157b3f2b82986c1cdc128ea94985a8e036a5b61b5eede6581a9ab8b1d1fc825d8b6467f7f0c8aa5e6eb7d332cdea3ced93d1365e1b47d89a75477b69ea8aa34a8503ac55a676cd4c3412af764aacbc5", 0x84}], 0x1, 0x0, 0x48}}], 0x1, 0x4000001) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$kcm(0x11, 0x3, 0x0) r3 = socket(0x400000000010, 0x3, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xfffffffd, {0x0, 0x0, 0x0, r5, {0x0, 0x1}, {0xffff, 0xffff}, {0xffe0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}, 0x1, 0x0, 0x0, 0x8810}, 0x8000) sendmsg$nl_route_sched(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newtfilter={0x58, 0x2c, 0xf3f, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r5, {0x9, 0x4}, {}, {0x7, 0x6}}, [@filter_kind_options=@f_basic={{0xa}, {0x28, 0x2, [@TCA_BASIC_EMATCHES={0x24, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1}}, @TCA_EMATCH_TREE_LIST={0x18, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0xceb, 0x7, 0x4}, {{0x0, 0x0, 0x1, 0x1}, {0x0, 0x0, 0x1}}}}]}]}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x20041090}, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$kcm(r2, &(0x7f00000000c0)={&(0x7f0000000380)=@xdp={0x2c, 0x7, r7, 0x3e}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000180)='\'', 0x5dc}], 0x1}, 0x4) 3m23.716833231s ago: executing program 53 (id=13697): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r0, 0x0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000002000)=0x4080, 0x4) 3m21.212745934s ago: executing program 54 (id=13717): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfa, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr', 0x3) sendmmsg$inet(r0, &(0x7f0000001240)=[{{0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000000140)="91f8a9849519def28691bbc4173c3d6f357d0272b7319130feaab952ac4703cad04be68907e50e997fc26e4c91ea4feb931647fc5393de25000000000000000000", 0x41}, {&(0x7f0000000e80)="44900000000056ee66c372f3105eb186dd8062fad2d5b5bfb0ba06f274a8d026bd209da8ffa6a26e3b3f8075704a9d0ef9aff7f1e7db24609f02d34e76992c9df9fe6888c6c9a4825c6223be6ac54536025af1dea54e527c68b0ff250261953f2da79a78104c2d9e7b16ed86b124945aa9ab7581ebd385fb61d442035db81e18c2d2462d0bb25fff9d3b1ce90b597992b2a4d541611ce77f58dce7c9500118229e7cdf4ca7f6adca92c73d97ce54164c1942b2568635bec8e020b41fb2f8000000000000000000000000000000001c8a9f7956583e26f6f0edc415851d0b8305fe66c2b7c114e3712d87744938848f24a13cb604000000000000000000000000000000c7aa5035897b20a6c23f1fc4af", 0x110}, {&(0x7f00000003c0)="641a6a2b863c0dd898013a3f97a834ebb75a925ab48c844221841a232932fc2e37e327de21450df098c113e179a0d3", 0x2f}, {&(0x7f00000001c0)="985e44efeabe001cabcf3d8673c3a254a9a2d3197970cb347b70a243bf77139a94bc3ae91684aaf7b7dff691deb8f8aef2d915fb3a0794a9a9b431a819bca6122c350637808dde804a048fd8696e524b2934126c443ce93d82e931eb9918e6c0827686e59209d2e02c9210fd8048f04ad6c48b3072092c483271361816bf21afb8473a064f1988536d4b5888807b3aaafaf59f53121782a0a9370dc0feae13c8c2a1", 0xa2}], 0x4}}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000b80)="f77d2b5dd5f7d74f0748cf3d2cf218d644566a14103b1c7dd35fd2951bd022f10f2dc7f4ce0d8ac5f4abaca4b97b706153756913b7dd48248b5bfb10460019248bf238743fa2aeb5bef21ce832db670920dc5e911ef2ad63e849901d1001129dbacbfd4924d7545517fd18b5d29978f32a5b5c81755cb89cc0490958ba3211eb99df5cdbbc0f9c941aaa1495893dada02d8188acd26b5afd7476413f322c8f79de769debb56343f3eded2dca93ed6641e5", 0xb1}, {&(0x7f0000001300)="e0cda6472d1ccfb4d1d46bf348a3b7ff9e5b6b3e30ef2266c86a085e37271763c50968fe2e2eb13b9472381bade936f9a85e26aac6ebd21115f086751d870434cf07dbd92e0ea2322f163473dad24cffe6d23ffa95b04a2653e8a7c9ab042ea1b0bf4bde850bc9f6147f1a48e86eec8223fd33fc83374393fbd08a3281a268aff6688fb41eecbdd328ef0fcbe09cd9e34c6b9d641ba6fb677edede912815299a3313b02b4af73d57a5d0a7c01e400c4782", 0xb1}], 0x2}}, {{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000640)="42e013913edbeb683c44e18a52b5a2462064ddd92caaba941de80d06047dedb7eeeff3a27eacf4c416b6979d6c918608807c44d01535dbaab3b390086e4fd43c6b5931187023646d6beac2340fdc7a0d81214ac76a818f64d287311e8828dfd3e3dd67efdb129a6e52745d1540e570891f6bf411cc16a18c4d34e522a1f003498f1a03ea1f8828b6c902286c71a9bc21923972dacfa74fef6a0fd3267e599c1dd33dff5d7b28f134bda4a29962fd5daa4fc9c515a1c3ee25ace1a9948c24b277d0c9c46f948f8a3f98b1a18e", 0xcc}, {0x0}, {&(0x7f0000000740)="b176d469f44ff7e206a24a3a5f3a112da355134ae64fde53dc0e681885ead332aa45811c0070066fb0e5cf5a9a4965475953e2a028f7dd4a6ed8b33465fd161cd8dce309f6be32236cf8e07a5506acb719304ebc71b2a3756cb0832d928d432d1506d368e2b001a8b392dad3dc2916376732339a20db54405b716ea85c9a4d8f232138345947e4", 0x87}], 0x3}}], 0x3, 0x2090) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xdfa, 0x4) sendto$inet(r0, &(0x7f0000000580)="17", 0x59a, 0x10008095, 0x0, 0x0) 3m5.39163807s ago: executing program 55 (id=14106): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000001c0)={'wpan0\x00'}) syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), r1) sendmsg$NL802154_CMD_NEW_SEC_KEY(r1, 0x0, 0x2004c0c4) 3m2.955591591s ago: executing program 4 (id=14157): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) bind$can_j1939(r1, &(0x7f0000000340)={0x1d, 0x0, 0x0, {0x2, 0x0, 0x6}, 0xfe}, 0x18) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000040)=0x1, 0x4) sendmsg$inet(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000280)="81b641f1f3843704b6", 0x9}], 0x1}, 0x4048081) setsockopt$SO_J1939_FILTER(r1, 0x6b, 0x1, &(0x7f0000000400)=[{0x2, 0x2, {0x1, 0x0, 0x3}, {0x2, 0xff, 0x1}, 0x1, 0xfd}, {0x0, 0x2, {0x1, 0xff, 0x2}, {0x0, 0x1, 0x4}, 0x1, 0xfe}], 0x40) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newtfilter={0x24, 0x11, 0x1, 0x70bd29, 0x25dfdbfc, {0x0, 0x0, 0x74, 0x0, {0xb, 0xfff2}, {0xfff1, 0x9}, {0x2, 0xd}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x4012}, 0x20000050) 3m2.780267639s ago: executing program 4 (id=14159): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfa, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr', 0x3) sendmmsg$inet(r0, &(0x7f0000001240), 0x0, 0x2090) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xdfa, 0x4) sendto$inet(r0, &(0x7f0000000580)="17", 0x59a, 0x10008095, 0x0, 0x0) 3m2.632138167s ago: executing program 4 (id=14161): r0 = socket$packet(0x11, 0x3, 0x300) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0x11, &(0x7f00000003c0)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b70500001000000085000000a500000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r2, 0x4) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[], 0x38}, 0x1, 0x0, 0x0, 0x2000c844}, 0x20000110) 3m2.520984232s ago: executing program 4 (id=14162): syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000280)={[{@nogrpid}, {@jqfmt_vfsv0}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@debug}, {@nombcache}, {@quota}, {@nolazytime}]}, 0x3, 0x42f, &(0x7f0000000940)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x122dfb579e447c7a) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x4004) open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) mount(&(0x7f0000000440)=@loop={'/dev/loop', 0x0}, &(0x7f0000000200)='./bus\x00', 0x0, 0x1000, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x3, 0x0, 0x0, 0x4, 0x0, "ef35af413bb901527fe4d0ce5d29c3ee5e5c3676345a41499db7aac63a01000000000000004faa2ae2c084a0ea0000000000007700000c00002000", "036c47c678082004cb59d654cb9b1b165263bdbcef549ba197fce47ddfdd753abd950100172a00ffffff00f7ffffff000000f3e7f20000000200000000000600", "b7326736181c208220fffff2ff00000000000000000e00", [0x4]}) write$cgroup_int(r0, &(0x7f0000000080)=0x4, 0x12) 3m1.946228981s ago: executing program 4 (id=14175): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000002c0)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="1e030600bc5cb60128876360864666702c1ffe80000000000000", @ANYRESDEC], 0xffdd) 3m1.460835515s ago: executing program 4 (id=14178): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) write$tun(r0, 0x0, 0x0) 3m1.34820489s ago: executing program 56 (id=14178): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) write$tun(r0, 0x0, 0x0) 2m36.303945364s ago: executing program 9 (id=14559): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x8) getpid() sched_setaffinity(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeeb, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = socket$inet6(0xa, 0x80002, 0x0) socket$igmp6(0xa, 0x3, 0x2) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @dev, 0x5}, 0x1c) setsockopt$inet6_IPV6_HOPOPTS(r2, 0x29, 0x36, &(0x7f0000001440)=ANY=[], 0xc0) sendmmsg$inet6(r2, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980), 0x171}}], 0x400000000000172, 0x4000000) 2m35.555652161s ago: executing program 8 (id=14572): r0 = socket$pptp(0x18, 0x1, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000fc0400ff370001000000000095"], &(0x7f00000005c0)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x20}, 0x94) bind$pptp(r0, &(0x7f0000000140)={0x18, 0x2, {0xffff, @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1e) connect$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x4, @multicast1}}, 0x1e) openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0), 0x202, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) unshare(0xc020680) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, 0x0, 0x0) 2m35.433220357s ago: executing program 8 (id=14573): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000001c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r1, @ANYRES32=r2, @ANYBLOB="60003080050002000000000014000400403a050c5bae9c544ef2b6d713459a7a1c0001800500020000000000080004000500000008000100020000"], 0x7c}, 0x1, 0x0, 0x0, 0x4004}, 0x0) 2m35.432915777s ago: executing program 8 (id=14574): setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000080)="929885988d16b1348d771e21893ede0483e04ffac5b000f091e9176f3ce233", 0x1f) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a1d010000000000000000020000000900010073797a3000000000080002400000000098000000030a01020000000000000000020000000900010073797a30000000000900030073797a32000000006b000300"], 0xfc}}, 0x4080800) 2m35.392178679s ago: executing program 8 (id=14575): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000280)={[{@nogrpid}, {@jqfmt_vfsv0}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@debug}, {@nombcache}, {@quota}, {@nolazytime}]}, 0x3, 0x42f, &(0x7f0000000940)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x122dfb579e447c7a) open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) mount(&(0x7f0000000440)=@loop={'/dev/loop', 0x0}, &(0x7f0000000200)='./bus\x00', 0x0, 0x1000, 0x0) r1 = open(0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x3, 0x0, 0x0, 0x4, 0x0, "ef35af413bb901527fe4d0ce5d29c3ee5e5c3676345a41499db7aac63a01000000000000004faa2ae2c084a0ea0000000000007700000c00002000", "036c47c678082004cb59d654cb9b1b165263bdbcef549ba197fce47ddfdd753abd950100172a00ffffff00f7ffffff000000f3e7f20000000200000000000600", "b7326736181c208220fffff2ff00000000000000000e00", [0x4]}) write$cgroup_int(r0, &(0x7f0000000080)=0x4, 0x12) 2m35.229202417s ago: executing program 8 (id=14577): perf_event_open(&(0x7f0000001100)={0x5, 0x80, 0x9, 0x8, 0x9, 0xfb, 0x0, 0x3c, 0xc002, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x18842, 0x0, 0x7fffffff, 0x2, 0x3cd, 0x3, 0x7, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0x3) 2m34.844862606s ago: executing program 8 (id=14579): r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x1, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x28}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)=@newtfilter={0x4c, 0x2c, 0xd27, 0x70bd28, 0x8000, {0x0, 0x0, 0x0, r3, {0x8, 0x7}, {}, {0xa}}, [@filter_kind_options=@f_flower={{0xb}, {0x1c, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS={0x18, 0x54, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x14, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x100c}]}]}]}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x22044028}, 0x0) 2m34.697785533s ago: executing program 9 (id=14581): r0 = socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket(0x400000000010, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000600)=@newqdisc={0x34, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, 0x0, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0xb}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000440)=@newtfilter={0x90, 0x2c, 0xd27, 0x30bd29, 0x25dfdc00, {0x0, 0x0, 0x0, 0x0, {0xffff, 0x5}, {}, {0x7, 0x3}}, [@filter_kind_options=@f_matchall={{0xd}, {0x5c, 0x2, [@TCA_MATCHALL_ACT={0x58, 0x2, [@m_ife={0x54, 0x1, 0x0, 0x0, {{0x8}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x8, 0xb, 0x4, 0xa, 0x3}, 0x1}}, @TCA_IFE_METALST={0xc, 0x6, [@IFE_META_PRIO={0x8, 0x3, @val=0x9}]}]}, {0x4}, {0xc}, {0xc, 0x8, {0x2, 0x3}}}}]}]}}]}, 0x90}}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r3) socket$netlink(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) r4 = socket$kcm(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$kcm(r4, &(0x7f00000000c0)={&(0x7f0000000380)=@xdp={0x2c, 0x7, r5, 0x3e}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000140)='\r', 0x1}], 0x1}, 0x4) 2m34.435879926s ago: executing program 57 (id=14579): r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x1, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x28}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)=@newtfilter={0x4c, 0x2c, 0xd27, 0x70bd28, 0x8000, {0x0, 0x0, 0x0, r3, {0x8, 0x7}, {}, {0xa}}, [@filter_kind_options=@f_flower={{0xb}, {0x1c, 0x2, [@TCA_FLOWER_KEY_ENC_OPTS={0x18, 0x54, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPTS_ERSPAN={0x14, 0x3, 0x0, 0x1, [@TCA_FLOWER_KEY_ENC_OPT_ERSPAN_VER={0x5, 0x1, 0x1}, @TCA_FLOWER_KEY_ENC_OPT_ERSPAN_INDEX={0x8, 0x2, 0x100c}]}]}]}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x22044028}, 0x0) 2m34.138844581s ago: executing program 9 (id=14585): setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000080)="929885988d16b1348d771e21893ede0483e04ffac5b000f091e9176f3ce233d2589bb0848df59f3d2d1911e3", 0x2c) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a1d010000000000000000020000000900010073797a3000000000080002400000000098000000030a01020000000000000000020000000900010073797a30000000000900030073797a32000000006b000300"], 0xfc}}, 0x4080800) 2m34.083122274s ago: executing program 9 (id=14587): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000280)={[{@nogrpid}, {@jqfmt_vfsv0}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@debug}, {@nombcache}, {@quota}, {@nolazytime}]}, 0x3, 0x42f, &(0x7f0000000940)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x122dfb579e447c7a) open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) mount(&(0x7f0000000440)=@loop={'/dev/loop', 0x0}, &(0x7f0000000200)='./bus\x00', 0x0, 0x1000, 0x0) r1 = open(0x0, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x3, 0x0, 0x0, 0x4, 0x0, "ef35af413bb901527fe4d0ce5d29c3ee5e5c3676345a41499db7aac63a01000000000000004faa2ae2c084a0ea0000000000007700000c00002000", "036c47c678082004cb59d654cb9b1b165263bdbcef549ba197fce47ddfdd753abd950100172a00ffffff00f7ffffff000000f3e7f20000000200000000000600", "b7326736181c208220fffff2ff00000000000000000e00", [0x4]}) write$cgroup_int(r0, &(0x7f0000000080)=0x4, 0x12) 2m33.774662109s ago: executing program 9 (id=14591): r0 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r0, &(0x7f0000000000)={&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e22, @dev}}, 0x8c, &(0x7f0000000140)=[{&(0x7f0000000ac0)="ee", 0xfffffdef}], 0x1, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000000040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b57000000860f5878c37ffe36e1165814d435be5b317c6c8189587d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988ab013f40afe403041323110f62055394412158e7a3adb148d641aa40d4ab077fe34232aa8b31851466d0998a61d7da0c86d70000001010"], 0x10b8}, 0xff00) 2m33.100613002s ago: executing program 9 (id=14601): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfa, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr', 0x3) sendmmsg$inet(r0, &(0x7f0000001240)=[{{0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000000140)="91f8a9849519def28691bbc4173c3d6f357d0272b7319130feaab952ac4703cad04be68907e50e997fc26e4c91ea4feb931647fc5393de25000000000000000000", 0x41}, {&(0x7f0000000e80)="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", 0x110}, {&(0x7f00000003c0)="641a6a2b863c0dd898013a3f97a834ebb75a925ab48c844221841a232932fc2e37e327de21450df098c113e179a0d3", 0x2f}, {&(0x7f00000001c0)="985e44efeabe001cabcf3d8673c3a254a9a2d3197970cb347b70a243bf77139a94bc3ae91684aaf7b7dff691deb8f8aef2d915fb3a0794a9a9b431a819bca6122c350637808dde804a048fd8696e524b2934126c443ce93d82e931eb9918e6c0827686e59209d2e02c9210fd8048f04ad6c48b3072092c483271361816bf21afb8473a064f1988536d4b5888807b3aaafaf59f53121782a0a9370dc0feae13c8c2a1", 0xa2}], 0x4}}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000b80)="f77d2b5dd5f7d74f0748cf3d2cf218d644566a14103b1c7dd35fd2951bd022f10f2dc7f4ce0d8ac5f4abaca4b97b706153756913b7dd48248b5bfb10460019248bf238743fa2aeb5bef21ce832db670920dc5e911ef2ad63e849901d1001129dbacbfd4924d7545517fd18b5d29978f32a5b5c81755cb89cc0490958ba3211eb99df5cdbbc0f9c941aaa1495893dada02d8188acd26b5afd7476413f322c8f79de769debb56343f3eded2dca93ed6641e5", 0xb1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000640)="42e013913edbeb683c44e18a52b5a2462064ddd92caaba941de80d06047dedb7eeeff3a27eacf4c416b6979d6c918608807c44d01535dbaab3b390086e4fd43c6b5931187023646d6beac2340fdc7a0d81214ac76a818f64d287311e8828dfd3e3dd67efdb129a6e52745d1540e570891f6bf411cc16a18c4d34e522a1f003498f1a03ea1f8828b6c902286c71a9bc21923972dacfa74fef6a0fd3267e599c1dd33dff5d7b28f134bda4a29962fd5daa4fc9c515a1c3ee25ace1a9948c24b277d0c9c4", 0xc3}], 0x1}}], 0x3, 0x2090) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xdfa, 0x4) sendto$inet(r0, &(0x7f0000000580)="17", 0x59a, 0x10008095, 0x0, 0x0) 2m33.100439793s ago: executing program 58 (id=14601): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfa, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr', 0x3) sendmmsg$inet(r0, &(0x7f0000001240)=[{{0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000000140)="91f8a9849519def28691bbc4173c3d6f357d0272b7319130feaab952ac4703cad04be68907e50e997fc26e4c91ea4feb931647fc5393de25000000000000000000", 0x41}, {&(0x7f0000000e80)="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", 0x110}, {&(0x7f00000003c0)="641a6a2b863c0dd898013a3f97a834ebb75a925ab48c844221841a232932fc2e37e327de21450df098c113e179a0d3", 0x2f}, {&(0x7f00000001c0)="985e44efeabe001cabcf3d8673c3a254a9a2d3197970cb347b70a243bf77139a94bc3ae91684aaf7b7dff691deb8f8aef2d915fb3a0794a9a9b431a819bca6122c350637808dde804a048fd8696e524b2934126c443ce93d82e931eb9918e6c0827686e59209d2e02c9210fd8048f04ad6c48b3072092c483271361816bf21afb8473a064f1988536d4b5888807b3aaafaf59f53121782a0a9370dc0feae13c8c2a1", 0xa2}], 0x4}}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000b80)="f77d2b5dd5f7d74f0748cf3d2cf218d644566a14103b1c7dd35fd2951bd022f10f2dc7f4ce0d8ac5f4abaca4b97b706153756913b7dd48248b5bfb10460019248bf238743fa2aeb5bef21ce832db670920dc5e911ef2ad63e849901d1001129dbacbfd4924d7545517fd18b5d29978f32a5b5c81755cb89cc0490958ba3211eb99df5cdbbc0f9c941aaa1495893dada02d8188acd26b5afd7476413f322c8f79de769debb56343f3eded2dca93ed6641e5", 0xb1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000640)="42e013913edbeb683c44e18a52b5a2462064ddd92caaba941de80d06047dedb7eeeff3a27eacf4c416b6979d6c918608807c44d01535dbaab3b390086e4fd43c6b5931187023646d6beac2340fdc7a0d81214ac76a818f64d287311e8828dfd3e3dd67efdb129a6e52745d1540e570891f6bf411cc16a18c4d34e522a1f003498f1a03ea1f8828b6c902286c71a9bc21923972dacfa74fef6a0fd3267e599c1dd33dff5d7b28f134bda4a29962fd5daa4fc9c515a1c3ee25ace1a9948c24b277d0c9c4", 0xc3}], 0x1}}], 0x3, 0x2090) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xdfa, 0x4) sendto$inet(r0, &(0x7f0000000580)="17", 0x59a, 0x10008095, 0x0, 0x0) 2m30.889772912s ago: executing program 1 (id=14611): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000600)=@newqdisc={0x34, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0xb}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000440)=@newtfilter={0x90, 0x2c, 0xd27, 0x30bd29, 0x25dfdc00, {0x0, 0x0, 0x0, r3, {0xffff, 0x5}, {}, {0x7, 0x3}}, [@filter_kind_options=@f_matchall={{0xd}, {0x5c, 0x2, [@TCA_MATCHALL_ACT={0x58, 0x2, [@m_ife={0x54, 0x1, 0x0, 0x0, {{0x8}, {0x2c, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x8, 0xb, 0x4, 0xa, 0x3}, 0x1}}, @TCA_IFE_METALST={0xc, 0x6, [@IFE_META_PRIO={0x8, 0x3, @val=0x9}]}]}, {0x4}, {0xc}, {0xc, 0x8, {0x2, 0x3}}}}]}]}}]}, 0x90}}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r4) socket$netlink(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) r5 = socket$kcm(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$kcm(r5, &(0x7f00000000c0)={&(0x7f0000000380)=@xdp={0x2c, 0x7, r6, 0x3e}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000140)='\r', 0x1}], 0x1}, 0x4) 2m30.704987772s ago: executing program 1 (id=14613): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="4c00000002060108000034e4000000000000000805000400030000000900020073797a3100000000050005000200000014000300686173683a69702c706f72742c6970000500010007"], 0x4c}, 0x1, 0x0, 0x0, 0x20044095}, 0x8042) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) syz_usb_connect(0x0, 0x3f, 0x0, 0x0) sendmsg$IPSET_CMD_ADD(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)={0x60, 0x9, 0x6, 0x3, 0x0, 0x0, {0x5}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x38, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e21}, @IPSET_ATTR_PROTO={0x5, 0x7, 0xff}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @private=0xa010101}}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x10004893}, 0x80) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = creat(&(0x7f0000000000)='./file1\x00', 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r4, 0xe0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff}}, 0x10) io_submit(0x0, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f0000000000), 0x4000, 0x2000}]) sendmsg$IPSET_CMD_ADD(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x60, 0x9, 0x6, 0x3, 0x0, 0x0, {0x5}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x38, 0x7, 0x0, 0x1, [@IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e21}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x6}, @IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @private=0xa010101}}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @empty}}, @IPSET_ATTR_IP2={0xc, 0x14, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x10004893}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb5, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x3442, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x411, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x4}, 0xa2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2m29.474374672s ago: executing program 1 (id=14622): syz_emit_ethernet(0x36, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa080045000028006700000a069078ac1e0101ac"], 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000340)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x70bd25, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0x0, 0xb}, {0xffff, 0xffff}, {0xfff2}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0x3, 0x3, 0x4361, 0x7, 0xffffffff, 0x3}}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000005c0)=@newqdisc={0x3c, 0x24, 0x4ee4e6a52ff56541, 0x70b926, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x0, 0xd}, {0x6, 0xb}, {0xffff, 0xffe0}}, [@qdisc_kind_options=@q_cake={{0x9}, {0xc, 0x2, [@TCA_CAKE_ACK_FILTER={0x8, 0x10, 0x2}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x240040e0}, 0x4890) r3 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r3, &(0x7f0000000240)="800000800000210ee7decd7a000340008100", 0x36, 0x40, &(0x7f00000001c0)={0x11, 0x8100, 0x0, 0x1, 0xd8, 0x6, @broadcast}, 0x14) 2m29.307329161s ago: executing program 1 (id=14624): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000280)={[{@nogrpid}, {@jqfmt_vfsv0}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@debug}, {@nombcache}, {@quota}, {@nolazytime}]}, 0x3, 0x42f, &(0x7f0000000940)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x122dfb579e447c7a) open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) mount(&(0x7f0000000440)=@loop={'/dev/loop', 0x0}, &(0x7f0000000200)='./bus\x00', 0x0, 0x1000, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x3, 0x0, 0x0, 0x4, 0x0, "ef35af413bb901527fe4d0ce5d29c3ee5e5c3676345a41499db7aac63a01000000000000004faa2ae2c084a0ea0000000000007700000c00002000", "036c47c678082004cb59d654cb9b1b165263bdbcef549ba197fce47ddfdd753abd950100172a00ffffff00f7ffffff000000f3e7f20000000200000000000600", "b7326736181c208220fffff2ff00000000000000000e00", [0x4]}) write$cgroup_int(r0, 0x0, 0x0) 2m28.981508407s ago: executing program 1 (id=14629): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffff00f687000000", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x1}, 0x4000080) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @remote}, 0x14) sendto$inet6(r0, &(0x7f0000000800)="4103082c1116480401020200c52cf7c25975e005b02f000006892f000300897c6b118777faffffff3066090cb600c5471d130a66321a54e7df305fbe258161b6fd8f2428652265d94c6fdbaefc57376a57c2feffff188be9427c323ef024a37016d2a7f9ab6e7941a6fc4f95aa73c1dfff4941f6503b5bd8c91db22cd33795481c94085fa12cdc679ac2a5d7b5d99b93fb07acb0da680e78b74c74aae8d7690d5986a9af81622a0ac210bc7b5ca5fed11cb54d046642670041e846bb184ff5d39fe8516d2d2a8d84e6e7dfcb2b8a8023444db513a3d7a124b59f0a5cd36489dbbb75cce3145d0ea3c3aa21af7cbcbc7a7575db782e757ca543109f5ddcec4930aa91f4119ea3d1f56140cb86cfe0724b23904ef5d05c725ee23918a502b1afe09fb0757d", 0xfc13, 0x880, 0x0, 0xfffffffffffffef0) 2m28.71067679s ago: executing program 1 (id=14630): sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32=0x0, @ANYBLOB="0000000000008000280012800a0001"], 0x50}, 0x1, 0x0, 0x0, 0x4001}, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000003c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000000)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100fdffffff000000001d00000008000300", @ANYRES32=r2, @ANYBLOB="40002f800c00020000000000000000000800010000000000280003801c0003800600010000000000080002000200000006080300a7aa0000080001"], 0x5c}}, 0x20000000) 2m28.685757601s ago: executing program 59 (id=14630): sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES32=0x0, @ANYBLOB="0000000000008000280012800a0001"], 0x50}, 0x1, 0x0, 0x0, 0x4001}, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000003c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000000)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100fdffffff000000001d00000008000300", @ANYRES32=r2, @ANYBLOB="40002f800c00020000000000000000000800010000000000280003801c0003800600010000000000080002000200000006080300a7aa0000080001"], 0x5c}}, 0x20000000) 2m6.263061714s ago: executing program 6 (id=14871): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x440, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0xc0501, 0x0) close(r1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000024c0)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x1, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0x0, 0xb}, {0xffff, 0xffff}, {0xfff2, 0x7}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0x3, 0x3, 0x6361, 0x7, 0xffffffff, 0x3}}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40088c1}, 0x4000) sendmsg$nl_route_sched(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)=@newqdisc={0x30, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0x25dfdc01, {0x0, 0x0, 0x0, r3, {0x0, 0x9}, {0xffff, 0xb}, {0xffff, 0xffe0}}, [@qdisc_kind_options=@q_pie={{0x8}, {0x4}}]}, 0x30}, 0x1, 0x0, 0x0, 0x4044060}, 0x4890) r4 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r4, &(0x7f00000005c0), 0x0, 0x40, &(0x7f00000001c0)={0x11, 0x88a8, r3, 0x1, 0xd8, 0x6, @multicast}, 0x14) 2m6.020356187s ago: executing program 6 (id=14874): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='cdg', 0x3) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x2, 0x200, @loopback, 0x7}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x24000045, 0x0, 0x0) shutdown(r0, 0x1) 2m5.953785049s ago: executing program 6 (id=14876): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfa, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr', 0x3) sendmmsg$inet(r0, &(0x7f0000001240)=[{{0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000000140)="91f8a9849519def28691bbc4173c3d6f357d0272b7319130feaab952ac4703cad04be68907e50e997fc26e4c91ea4feb931647fc5393de25000000000000000000", 0x41}, {&(0x7f0000000e80)="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", 0x110}, {&(0x7f00000003c0)="641a6a2b863c0dd898013a3f97a834ebb75a925ab48c844221841a232932fc2e37e327de21450df098c113e179a0d3", 0x2f}, {&(0x7f00000001c0)="985e44efeabe001cabcf3d8673c3a254a9a2d3197970cb347b70a243bf77139a94bc3ae91684aaf7b7dff691deb8f8aef2d915fb3a0794a9a9b431a819bca6122c350637808dde804a048fd8696e524b2934126c443ce93d82e931eb9918e6c0827686e59209d2e02c9210fd8048f04ad6c48b3072092c483271361816bf21afb8473a064f1988536d4b5888807b3aaafaf59f53121782a0a9370dc0fe", 0x9d}], 0x4}}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000b80)="f77d2b5dd5f7d74f0748cf3d2cf218d644566a14103b1c7dd35fd2951bd022f10f2dc7f4ce0d8ac5f4abaca4b97b706153756913b7dd48248b5bfb10460019248bf238743fa2aeb5bef21ce832db670920dc5e911ef2ad63e8", 0x59}, {&(0x7f0000000d00)="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", 0x145}, {&(0x7f0000001300)="e0cda6472d1ccfb4d1d46bf348a3b7ff9e5b6b3e30ef2266c86a085e37271763c50968fe2e2eb13b9472381bade936f9a85e26aac6ebd21115f086751d870434cf07dbd92e0ea2322f163473dad24cffe6d23ffa95b04a2653e8a7c9ab042ea1b0bf4bde850bc9f6147f1a48e86eec8223fd33fc83374393fbd08a3281a268aff6688fb41eecbdd328ef0fcbe0", 0x8d}], 0x3}}], 0x2, 0x2090) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xdfa, 0x4) sendto$inet(r0, &(0x7f0000000580)="17", 0x59a, 0x10008095, 0x0, 0x0) 2m5.924013501s ago: executing program 6 (id=14878): syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000280)={[{@nogrpid}, {@jqfmt_vfsv0}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@debug}, {@nombcache}, {@quota}, {@nolazytime}]}, 0x3, 0x42f, &(0x7f0000000940)="$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") r0 = creat(&(0x7f0000000040)='./bus\x00', 0x122dfb579e447c7a) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x4004) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0x20, &(0x7f0000000000)={@in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x15}}}, 0x0, 0x0, 0x41d, 0x0, "d4ab4f881ec98639488bfc6109000000c37a30bc61a28c99a71959cc6ad22025109ad678b447b51bb1711707dfe35439e00a3b833722fd3a465929bc7b96158c2c221c4055e730573ab8180070afebf5"}, 0xd8) r3 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) ftruncate(r3, 0x2007ffc) sendfile(r3, r3, 0x0, 0x800000009) mount(&(0x7f0000000440)=@loop={'/dev/loop', 0x0}, &(0x7f0000000200)='./bus\x00', 0x0, 0x1000, 0x0) r4 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r4, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x3, 0x0, 0x0, 0x4, 0x0, "ef35af413bb901527fe4d0ce5d29c3ee5e5c3676345a41499db7aac63a01000000000000004faa2ae2c084a0ea0000000000007700000c00002000", "036c47c678082004cb59d654cb9b1b165263bdbcef549ba197fce47ddfdd753abd950100172a00ffffff00f7ffffff000000f3e7f20000000200000000000600", "b7326736181c208220fffff2ff00000000000000000e00", [0x4]}) socket$unix(0x1, 0x5, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0x4, 0x12) 2m5.53210639s ago: executing program 6 (id=14884): setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000080)="929885988d16b1348d771e21893ede0483e04ffac5b000f091e9176f3ce233d2589bb0848df59f3d2d1911e359a0df6d10f5d54496a6057b05f2", 0x3a) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a1d010000000000000000020000000900010073797a3000000000080002400000000098000000030a01020000000000000000020000000900010073797a30000000000900030073797a32000000006b"], 0xfc}}, 0x4080800) 2m5.184824678s ago: executing program 6 (id=14891): socket$netlink(0x10, 0x3, 0x0) syz_clone(0x30209000, 0x0, 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x48) fcntl$lock(0xffffffffffffffff, 0x6, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/netlink\x00') read(r3, &(0x7f0000001180)=""/4096, 0x1000) bpf$MAP_CREATE(0x300000000000000, 0x0, 0x0) 2m5.184696447s ago: executing program 60 (id=14891): socket$netlink(0x10, 0x3, 0x0) syz_clone(0x30209000, 0x0, 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x48) fcntl$lock(0xffffffffffffffff, 0x6, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/netlink\x00') read(r3, &(0x7f0000001180)=""/4096, 0x1000) bpf$MAP_CREATE(0x300000000000000, 0x0, 0x0) 5.63277208s ago: executing program 5 (id=16152): bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x20, &(0x7f0000000400)={&(0x7f00000002c0)=""/141, 0x8d, 0x0, &(0x7f0000000380)=""/128, 0x80}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10) sendmsg$inet(r1, &(0x7f0000000480)={&(0x7f0000000000)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, 0x0}, 0x0) r2 = gettid() r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000700)=ANY=[@ANYBLOB="040100001a0007000000000000000000fe80000000000000000000000000001be000000200000000000000000200"/64, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="ff010000000000000000000000000001000000002b000000fc000000000000000000000000000000000300000000000003000000000000000200000000000000000000007ffffffe0000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000700000000000000fdffffffffffffff0000040000000000e80a0000000000000000000002000200700000000000000014000e00ac1e000100"/188], 0x104}}, 0x0) timer_create(0x1, &(0x7f0000000800)={0x0, 0x21, 0x4, @tid=r2}, &(0x7f0000000000)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x3ed4, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) timer_settime(r4, 0x1, &(0x7f0000000040)={{}, {0x77359400}}, 0x0) ioprio_get$pid(0x1, 0x0) sendmsg$rds(r1, &(0x7f0000000140)={&(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f00000000c0)={'ip6gre0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=@bridge_newneigh={0x3c, 0x1c, 0x1, 0x70bd29, 0x25dfdbff, {0xa, 0x0, 0x0, r6, 0x80, 0x7f, 0x6}, [@NDA_LLADDR={0xa, 0x2, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, @NDA_DST_IPV6={0x14, 0x1, @private1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x4040004) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r7) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x3, 0x2004, 0x3, 0x7500ae1394150fc9, 0xffffffffffffffff, 0xa, '\x00', r6, 0xffffffffffffffff, 0x3, 0x2, 0x4, 0xe}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r8, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000180)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r9, 0xffffffffffffffff}, &(0x7f0000000140), &(0x7f0000000280)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x11, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x4, 0x1005, &(0x7f00000014c0)=""/4101, 0x0, 0xc}, 0x94) fcntl$dupfd(r7, 0x0, 0xffffffffffffffff) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r11) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80080a, &(0x7f0000001c80)={[{@barrier_val}, {@resuid}, {@errors_remount}, {@nogrpid}]}, 0x1, 0x7ba, &(0x7f0000002500)="$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") symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') 5.140903335s ago: executing program 5 (id=16154): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfa, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr', 0x3) sendmmsg$inet(r0, &(0x7f0000001240)=[{{0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000000140)="91f8a9849519def28691bbc4173c3d6f357d0272b7319130feaab952ac4703cad04be68907e50e997fc26e4c91ea4feb931647fc5393de25000000000000000000", 0x41}, {&(0x7f0000000e80)="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", 0x110}, {&(0x7f00000003c0)="641a6a2b863c0dd898013a3f97a834ebb75a925ab48c844221841a232932fc2e37e327de21450df098c113e179a0d3", 0x2f}, {&(0x7f00000001c0)="985e44efeabe001cabcf3d8673c3a254a9a2d3197970cb347b70a243bf77139a94bc3ae91684aaf7b7dff691deb8f8aef2d915fb3a0794a9a9b431a819bca6122c350637808dde804a048fd8696e524b2934126c443ce93d82e931eb9918e6c0827686e59209d2e02c9210fd8048f04ad6c48b3072092c483271361816bf21afb8473a064f1988536d4b", 0x8a}], 0x4}}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000b80)="f77d2b5dd5f7d74f0748cf3d2cf218d644566a14103b1c7dd35fd2951bd022f10f2dc7f4ce0d8ac5f4abaca4b97b706153756913b7dd48248b5bfb10460019248bf238743fa2aeb5bef21ce832db670920dc5e911ef2ad63e849901d1001129dbacbfd4924d7545517fd18b5d29978f32a5b5c81755cb89cc0490958ba3211eb99df5cdbbc0f9c941aaa1495893dada02d8188acd26b5afd7476413f322c8f79de769debb56343f3eded", 0xaa}, {&(0x7f0000001300)="e0cda6472d1ccfb4d1d46bf348a3b7ff9e5b6b3e30ef2266c86a085e37271763c50968fe2e2eb13b9472381bade936f9a85e26aac6eb", 0x36}], 0x2}}, {{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000640)="42e013913edbeb683c44e18a52b5a2462064ddd92caaba941de80d06047dedb7eeeff3a27eacf4c416b6979d6c918608807c44d01535dbaab3b390086e4fd43c6b5931187023646d6beac2340fdc7a0d81214ac76a818f64d287311e8828dfd3e3dd67efdb129a6e52745d1540e570891f6bf411cc16a18c4d34e522a1f003498f1a03ea1f8828b6c902286c71a9bc21923972dacfa74fef6a0fd3267e599c1dd33dff5d7b28f134bda4a29962fd5daa4fc9c515a1c3ee25ace1a9948c24b277d0c9c46f948f8a3f98b1a18e", 0xcc}, {&(0x7f0000000740)="b176d469f44ff7e206a24a3a5f3a112da355134ae64fde53dc0e681885ead332aa45811c0070066fb0e5cf5a9a4965475953e2a028f7dd4a6ed8b33465fd161cd8dce309f6be32236cf8e07a5506acb719304ebc71b2a3756cb0832d928d432d1506d368e2b001a8b392dad3dc2916376732339a20db54405b716ea85c9a4d8f232138345947e47c80f23fcac5422ee2fcf8bf7ef306ed29", 0x98}], 0x2}}], 0x3, 0x2090) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xdfa, 0x4) sendto$inet(r0, &(0x7f0000000580)="17", 0x59a, 0x10008095, 0x0, 0x0) 4.293351397s ago: executing program 5 (id=16156): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x41100, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x601c2, 0x0) ftruncate(r0, 0x8800000) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x4c27e, 0x53) close(r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e21, @broadcast}, 0x2f) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) recvfrom$inet(r2, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x720, 0x0, 0xfffffffffffffd25) sendfile(r1, r0, 0x0, 0x578410ed) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r4, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'team0\x00'}) 3.435654799s ago: executing program 5 (id=16164): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xbc, 0x0, 0x0, 0x38b7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2, 0x6, 0x31, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', @random='\x00\x00\x00\x00\x00 '}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x6, 0x0, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xf1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x400, 0x0, 0x201}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x4, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x8, 0x0, 0x0, 0x0, 0x73, 0x11, 0x9f}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0xb7}, @exit={0x95, 0x0, 0xc2}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195}, 0x70) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x2}, 0x94) 3.328238725s ago: executing program 5 (id=16166): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfa, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr', 0x3) sendmmsg$inet(r0, &(0x7f0000001240)=[{{0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000000140)="91f8a9849519def28691bbc4173c3d6f357d0272b7319130feaab952ac4703cad04be68907e50e997fc26e4c91ea4feb931647fc5393de25000000000000000000", 0x41}, {&(0x7f0000000e80)="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", 0x110}, {&(0x7f00000003c0)="641a6a2b863c0dd898013a3f97a834ebb75a925ab48c844221841a232932fc2e37e327de21450df098c113e179a0d3", 0x2f}, {&(0x7f00000001c0)="985e44efeabe001cabcf3d8673c3a254a9a2d3197970cb347b70a243bf77139a94bc3ae91684aaf7b7dff691deb8f8aef2d915fb3a0794a9a9b431a819bca6122c350637808dde804a048fd8696e524b2934126c443ce93d82e931eb9918e6c0827686e59209d2e02c9210fd8048f04ad6c48b3072092c483271361816bf21afb8473a064f1988536d4b", 0x8a}], 0x4}}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000b80)="f77d2b5dd5f7d74f0748cf3d2cf218d644566a14103b1c7dd35fd2951bd022f10f2dc7f4ce0d8ac5f4abaca4b97b706153756913b7dd48248b5bfb10460019248bf238743fa2aeb5bef21ce832db670920dc5e911ef2ad63e849901d1001129dbacbfd4924d7545517fd18b5d29978f32a5b5c81755cb89cc0490958ba3211eb99df5cdbbc0f9c941aaa1495893dada02d8188acd26b5afd7476413f322c8f79de769debb56343f3eded", 0xaa}, {&(0x7f0000001300)="e0cda6472d1ccfb4d1d46bf348a3b7ff9e5b6b3e30ef2266c86a085e37271763c50968fe2e2eb13b9472381bade936f9a85e26aac6eb", 0x36}], 0x2}}, {{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000640)="42e013913edbeb683c44e18a52b5a2462064ddd92caaba941de80d06047dedb7eeeff3a27eacf4c416b6979d6c918608807c44d01535dbaab3b390086e4fd43c6b5931187023646d6beac2340fdc7a0d81214ac76a818f64d287311e8828dfd3e3dd67efdb129a6e52745d1540e570891f6bf411cc16a18c4d34e522a1f003498f1a03ea1f8828b6c902286c71a9bc21923972dacfa74fef6a0fd3267e599c1dd33dff5d7b28f134bda4a29962fd5daa4fc9c515a1c3ee25ace1a9948c24b277d0c9c46f948f8a3f98b1a18e", 0xcc}, {&(0x7f0000000740)="b176d469f44ff7e206a24a3a5f3a112da355134ae64fde53dc0e681885ead332aa45811c0070066fb0e5cf5a9a4965475953e2a028f7dd4a6ed8b33465fd161cd8dce309f6be32236cf8e07a5506acb719304ebc71b2a3756cb0832d928d432d1506d368e2b001a8b392dad3dc2916376732339a20db54405b716ea85c9a4d8f232138345947e47c80f23fcac5422ee2fcf8bf7ef306ed29", 0x98}], 0x2}}], 0x3, 0x2090) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xdfa, 0x4) sendto$inet(r0, &(0x7f0000000580)="17", 0x59a, 0x10008095, 0x0, 0x0) 2.656175218s ago: executing program 7 (id=16173): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xa, @mcast2, 0x4}}}, 0x30) 2.646112228s ago: executing program 7 (id=16174): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) syz_mount_image$ext4(&(0x7f0000000900)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x1002060, &(0x7f0000000240)={[{@nouid32}, {@quota}, {@noquota}, {@jqfmt_vfsv1}, {@journal_dev={'journal_dev', 0x3d, 0x9}}, {@commit}]}, 0x1, 0x5a3, &(0x7f00000002c0)="$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") sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f04ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000880)=@file={0x1, './file0\x00'}, 0x6e) recvmmsg(r2, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) ioctl$TUNSETGROUP(r3, 0x400454cd, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="340000001100010028bd7000fcdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="6e0da88d0e580000140003d36e62ba640e000000c400000000000000"], 0x34}}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x5, 0x0, 0x0, 0x0, 0x8, 0x40008, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, @perf_config_ext={0x5, 0x100}, 0x4580, 0x2, 0x800008, 0x1, 0x2, 0x8000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0x40, 0xffffffffffffffff, 0xb) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) rt_sigtimedwait(&(0x7f0000000140)={[0x10000]}, 0x0, &(0x7f0000000180)={0x0, 0x989680}, 0x8) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x1, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x84135, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x40000000400000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = perf_event_open(&(0x7f00000000c0)={0x1, 0xfffffffffffffff8, 0x1, 0x9, 0x0, 0x0, 0x0, 0x5d31, 0x208, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x4e7ff97209135dd2) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000005d31, 0x600, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1d58}, 0x8000, 0x0, 0x0, 0x0, 0x4, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) close(r4) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) socket$nl_sock_diag(0x10, 0x3, 0x4) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) close(r0) 2.500032045s ago: executing program 5 (id=16176): r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000000180)=0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000780)='blkio.bfq.io_queued_recursive\x00', 0x275a, 0x0) sendmsg$unix(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000002c0)="b9f2973d963c76", 0x7}], 0x1, 0x0, 0x0, 0x40000}, 0x20004011) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x80, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x12, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) fallocate(r1, 0x20, 0xa, 0x80000001) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r8, 0x0) ioctl$TIOCL_BLANKSCREEN(0xffffffffffffffff, 0x541c, 0x0) ftruncate(r8, 0x5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f00000000c0)='syzkaller\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x41000}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r6) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg$unix(r3, 0x0, 0x10002) fcntl$setsig(r1, 0xa, 0x12) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x7, 0x4790, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_bp={0x0, 0xf}, 0x106200, 0x1000, 0x20da, 0x0, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) setfsuid(0xee00) ppoll(&(0x7f0000000100)=[{r2}], 0x1, 0x0, &(0x7f0000000080)={[0x8001a0efffffff]}, 0x8) dup2(0xffffffffffffffff, r5) fcntl$setown(r2, 0x8, r0) syz_emit_ethernet(0x5e, &(0x7f0000000540)=ANY=[@ANYBLOB="bbbbbbbbbbbbaaaaaaaaaa2a86dd6000000000283afffe800000000000f100000000000000bbfe8000000000000000000000000000aa89009078000000000000000000000000000000000000000000000000000000000000000000000001"], 0x0) tkill(r0, 0x13) r9 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000500), r9) 1.864788877s ago: executing program 3 (id=16189): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfa, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr', 0x3) sendmmsg$inet(r0, &(0x7f0000001240)=[{{0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000000140)="91f8a9849519def28691bbc4173c3d6f357d0272b7319130feaab952ac4703cad04be68907e50e997fc26e4c91ea4feb931647fc5393de25000000000000000000", 0x41}, {&(0x7f0000000e80)="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", 0x110}, {&(0x7f00000003c0)="641a6a2b863c0dd898013a3f97a834ebb75a925ab48c844221841a232932fc2e37e327de21450df098c113e179a0d3", 0x2f}, {&(0x7f00000001c0)="985e44efeabe001cabcf3d8673c3a254a9a2d3197970cb347b70a243bf77139a94bc3ae91684aaf7b7dff691deb8f8aef2d915fb3a0794a9a9b431a819bca6122c350637808dde804a048fd8696e524b2934126c443ce93d82e931eb9918e6c0827686e59209d2e02c9210fd8048f04ad6c48b3072092c483271361816bf21afb8473a064f1988536d4b5888807b", 0x8e}], 0x4}}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000b80)="f77d2b5dd5f7d74f0748cf3d2cf218d644566a14103b1c7dd35fd2951bd022f10f2dc7f4ce0d8ac5f4abaca4b97b706153756913b7dd48248b5bfb10460019248bf238743fa2aeb5bef21ce832db670920dc5e911ef2ad63e849901d1001129dbacbfd4924d7545517fd18b5d29978f32a5b5c81755cb89cc0490958ba3211eb99df5cdbbc0f9c941aaa1495893dada02d8188acd26b5afd7476413f322c8f79de769debb56343f3eded2dca93ed6641e5", 0xb1}, {&(0x7f0000000d00)="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", 0x146}], 0x2}}, {{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000640)="42e013913edbeb683c44e18a52b5a2462064ddd92caaba941de80d06047dedb7eeeff3a27eacf4c416b6979d6c918608807c44d01535dbaab3b390086e4fd43c6b5931187023646d6beac2340fdc7a0d81214ac76a818f64d287311e8828dfd3e3dd67efdb129a6e52745d1540e570891f6bf411cc16a18c4d34e522a1f003498f1a03ea1f8828b6c902286c71a9bc21923972dacfa74fef6a0fd3267e599c1dd33dff5d7b28f134bda4a29962fd5daa4fc9c515a1c3ee25ace1a9948c24b277d0c9c46f948f8a3f98b1a18e", 0xcc}, {0x0}], 0x2}}], 0x3, 0x2090) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xdfa, 0x4) sendto$inet(r0, &(0x7f0000000580)="17", 0x59a, 0x10008095, 0x0, 0x0) 1.731582234s ago: executing program 7 (id=16190): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000040)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0xa, @mcast2, 0x4}}}, 0x30) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000100)={0x15, 0x110, 0xfa00, {r1, 0x4, 0x0, 0x0, 0x0, @ib={0x1b, 0x8, 0x7ff, {"477e0a067d3ef54ea9ecac8674b23b09"}, 0x7, 0x2, 0x8}, @ib={0x1b, 0x985, 0x0, {"3b02deea882ef1624f018d5025b03d3c"}, 0x6, 0x6}}}, 0x118) 1.720778764s ago: executing program 7 (id=16191): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x15, &(0x7f0000000000)=0x3, 0x4) r1 = open(&(0x7f0000000180)='.\x00', 0x0, 0x0) flock(r1, 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f0000000500)='.\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r2, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000080)={{}, {0x1, 0x7}, [], {0x20, 0x5}, [], {0x10, 0x3}, {0x20, 0x7}}, 0x24, 0x3) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000007950a2000000000007000000000020009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, r2, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x2000}, 0x10}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x29, '\x00', 0x0, @fallback, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={{0x14}, [@NFT_MSG_NEWRULE={0x28, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN_ID={0x8, 0xb, 0x1, 0x0, 0x2}]}, @NFT_MSG_DELCHAIN={0x34, 0x5, 0xa, 0x801, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TYPE={0xa, 0x7, 'route\x00'}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x1}, @NFTA_CHAIN_HOOK={0xc, 0x4, 0x0, 0x1, [@NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x3}]}]}, @NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x801, 0x0, 0x0, {0x5, 0x0, 0xa}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}], {0x14}}, 0xa4}}, 0x40000) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@base={0x9, 0x4, 0x6, 0xff, 0x42}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000080), 0x619, r4}, 0x38) 1.660785767s ago: executing program 7 (id=16192): socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000000)=ANY=[@ANYBLOB="d0000000", @ANYRES16=0x0, @ANYRES64=r0], 0xd0}, 0x1, 0x0, 0x0, 0x4000080}, 0x10) sendmsg$kcm(r0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0x81, 0xb801b, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x1, 0xf60e}, 0xb093, 0x800000, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00', 0x10}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000000000000000000000000018000000c3707bf4000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4c, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f00000005c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4e0, 0x0, 0x18c, 0x203, 0x320, 0x19030000, 0x410, 0x2e0, 0x2e0, 0x410, 0x2e0, 0x3, 0x0, {[{{@uncond, 0x300, 0x2d8, 0x320, 0x300, {}, [@common=@unspec=@bpf0={{0x230}, {0x13, [{0x1d, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x8}, {}, {0x0, 0x0, 0x0, 0xe}, {0x0, 0x0, 0x0, 0x3}, {0x0, 0x0, 0x3}, {0x2, 0x0, 0x4}, {}, {0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x8}, {}, {0x16}, {0x0, 0xff}, {}, {0x7}, {0x0, 0x0, 0x0, 0x4}, {0x0, 0x4, 0x0, 0x101}, {}, {0x0, 0x0, 0x5}, {}, {0x0, 0x0, 0x0, 0x9}, {0xfffc, 0x0, 0x0, 0x6}, {}, {0xfffe}, {}, {}, {}, {0xfffe, 0xfb}, {}, {0x7a04}, {}, {}, {0x20, 0x6}, {}, {}, {}, {0x0, 0x0, 0x0, 0x800}, {}, {0xb8c, 0x0, 0x0, 0xf00}, {0x0, 0x1, 0x0, 0x3}, {0x3}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {0x0, 0xfd}, {}, {}, {0x0, 0x0, 0x0, 0xfffffffd}, {}, {0x0, 0xb}, {0x4, 0x2}]}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x2, 'syz0\x00', {0x8001}}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0xb, 'syz0\x00', {0x6c8}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) keyctl$join(0x1, &(0x7f0000000280)={'syz', 0x1}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x8402, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x6}, 0x100b28, 0x6, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000180)={0x1, 0x7, 0x0, 0xffffffff}, 0x10) write(r5, &(0x7f0000000000)="240000001a005f0214f9f407000904001f00002000020000000000000800040001000000", 0x24) sendmsg$nl_route(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="b0000000100001002bbd7000fcdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="380904000300000008001b000000000088001a8018000a8014000700fe8000000000000000000000000000446c000a8005000800d1"], 0xb0}, 0x1, 0x0, 0x0, 0x68010}, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') ppoll(&(0x7f0000000280)=[{r6, 0x10000}, {r6, 0x8210}], 0x2, 0x0, 0x0, 0x0) getpid() r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000000306010200000000000000000700000a0500010007"], 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40814) 1.251811017s ago: executing program 0 (id=16195): perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x73, 0x0, 0x0, 0x0, 0x0, 0x8008a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x6, 0x7}, 0xa28c, 0xc8, 0x0, 0x6, 0x200, 0x401, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x60, 0x59034, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1, @perf_config_ext={0x75f0}, 0x30d5c0, 0x9, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x20003, 0x0, 0x7}, 0x0, 0xd, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r0, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r2, &(0x7f00000004c0)=ANY=[], 0xfdef) 1.250423258s ago: executing program 2 (id=16196): capset(&(0x7f0000000000)={0x20071026}, &(0x7f0000000280)={0x0, 0x4a, 0x0, 0x2, 0xfffffffe}) syz_emit_ethernet(0x5e, &(0x7f0000000980)={@multicast, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "00f5c0", 0x28, 0x3a, 0xff, @private2, @mcast2, {[], @ndisc_redir={0x89, 0x0, 0x0, '\x00', @empty, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}}}}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1, 0x17, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000010000000000009f09000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ff0bffb702000008000000b7030000000000008500000006000000bf91000000000000b70200000000000085000000d4000000b70000000064000095"], &(0x7f0000000040)='syzkaller\x00', 0x6, 0x20, &(0x7f0000000000)=""/32, 0x41000, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000040)='./file0\x00', 0x10000, &(0x7f0000000080)={[{@fat=@dos1xfloppy}, {@nodots}]}, 0x1, 0x21f, &(0x7f0000000100)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000240)=@file={0x1, './file0\x00'}, 0x6e) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0x2, 0x300) socket$inet_udplite(0x2, 0x2, 0x88) socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.swap.events\x00', 0x275a, 0x0) setsockopt$sock_attach_bpf(r3, 0x1, 0x41, &(0x7f0000000100)=r4, 0x8) setsockopt$sock_attach_bpf(r3, 0x1, 0x25, &(0x7f0000000100)=r2, 0x4) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r5) syz_io_uring_setup(0x3002, &(0x7f0000000140)={0x0, 0xdcb8, 0x0, 0x400001, 0x89}, &(0x7f00000003c0)=0x0, &(0x7f0000000200)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000a00)={0x0, @in={{0x2, 0x4e23, @private=0xa010100}}, 0x2, 0x6b3}, &(0x7f0000000ac0)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, &(0x7f0000000b00)=ANY=[@ANYRES32=r7, @ANYBLOB="dd00e3008f67ab6c93178385e1663592767c4f0ff45b561a5f4eb5f225449c6ca2f0499e7aa2eb3bc135b4578f125bcf94f200e571267f3b7bf6c26f89f8f21625aa6f3b8085359dcb104e73272955fca07a1ccfb9a7292df7ffffffad18041801f4280799915f4af09b0ad1dc1b78e5d2237b4ac5c677ba8b6ce2a6032416f8caa70660fe2566e6c13212298e7bbe0cdf1f68db4f720bd3261459e6496f89c747c13c70616f15822ad23464839be2972fe726fe8c83052303b1c9ab027ab5cb3167549340481a8cc22a344e65d7c7514a0ece7505d16cc4284ab1504f7bf8be6eeaae2123c714"], 0xeb) r8 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0xf8c, 0x510, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x0, 0x10001, 0xda, 0x9, 0xabca, 0x85, 0xa, 0x0, 0x0, 0x0, 0x20000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x40000) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r10, 0xc0a85320, &(0x7f0000000440)={{0x80}, 'port1\x00', 0x72, 0x220000, 0x0, 0x8000008, 0x4, 0x2, 0x1, 0x0, 0x7cce8c743ee810df, 0xa5}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r10, 0x40505330, &(0x7f00000000c0)={0x800080, 0x80, 0x8, 0x7, 0x0, 0x55a}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x20022, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_config_ext={0x8000000000000000, 0xf796}, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, r8, 0x0) close_range(r9, 0xffffffffffffffff, 0x0) 1.235567208s ago: executing program 0 (id=16197): sendmsg(0xffffffffffffffff, 0x0, 0x4000055) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001340)=ANY=[], &(0x7f0000000140)='GPL\x00'}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) (fail_nth: 2) 1.172885331s ago: executing program 2 (id=16198): r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x73, 0x0, 0x0, 0x0, 0x0, 0x89682, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0xa28c, 0xc8, 0x0, 0x1, 0x3, 0x401, 0xfffd, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x9, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) pipe(&(0x7f0000000000)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000180)='./file1\x00', 0x300001a, &(0x7f0000000040)=ANY=[@ANYRES8=0x0], 0xfc, 0x2c6, &(0x7f0000000240)="$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") write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r0], 0xfdef) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x10000, 0x0, 0x2, 0x6, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) r2 = socket$key(0xf, 0x3, 0x2) socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$key(r2, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000480)={0x2, 0x3, 0x0, 0x3, 0xf, 0x0, 0x4070bd2c, 0x25dfdbfc, [@sadb_key={0x1, 0x9}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x4e23, 0x7, @mcast1, 0x80000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x7, 0xc, 0x80000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x4e23, 0xff, @local, 0x1ff}}]}, 0x78}, 0x1, 0x7}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000080)=0x200, 0x0, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000540)) 1.172633351s ago: executing program 0 (id=16199): r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000380)=0x6614, 0x4) (async) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'dummy0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="4400000010000104fcfffffffcdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="0134030000000000140012800b0001006d616373656300000400028008000500", @ANYRES32=r2, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r2], 0x44}, 0x1, 0x0, 0x0, 0x20049848}, 0x0) (async) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) (async) recvmmsg(r0, &(0x7f0000000a80)=[{{0x0, 0x0, 0x0}, 0x43}], 0x1, 0x220, 0x0) (async) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x0, 0x4) getdents(r3, &(0x7f00000000c0)=""/31, 0x1f) (async) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) (async) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x3018490, &(0x7f00000002c0), 0x45, 0x7ef, &(0x7f0000001300)="$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") (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x275a, 0x0) (async) pipe(&(0x7f0000000140)={0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_io_uring_setup(0x566e, &(0x7f0000000140)={0x0, 0x9c25, 0x8000, 0x3, 0x388, 0x0, r4}, &(0x7f0000000000), &(0x7f00000001c0)) 1.00733322s ago: executing program 3 (id=16200): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000880)='ns\x00') r1 = openat$cgroup(r0, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x48, 0x2, 0x6, 0x201, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x2c000882}, 0x4000001) ioctl$SNDRV_TIMER_IOCTL_CREATE(r0, 0xc02054a5, &(0x7f0000000180)={0xf3, r0, 'id1\x00'}) socket$kcm(0x2, 0xa, 0x2) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ptype\x00') preadv(r3, &(0x7f0000000700)=[{&(0x7f0000000000)=""/42, 0x2a}], 0x1, 0x1a, 0x2000051b) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000080)={'netdevsim0\x00', &(0x7f0000000300)=@ethtool_ringparam={0x10, 0x8b5, 0x7fffffff, 0x4, 0x2, 0x7, 0x0, 0x5, 0x6}}) (async) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r5 = fcntl$getown(r1, 0x9) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000280)={'\x00', 0x1, 0x2, 0x4, 0x4, 0x4, r5}) sched_setscheduler(r6, 0x1, &(0x7f0000000340)=0x10007) (async, rerun: 32) r7 = eventfd2(0x0, 0x0) (async, rerun: 32) io_setup(0x81, &(0x7f0000000400)=0x0) io_submit(r8, 0x1, &(0x7f0000000440)=[&(0x7f0000000180)={0x0, 0x0, 0x30, 0x0, 0x1fd, r7, 0x0, 0x0, 0x0, 0x0, 0x1, r7}]) (async) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) (async) r9 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x2b, 0x1, 0x0, 0x0, 0x0, 0x2, 0xf4261, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x6, 0xf60e}, 0x9092, 0x0, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) exit(0x3) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x0, 0x4, 0x0, 0x6, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0xe}, 0x100000, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, r9, 0x8) (async) r10 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r10, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x28, 0x39, 0x9, 0x0, 0x25dfdbfc, {0x1}, [@typed={0x4}, @nested={0x8, 0x1, 0x0, 0x1, [@generic="56acdfe5"]}, @typed={0x8, 0x2, 0x0, 0x0, @pid=0xffffffffffffffff}]}, 0x28}}, 0x0) (async) r11 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r11, 0x8946, &(0x7f0000000540)={'netdevsim0\x00', &(0x7f0000000380)=@ethtool_sfeatures={0x3b, 0x2, [{0x301}, {0xfffffffd, 0x80003}]}}) 969.319322ms ago: executing program 2 (id=16201): openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) setitimer(0x2, &(0x7f0000000040)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="364000001a00913a"], 0x82d7) recvmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000002200)=""/4096, 0x7ffff000}, {&(0x7f0000003200)=""/4073, 0xfe9}], 0x2}, 0x0) syz_mount_image$ext4(&(0x7f0000000580)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x4020, &(0x7f0000000100), 0x0, 0x586, &(0x7f0000000680)="$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") r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x441, 0x104) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f0000000140)={0x9, 0x7e611d85, 0xc0c, 0xffffffffffff6d0a, 0xfffffffc, 0x2}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000fef000/0x3000)=nil, &(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x800714, &(0x7f0000000500), 0xf7, 0x485, &(0x7f0000001040)="$eJzs3M9rHFUcAPDvTJL+bhNrrba2Gq1i8UfSpFV78KCi4EFB0EM9xiSttdtGmgi2BI0i9SgF7+JR8C/w5kXUgwheFTxKoWgQmnqKzK9mu9mkSZpkbfbzgc2+t/Nm3/vOzNt9My+zAbSt3uxPErEjIn6LiO4ie3OB3uJpZnpy+Pr05HASs7Nv/JXk5a5NTw5XRav1tpeZw2lE+mkSzyfz6x2/cPHMUK02er7M90+cfa9//MLFp06fHTo1emr03ODx48eODjz7zODTqxJnFte1/R+OHdj3yluXXxs+cfntH7/JmrX3YLG8Po5but4koCZ6s63292yucdmjy2j7nWBnXTrpbGFDWJaOiMh2V1fe/7ujI+Z2Xne8/ElLGwesqey7afPCi6dmgQ0siVa3AGiN6os+O/+tHus09PhfuPpCxKYyPTM9OTxzI/7OSMvXu9aw/t6IODH175fZI5Z7HQIAYAXysc2TzcZ/aezNn4u5jl3lHEpPRNwVEbsj4u6I2BMR90TkZe+NiPuKlWe7l1h/b0N+/vgnvdK0zaskG/89Vzf2m6mLv3zq6ShzO/P4u5KTp2ujR8ptcji6Nmf5gUXq+O6lXz9faFn9+C97ZPVXY8GyAVc6Gy7QjQxNDK3WRrj6ccT+zmbxJzdmArIjYF9E7F/eW++qEqcf//rAQoVuHf8iVmGeafariMeK/T8VDfFXksXnJ/u3RG30SH91VMz30y+XXl+o/tuKfxVk+3/bzcd/Q4nuf5JivrYrarXR8+PLr+PS758teE6z0uN/U/JmPmf98zvFax8MTUycH4jYlLya56tzuvz1wbl1q3xVPov/8KHm/X93uU4W//0RkR3EByPigYh4sGz7QxHxcEQcWiT+H1585N1F4k8iiZbu/5Gmn383jv+epH6+fgWJjjPff7vQjPnS9v+xmMo/awv5598tLLWBt7n5AAAA4I6QRsSOSNK+It27I9K0r6/4H/49sS2tjY1PPHFy7P1zI8U9Aj3RlVZXurrrrocOJFPlOxb5wfJacbX8aHnd+IuOrXm+b3isNtLi2KHdbb+5/0fV/zN/drS6dcCac78WtK/G/p+2qB3A+lvK979zAdiYmvT/ra1oB7D+nP9D+2rW/z9qyBv/w8Y0v///0eQn64CNyPgf2pf+D+1L/4e2dDv39a88Ud0ssPL32bLkO/zbJVH94sVa1rU15l6JtOUht1Ei6zHrW+ncb6gAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADcyf4LAAD///ss5ts=") r4 = openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x42, 0x0) socket$nl_generic(0x10, 0x3, 0x10) quotactl_fd$Q_SETQUOTA(r4, 0xffffffff80000800, 0x0, &(0x7f0000000480)={0x8, 0x4, 0x8, 0xfffffffffffffffd, 0x20000000, 0x3, 0xaf4e, 0x5, 0x200}) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x24004045) r5 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r5, &(0x7f0000000140)=@name={0x1e, 0x2, 0x0, {{0x42, 0x2}}}, 0x10) r6 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r6, &(0x7f0000000380)={&(0x7f0000000140)=@name={0x1e, 0x2, 0x3, {{0x42, 0x2}}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4000884}, 0x4c004) r7 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) close_range(r7, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1000004, 0x20031, 0xffffffffffffffff, 0x3b762000) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xf, &(0x7f0000d10ffc)=0xfffffffffffffff9, 0x4) mremap(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f0000ffe000/0x2000)=nil) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) r8 = socket$caif_seqpacket(0x25, 0x5, 0x5) setsockopt$CAIFSO_REQ_PARAM(r8, 0x116, 0x80, &(0x7f0000000180)="44b0334bf9d2ccfeb49fe7e4c2196257760ff9f49cfdf09705fffad3dbefff57528e33b9632075507e74961050aea70256fea2f7d5e328b036085e54811a14e1267c6b056c67064554e312bedd2b4464b345199ab556e1906b49d12ef6ec7a077e535439ca46e602decdf57a9098a9fa38080c51e2011d170854b108dedccd3d2d934f44c98c56066952409b325dfd14db5f02e6d2dbed505a5d9eb91d1f42b18d11a9ccb064a4f5b269b96edfb2149ca426978939abc7c71f91fc191b6767e6f444c9e75b", 0xc5) 917.425864ms ago: executing program 3 (id=16202): r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x862b01) write$char_usb(r0, 0x0, 0x0) 902.366065ms ago: executing program 3 (id=16203): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfa, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr', 0x3) sendmmsg$inet(r0, &(0x7f0000001240)=[{{0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000000140)="91f8a9849519def28691bbc4173c3d6f357d0272b7319130feaab952ac4703cad04be68907e50e997fc26e4c91ea4feb931647fc5393de25000000000000000000", 0x41}, {&(0x7f0000000e80)="44900000000056ee66c372f3105eb186dd8062fad2d5b5bfb0ba06f274a8d026bd209da8ffa6a26e3b3f8075704a9d0ef9aff7f1e7db24609f02d34e76992c9df9fe6888c6c9a4825c6223be6ac54536025af1dea54e527c68b0ff250261953f2da79a78104c2d9e7b16ed86b124945aa9ab7581ebd385fb61d442035db81e18c2d2462d0bb25fff9d3b1ce90b597992b2a4d541611ce77f58dce7c9500118229e7cdf4ca7f6adca92c73d97ce54164c1942b2568635bec8e020b41fb2f8000000000000000000000000000000001c8a9f7956583e26f6f0edc415851d0b8305fe66c2b7c114e3712d87744938848f24a13cb604000000000000000000000000000000c7aa5035897b20a6c23f1fc4af", 0x110}, {&(0x7f00000003c0)="641a6a2b863c0dd898013a3f97a834ebb75a925ab48c844221841a232932fc2e37e327de21450df098c113e179a0d3", 0x2f}, {&(0x7f00000001c0)="985e44efeabe001cabcf3d8673c3a254a9a2d3197970cb347b70a243bf77139a94bc3ae91684aaf7b7dff691deb8f8aef2d915fb3a0794a9a9b431a819bca6122c350637808dde804a048fd8696e524b2934126c443ce93d82e931eb9918e6c0827686e59209d2e02c9210fd8048f04ad6c48b3072092c483271361816bf21afb8473a064f1988536d4b5888807b", 0x8e}], 0x4}}, {{0x0, 0x0, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000d00)="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", 0x146}, {&(0x7f0000001300)="e0cda6472d1ccfb4d1d46bf348a3b7ff9e5b6b3e30ef2266c86a085e37271763c50968fe2e2eb13b9472381bade936f9a85e26aac6ebd21115f086751d870434cf07dbd92e0ea2322f163473dad24cffe6d23ffa95b04a2653e8a7c9ab042ea1b0bf4bde850bc9f6147f1a48e86eec8223fd33fc83374393fbd08a3281a268aff6688fb41eecbdd328ef0fcbe0", 0x8d}], 0x3}}, {{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000640)="42e013913edbeb683c44e18a52b5a2462064ddd92caaba941de80d06047dedb7eeeff3a27eacf4c416b6979d6c918608807c44d01535dbaab3b390086e4fd43c6b5931187023646d6beac2340fdc7a0d81214ac76a818f64d287311e8828dfd3e3dd67efdb129a6e52745d1540e570891f6bf411cc16a18c4d34e522a1f003498f1a03ea1f8828b6c902286c71a9bc21923972dacfa74fef6a0fd3267e599c1dd33dff5d7b28f134bda4a29962fd5daa4fc9c515a1c3ee25ace1a9948c24b277d0c9c46f948f8a3f98b1a18e", 0xcc}, {&(0x7f0000000740)="b176d469f44ff7e206a24a3a5f3a112da355134ae64fde53dc0e681885ead332aa45811c0070066fb0e5cf5a9a4965475953e2a028f7dd4a6ed8b33465fd16", 0x3f}], 0x2}}], 0x3, 0x2090) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xdfa, 0x4) sendto$inet(r0, &(0x7f0000000580)="17", 0x59a, 0x10008095, 0x0, 0x0) 865.998217ms ago: executing program 0 (id=16204): perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x73, 0x0, 0x0, 0x0, 0x0, 0x8008a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x6, 0x7}, 0xa28c, 0xc8, 0x0, 0x6, 0x200, 0x401, 0xffff}, 0x0, 0x9, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x60, 0x59034, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x1, @perf_config_ext={0x75f0}, 0x30d5c0, 0x9, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x20003, 0x0, 0x7}, 0x0, 0xd, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r0, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc02082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_subtree(r2, &(0x7f00000004c0)=ANY=[], 0xfdef) (fail_nth: 2) 865.520507ms ago: executing program 2 (id=16205): close(0x3) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000ac0), r0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@ipv4_delrule={0x2c, 0x21, 0x1, 0x0, 0x0, {0x2, 0x20, 0x0, 0x0, 0x2}, [@FRA_DST={0x8, 0x1, @local}, @FRA_GENERIC_POLICY=@FRA_PRIORITY={0x8}]}, 0x2c}}, 0x800) sendmsg$IEEE802154_LLSEC_SETPARAMS(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000140)={0x20, r1, 0x5, 0x0, 0x0, {0x22}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x20}}, 0x4000000) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f00000003c0)=@filter={'filter\x00', 0x42, 0x4, 0x298, 0xffffffff, 0x168, 0x98, 0x98, 0xffffffff, 0xffffffff, 0x200, 0x200, 0x200, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x3e020000, 0x70, 0x98, 0x0, {0x88000000}}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x4}}}, {{@uncond, 0x0, 0x70, 0xd0, 0x0, {0x122}}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, {0x0, [0x0, 0x0, 0x0, 0x1]}}}}, {{@ip={@rand_addr=0x64010101, @empty, 0xffffffff, 0xffffffff, 'batadv_slave_1\x00', 'veth1_to_batadv\x00', {0xff}, {}, 0x4, 0x2, 0x47}, 0x0, 0x70, 0x98}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x6}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f8) set_mempolicy(0x4005, 0x0, 0x9) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETS(r4, 0x4b72, &(0x7f0000000080)={0x5, 0x7d, 0x1, 0x3, 0xe, "0060000000000000000001030040000000f600"}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r5, &(0x7f0000000000)={0x2, 0x4e21, @broadcast}, 0x10) r6 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r6, 0x107, 0x16, 0x0, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r7, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x80065c9}, 0xc) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000010000000900010073797a30000000002c000000030a01020000000000000000010000000900010073797a30000000000900030073797a310000000084000000060a010400000000000000000100000008000b40000000005c0004802c000180090001007866726d000000001c0002800800024000000004050003000000000008000140000000092c00018008000100636d7000200002800c00038005000100ac000000080001400000000c08000240000000000900010073797a300000000014000000110001"], 0xf8}, 0x1, 0x0, 0x0, 0x40010}, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r9) write$cgroup_devices(r9, &(0x7f00000005c0)=ANY=[], 0xfffffeff) r10 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r10, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$nl_route(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000006c0)=@newlink={0xe0, 0x10, 0xffffffffffffffff, 0x703d2f, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x20013, 0x2021}, [@IFLA_PROP_LIST={0xb8, 0x34, 0x0, 0x1, [{0x14, 0x35, 'veth1_to_bridge\x00'}, {0x14, 0x35, 'bond_slave_0\x00'}, {0x14, 0x35, 'macvtap0\x00'}, {0x14, 0x35, 'bond0\x00'}, {0x14, 0x35, 'lo\x00'}, {0x14, 0x35, 'veth1_to_bond\x00'}, {0x14, 0x35, 'ip6erspan0\x00'}, {0x14, 0x35, 'veth1_virt_wifi\x00'}, {0x14, 0x35, 'hsr0\x00'}]}, @IFLA_LINK={0x8, 0x5, r11}]}, 0xe0}, 0x1, 0x0, 0x0, 0x41}, 0x8000002) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r9, 0x89f2, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000240)={'gretap0\x00', r11, 0x10, 0x40, 0x4, 0x2, {{0x8, 0x4, 0x2, 0x3, 0x20, 0x65, 0x0, 0x40, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010102, {[@lsrr={0x83, 0xb, 0x2b, [@private=0xa010100, @rand_addr=0x64010101]}, @noop]}}}}}) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000100)={r12, 0x1, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x38}}, 0x10) 865.401787ms ago: executing program 0 (id=16206): syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f00000006c0)='./file0\x00', 0x0, &(0x7f0000000c00), 0x1, 0xb87, &(0x7f00000017c0)="$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") setxattr$incfs_metadata(&(0x7f0000000300)='./file0\x00', &(0x7f00000001c0), 0x0, 0x0, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)=@known='user.incfs.metadata\x00', 0x0, 0x50) 864.897257ms ago: executing program 2 (id=16207): semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)={{0x0, 0x0, 0x0, 0x0, 0x0, 0xe1, 0x101}, 0x100000000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x900}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) socket$packet(0x11, 0x3, 0x300) r2 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_void(r2, 0x1, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x3, 0xc, 0x0, &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) socket$unix(0x1, 0x1, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000e00)="39000000140081ae00002c000500015601618575e285af01800000000d1300883795c04a31ba377a1b2cc37fffffffffffffffffffffffffff", 0x39}], 0x1, 0x0, 0x0, 0xc00e}, 0x0) pipe(&(0x7f0000000200)) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000b40)=@newlink={0x44, 0x10, 0x401, 0x20000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x8003}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r4}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}, 0x1, 0x0, 0x0, 0xc0000e3}, 0x4054) 815.907809ms ago: executing program 0 (id=16208): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0xc3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000002100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000090a010400000000000000000a0000040900010073797a310000000008000540000000040900020073797a310000000008000a40fffffffc200011800e000100636f6e6e6c696d69740000000c00028008000140fffff27414000000110001"], 0x84}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_MSG_GETSETELEM(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="440000000d0a010800000000000000000a0000080900020073797a31000000000900010073797a31000000001800038014000080080003400000002208"], 0x44}, 0x1, 0x0, 0x0, 0x24000801}, 0x8000) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000040)=0x9) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000140)=0x7f) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x0, 0x20) r3 = syz_open_dev$usbfs(&(0x7f0000000240), 0x75, 0x109301) ioctl$RTC_EPOCH_SET(r2, 0x4008700e, 0x3) socket$inet6_udp(0xa, 0x2, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$can_j1939(0x1d, 0x2, 0x7) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0xcf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_config_ext={0x7, 0x6}, 0x5024, 0x0, 0x3, 0x3, 0x2, 0x80004001, 0x0, 0x0, 0x0, 0x0, 0xbf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r4 = syz_io_uring_setup(0x1f6, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(r4, 0x2, 0x0, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000000b180), 0xa0140, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') signalfd(r7, &(0x7f00000000c0)={[0xdd67]}, 0x8) bpf$MAP_CREATE(0x300000000000011, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x5}, 0x48) mount$9p_fd(0x0, &(0x7f0000000100)='.\x00', &(0x7f0000000240), 0x8080, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r3}}) r8 = socket(0x21, 0xffffffffffffffff, 0x2) r9 = socket$can_raw(0x1d, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x2010008, &(0x7f00000001c0), 0xff, 0x54a, &(0x7f0000000200)="$eJzs3U9vHGcZAPBn1l7HSZzaBQ5QqaWiRUkF2Y1r2locSpEQt0pI5R6MvbGsrL2RvW5jq4LNJ0BCCJA4wYULEh8ACUXiwhEhRYIzSEUgBClIcCgdNLOzdrqZtTdhvUvs30+azPvOv+d5N57ZmZ1XMwGcWc9HxBsR8WGapi9FxHwxvVIM0ekO2XLv3393NRuSSNO3/pZEUkzLFkvTNO1t82K+ytRBjG8mDwScLcZ7+zdXms3GdlGttzdv1Xf29q9ubK6sN9YbW0tLi68uv7b8yvK1kbTzUkS8/pU/ff87P/3q67/8/Dt/vP6XK9/K0por5vfa8Rimj5rZbXr13GzfCtuPGez/Udae6gdF5fxw69w5yYQAABgoO8f/WER8JiJeivmYOvp0FgAAAHgCpV+aiw+S7v27EjMDpgMAAABPkEreBzap1Iq+AHNRqdRq3T68n4gLlWZrp/25G63drbVuX9mFqFZubDQb14q+wgtRTbL6Yl4+rL/cV1+KiKcj4nvz5/N6bbXVXJv0jx8AAABwRlzsu/7/53z3+v9oyXiSAwAAAEZnYdIJAAAAACfO9T8AAACcatVJJwAAAACcuK+9+WY2pL33X6+9vbd7s/X21bXGzs3a5u5qbbW1fau23mqt58/s2zxue81W69YXYmv3dr3d2GnXL+3tX99s7W61r2/E7FgaBAAAADzk6U/f/X0SEZ0vns+HzMykkwLGYvqg1HumZ8ne/4enuuP3xpQUMBZTQyzz3rny6c4T4Mk23T9hwL4OnD76/wPHvdFjYOed33RHlRHnAwAAjN7lT5Xf/z/+fL7jlB+ecHZiOLv67v+n85NKBBi7/P7/sB15nCzAqVIdqgcgcJr9r/f/j5emj5QQAAAwcnP5kFRqxc97c1Gp1GoRl/LXAlaTGxvNxrWIeCoifjdfPZfVF/M1k2OvGQAAAAAAAAAAAAAAAAAAAAAAAACArjRNIgUAAABOtYjKn5NfdZ/lf3n+xbn+3wdmkn/nrwSeiYh3fvTWD26vtNvbi9n0vx9Mb/+wmP7yJH7BAAAAAPr1rtPz8b8mnQ0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAp837999d7Q1DLH5+VHH/+uWIWCiLPx2z+Xg2qhFx4R9JTD+wXhIRUyOI37kTEZ8si59kaR2ELIs/ig+hcyfppLnS+LFQfApl8S+OID6cZXez488bZft/JZ7Px+X733TER+qPa/DxLw6Of1MD9v9LQ8Z45t7P6wPj34l4Zrr8+NeLnwyI/8JQ0avxja/v7w+am/444nLv+yc/4j0Y4bBUb2/equ/s7V/d2FxZb6w3tpaWFl9dfm35leVr9RsbzUbxb2mM7z77iw+Pav+F0u+/pMhmcPtfLNneVEn+/7l3+/7He5XOw/GvvFAS/9c/KZZ4OH6liPPZopzNv9wrd7rlBz33s98+d1T71w7bX32U//8rgzba76Ed5dnh/nQAgBOxs7d/c6XZbGyfdCG7WB5XrI8UssBjDzqawsxkPrGzU/h2Vrg3qg2maZpm+1TJrLsRMcx2khhxSyvl+RwWBh4BJn1kAgAARu3wpH/SmQAAAAAAAAAAAAAAAAAAAMDZNY6nrPXHPHwEcjKKR2gDAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIzEfwMAAP//O7TZvA==") bind$can_raw(r9, &(0x7f0000000000), 0x10) setsockopt$CAN_RAW_FILTER(r9, 0x65, 0x1, &(0x7f00000000c0), 0xf00) close_range(r8, 0xffffffffffffffff, 0x0) 776.607051ms ago: executing program 7 (id=16209): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_bp={0x0, 0x4}, 0x6000, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x8601, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x50) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r0, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) (fail_nth: 2) 736.490933ms ago: executing program 2 (id=16210): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfa, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr', 0x3) sendmmsg$inet(r0, &(0x7f0000001240)=[{{0x0, 0x0, &(0x7f0000001dc0)=[{&(0x7f0000000140)="91f8a9849519def28691bbc4173c3d6f357d0272b7319130feaab952ac4703cad04be68907e50e997fc26e4c91ea4feb931647fc5393de25000000000000000000", 0x41}, {&(0x7f0000000e80)="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", 0x110}, {&(0x7f00000003c0)="641a6a2b863c0dd898013a3f97a834ebb75a925ab48c844221841a232932fc2e37e327de21450df098c113e179a0d3", 0x2f}, {&(0x7f00000001c0)="985e44efeabe001cabcf3d8673c3a254a9a2d3197970cb347b70a243bf77139a94bc3ae91684aaf7b7dff691deb8f8aef2d915fb3a0794a9a9b431a819bca6122c350637808dde804a048fd8696e524b2934126c443ce93d82e931eb9918e6c0827686e59209d2e02c9210fd8048f04ad6c48b3072092c483271361816bf21afb8473a064f1988536d4b5888807b", 0x8e}], 0x4}}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000b80)="f77d2b5dd5f7d74f0748cf3d2cf218d644566a14103b1c7dd35fd2951bd022f10f2dc7f4ce0d8ac5f4abaca4b97b706153756913b7dd48248b5bfb10460019248bf238743fa2aeb5bef21ce832db670920dc5e911ef2ad63e849901d1001129dbacbfd4924d7545517fd18b5d29978f32a5b5c81755cb89cc0490958ba3211eb99df5cdbbc0f9c941aaa1495893dada02d8188acd26b5afd7476413f322c8f79de769debb56343f3eded2dca93ed6641e5", 0xb1}, {&(0x7f0000000d00)="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", 0x146}], 0x2}}, {{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000640)="42e013913edbeb683c44e18a52b5a2462064ddd92caaba941de80d06047dedb7eeeff3a27eacf4c416b6979d6c918608807c44d01535dbaab3b390086e4fd43c6b5931187023646d6beac2340fdc7a0d81214ac76a818f64d287311e8828dfd3e3dd67efdb129a6e52745d1540e570891f6bf411cc16a18c4d34e522a1f003498f1a03ea1f8828b6c902286c71a9bc21923972dacfa74fef6a0fd3267e599c1dd33dff5d7b28f134bda4a29962fd5daa4fc9c515a1c3ee25ace1a9948c24b277d0c9c46f948f8a3f98b1a18e", 0xcc}, {0x0}], 0x2}}], 0x3, 0x2090) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xdfa, 0x4) sendto$inet(r0, &(0x7f0000000580)="17", 0x59a, 0x10008095, 0x0, 0x0) 4.89392ms ago: executing program 3 (id=16211): r0 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x73, 0x0, 0x0, 0x0, 0x0, 0x89682, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0xa28c, 0xc8, 0x0, 0x1, 0x3, 0x401, 0xfffd, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x9, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x5, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) pipe(&(0x7f0000000000)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000180)='./file1\x00', 0x300001a, &(0x7f0000000040)=ANY=[@ANYRES8=0x0], 0xfc, 0x2c6, &(0x7f0000000240)="$eJzs3U9rY1UUAPDzkjR91UWKuFEEH+jCVZm6ddMqI4hdKRHUjcXpgCRloIWAI9iZ1XwCl+LXcOvOtd9AEHeCuxmkcuX9axKbzERNOzD+fpvc3nvPfSfvPNJVTj575Xh0604W9x/+HHmeRWcv9uJRFtvRida96AUA8Ox4lFL8niJio/47Wzmy17m6rACAq1T//6897VwAgOvx4cefvL9/cHDzg6LI46XBg8kwi4jjB5Nhvb5/O76IcRzFjRjEeUS6UI/ffe/gZvSK0na8fnw2GU7mzt//Lbaq+N0YxPbi+N2i1sQPI8rXjXguiti/vdEeNYgXF8e/uSA+hv1447WZ/HdiED99HndiHLeijJ3Gf71bFO+kbx5+9Wl5mTI+68Rws9rX2IpI3WsrCgAAAAAAAAAAAAAAAAAAAAAAz7ydosjq9j1V/55yqum/0z2v1neK1vZ8f546/qJfcN0fKEXToucsxbdtf50bRVGkZuM0vhcv9/ywAAAAAAAAAAAAAAAAAAAAAJROv7w7OhyPj07+86A7Ohy33QDar/X/2wP3ZmZejbujw+7yAzdXv9Zst4Ey18dujl4v1nBbnjyIH7bKfI5OTn+tZvK5Pd81+f7zkzenxf2oCW8Ls9Z38cLbFxkWzVJ7k0eH2ZOulbeF+352qR8rp5FlczNVbcdHJ6l6JM7TfE3zJTezv4a7UT6j/ecXLv2ZUlrtnLd+qWvUzGRVi43V0thoBkuflvxyLX5cfuDCj4s/UkrddXzuAAAAAAAAAAAAAAAAAAAAl81/cfpv7jev9xaGdq40MQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC4RtPf/28HeUTMz1wanDXBj9vTDPpxcvqU3yIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD/A38FAAD//+lWSxE=") write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYRESOCT=r0], 0xfdef) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x10000, 0x0, 0x2, 0x6, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) r2 = socket$key(0xf, 0x3, 0x2) socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$key(r2, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000480)={0x2, 0x3, 0x0, 0x3, 0xf, 0x0, 0x4070bd2c, 0x25dfdbfc, [@sadb_key={0x1, 0x9}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x4e23, 0x7, @mcast1, 0x80000001}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x7, 0xc, 0x80000000}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x4e23, 0xff, @local, 0x1ff}}]}, 0x78}, 0x1, 0x7}, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000080)=0x200, 0x0, 0x4) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000540)) 0s ago: executing program 3 (id=16212): r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r2, &(0x7f00000001c0)=@nameseq={0x1e, 0x1, 0x3, {0x42, 0x2, 0xffffffff}}, 0x10) close_range(r1, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000000)=0xa93f, 0x4) r3 = getpid() r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r5, 0x1, 0x70bd27, 0x25dfdbfb, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x3c}, 0x1, 0x600, 0x0, 0x4040010}, 0x30) kernel console output (not intermixed with test programs): 1453.498219][T21670] sock_read_iter+0x169/0x1b0 [ 1453.498241][T21670] vfs_read+0x6c0/0x7f0 [ 1453.498273][T21670] ? __pfx_sock_read_iter+0x10/0x10 [ 1453.498360][T21670] ksys_read+0xdc/0x1a0 [ 1453.498377][T21670] __x64_sys_read+0x40/0x50 [ 1453.498394][T21670] x64_sys_call+0x2886/0x3020 [ 1453.498417][T21670] do_syscall_64+0x12c/0x370 [ 1453.498534][T21670] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1453.498553][T21670] RIP: 0033:0x7fbea850c799 [ 1453.498568][T21670] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1453.498657][T21670] RSP: 002b:00007fbea6f5f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1453.498675][T21670] RAX: ffffffffffffffda RBX: 00007fbea8785fa0 RCX: 00007fbea850c799 [ 1453.498688][T21670] RDX: 0000000000018ff8 RSI: 0000200000002700 RDI: 0000000000000003 [ 1453.498773][T21670] RBP: 00007fbea6f5f090 R08: 0000000000000000 R09: 0000000000000000 [ 1453.498785][T21670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1453.498798][T21670] R13: 00007fbea8786038 R14: 00007fbea8785fa0 R15: 00007ffd18f22618 [ 1453.498812][T21670] [ 1453.762476][T21676] netlink: 68 bytes leftover after parsing attributes in process `syz.2.15737'. [ 1453.780330][T21678] FAULT_INJECTION: forcing a failure. [ 1453.780330][T21678] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1453.793930][T21678] CPU: 1 UID: 0 PID: 21678 Comm: syz.5.15738 Tainted: G W syzkaller #0 PREEMPT(full) [ 1453.794135][T21678] Tainted: [W]=WARN [ 1453.794141][T21678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1453.794151][T21678] Call Trace: [ 1453.794158][T21678] [ 1453.794166][T21678] __dump_stack+0x1d/0x30 [ 1453.794189][T21678] dump_stack_lvl+0x95/0xd0 [ 1453.794207][T21678] dump_stack+0x15/0x1b [ 1453.794299][T21678] should_fail_ex+0x263/0x280 [ 1453.794320][T21678] should_fail+0xb/0x20 [ 1453.794336][T21678] should_fail_usercopy+0x1a/0x20 [ 1453.794410][T21678] _copy_from_user+0x1c/0xb0 [ 1453.794510][T21678] __sys_bpf+0x183/0x7e0 [ 1453.794524][T21678] __x64_sys_bpf+0x41/0x50 [ 1453.794540][T21678] x64_sys_call+0x10cb/0x3020 [ 1453.794554][T21678] do_syscall_64+0x12c/0x370 [ 1453.794571][T21678] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1453.794649][T21678] RIP: 0033:0x7fbea850c799 [ 1453.794658][T21678] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1453.794700][T21678] RSP: 002b:00007fbea6f5f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1453.794712][T21678] RAX: ffffffffffffffda RBX: 00007fbea8785fa0 RCX: 00007fbea850c799 [ 1453.794749][T21678] RDX: 0000000000000094 RSI: 0000200000000840 RDI: 0000000000000005 [ 1453.794816][T21678] RBP: 00007fbea6f5f090 R08: 0000000000000000 R09: 0000000000000000 [ 1453.794823][T21678] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1453.794830][T21678] R13: 00007fbea8786038 R14: 00007fbea8785fa0 R15: 00007ffd18f22618 [ 1453.794840][T21678] [ 1453.969920][T21682] FAULT_INJECTION: forcing a failure. [ 1453.969920][T21682] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1453.983369][T21682] CPU: 0 UID: 0 PID: 21682 Comm: syz.5.15741 Tainted: G W syzkaller #0 PREEMPT(full) [ 1453.983399][T21682] Tainted: [W]=WARN [ 1453.983406][T21682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1453.983470][T21682] Call Trace: [ 1453.983477][T21682] [ 1453.983485][T21682] __dump_stack+0x1d/0x30 [ 1453.983508][T21682] dump_stack_lvl+0x95/0xd0 [ 1453.983592][T21682] dump_stack+0x15/0x1b [ 1453.983608][T21682] should_fail_ex+0x263/0x280 [ 1453.983628][T21682] should_fail+0xb/0x20 [ 1453.983706][T21682] should_fail_usercopy+0x1a/0x20 [ 1453.983730][T21682] _copy_from_user+0x1c/0xb0 [ 1453.983829][T21682] __sys_sendto+0x1ca/0x490 [ 1453.983882][T21682] __x64_sys_sendto+0x76/0x90 [ 1453.983905][T21682] x64_sys_call+0x2d35/0x3020 [ 1453.983923][T21682] do_syscall_64+0x12c/0x370 [ 1453.983970][T21682] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1453.983991][T21682] RIP: 0033:0x7fbea850c799 [ 1453.984005][T21682] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1453.984024][T21682] RSP: 002b:00007fbea6f5f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 1453.984042][T21682] RAX: ffffffffffffffda RBX: 00007fbea8785fa0 RCX: 00007fbea850c799 [ 1453.984052][T21682] RDX: 0000000000000014 RSI: 0000200000001180 RDI: 0000000000000003 [ 1453.984068][T21682] RBP: 00007fbea6f5f090 R08: 0000200000002180 R09: 000000000000001c [ 1453.984079][T21682] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000001 [ 1453.984089][T21682] R13: 00007fbea8786038 R14: 00007fbea8785fa0 R15: 00007ffd18f22618 [ 1453.984159][T21682] [ 1454.185303][T21690] ip6gretap1: entered promiscuous mode [ 1454.198996][T21690] ip6gretap1: entered allmulticast mode [ 1454.364629][T21706] netlink: 'syz.0.15742': attribute type 1 has an invalid length. [ 1454.405387][T21695] netlink: 'syz.5.15745': attribute type 1 has an invalid length. [ 1454.424852][T21695] 8021q: adding VLAN 0 to HW filter on device bond3 [ 1454.441317][T21695] netlink: 8 bytes leftover after parsing attributes in process `syz.5.15745'. [ 1454.447955][T21706] 8021q: adding VLAN 0 to HW filter on device bond5 [ 1454.469639][T21686] netlink: 8 bytes leftover after parsing attributes in process `syz.0.15742'. [ 1454.479146][T21686] bond5: up delay (136) is not a multiple of miimon (100), value rounded to 100 ms [ 1454.507675][T21712] netlink: 'syz.2.15746': attribute type 1 has an invalid length. [ 1454.568824][T21714] netlink: 8 bytes leftover after parsing attributes in process `syz.2.15746'. [ 1454.716515][T21686] bond5: entered allmulticast mode [ 1454.723594][T21695] bond3: up delay (136) is not a multiple of miimon (100), value rounded to 100 ms [ 1454.747308][T21695] bond3: entered allmulticast mode [ 1454.760467][T21712] 8021q: adding VLAN 0 to HW filter on device bond9 [ 1454.773782][T21713] team0: Device macvtap1 is already an upper device of the team interface [ 1454.813288][T21714] bond9: up delay (136) is not a multiple of miimon (100), value rounded to 100 ms [ 1454.828408][T21714] bond9: entered allmulticast mode [ 1455.084263][T21723] netlink: 28 bytes leftover after parsing attributes in process `syz.3.15751'. [ 1455.118547][T21723] netlink: 8 bytes leftover after parsing attributes in process `syz.3.15751'. [ 1455.169245][T21729] lo speed is unknown, defaulting to 1000 [ 1455.184393][T21727] lo speed is unknown, defaulting to 1000 [ 1455.390931][T21752] syzkaller0: entered promiscuous mode [ 1455.398079][T21752] syzkaller0: entered allmulticast mode [ 1455.425939][T21750] lo speed is unknown, defaulting to 1000 [ 1456.754910][T21794] FAULT_INJECTION: forcing a failure. [ 1456.754910][T21794] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1456.823594][T21794] CPU: 0 UID: 0 PID: 21794 Comm: syz.5.15775 Tainted: G W syzkaller #0 PREEMPT(full) [ 1456.823696][T21794] Tainted: [W]=WARN [ 1456.823703][T21794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1456.823713][T21794] Call Trace: [ 1456.823720][T21794] [ 1456.823727][T21794] __dump_stack+0x1d/0x30 [ 1456.823752][T21794] dump_stack_lvl+0x95/0xd0 [ 1456.823773][T21794] dump_stack+0x15/0x1b [ 1456.823837][T21794] should_fail_ex+0x263/0x280 [ 1456.823856][T21794] should_fail+0xb/0x20 [ 1456.823873][T21794] should_fail_usercopy+0x1a/0x20 [ 1456.823912][T21794] _copy_from_user+0x1c/0xb0 [ 1456.823970][T21794] get_itimerspec64+0x4c/0x1b0 [ 1456.823990][T21794] __x64_sys_timer_settime+0x9a/0x160 [ 1456.824018][T21794] x64_sys_call+0x284f/0x3020 [ 1456.824088][T21794] do_syscall_64+0x12c/0x370 [ 1456.824109][T21794] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1456.824184][T21794] RIP: 0033:0x7fbea850c799 [ 1456.824196][T21794] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1456.824210][T21794] RSP: 002b:00007fbea6f5f028 EFLAGS: 00000246 ORIG_RAX: 00000000000000df [ 1456.824241][T21794] RAX: ffffffffffffffda RBX: 00007fbea8785fa0 RCX: 00007fbea850c799 [ 1456.824252][T21794] RDX: 0000200000000600 RSI: 0000000000000000 RDI: 0000000000000000 [ 1456.824284][T21794] RBP: 00007fbea6f5f090 R08: 0000000000000000 R09: 0000000000000000 [ 1456.824297][T21794] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1456.824308][T21794] R13: 00007fbea8786038 R14: 00007fbea8785fa0 R15: 00007ffd18f22618 [ 1456.824334][T21794] [ 1457.080179][T21804] netlink: 32 bytes leftover after parsing attributes in process `syz.5.15779'. [ 1457.104662][T21806] FAULT_INJECTION: forcing a failure. [ 1457.104662][T21806] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1457.120987][T21806] CPU: 0 UID: 0 PID: 21806 Comm: syz.5.15780 Tainted: G W syzkaller #0 PREEMPT(full) [ 1457.121015][T21806] Tainted: [W]=WARN [ 1457.121087][T21806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1457.121098][T21806] Call Trace: [ 1457.121105][T21806] [ 1457.121111][T21806] __dump_stack+0x1d/0x30 [ 1457.121182][T21806] dump_stack_lvl+0x95/0xd0 [ 1457.121203][T21806] dump_stack+0x15/0x1b [ 1457.121222][T21806] should_fail_ex+0x263/0x280 [ 1457.121247][T21806] should_fail+0xb/0x20 [ 1457.121279][T21806] should_fail_usercopy+0x1a/0x20 [ 1457.121303][T21806] _copy_from_user+0x1c/0xb0 [ 1457.121324][T21806] ___sys_sendmsg+0xc1/0x1e0 [ 1457.121378][T21806] __x64_sys_sendmsg+0xd4/0x160 [ 1457.121412][T21806] x64_sys_call+0x194c/0x3020 [ 1457.121438][T21806] do_syscall_64+0x12c/0x370 [ 1457.121468][T21806] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1457.121485][T21806] RIP: 0033:0x7fbea850c799 [ 1457.121499][T21806] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1457.121516][T21806] RSP: 002b:00007fbea6f5f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1457.121558][T21806] RAX: ffffffffffffffda RBX: 00007fbea8785fa0 RCX: 00007fbea850c799 [ 1457.121595][T21806] RDX: 0000000000048084 RSI: 0000200000000080 RDI: 0000000000000003 [ 1457.121606][T21806] RBP: 00007fbea6f5f090 R08: 0000000000000000 R09: 0000000000000000 [ 1457.121615][T21806] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1457.121625][T21806] R13: 00007fbea8786038 R14: 00007fbea8785fa0 R15: 00007ffd18f22618 [ 1457.121641][T21806] [ 1457.575043][T21824] netlink: 8 bytes leftover after parsing attributes in process `syz.0.15788'. [ 1457.594769][T21824] netlink: 'syz.0.15788': attribute type 30 has an invalid length. [ 1457.621708][ T5843] netdevsim netdevsim0 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 1457.652436][ T5843] netdevsim netdevsim0 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 1457.666494][T21830] netlink: 'syz.7.15787': attribute type 1 has an invalid length. [ 1457.699039][ T5843] netdevsim netdevsim0 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 1457.719709][ T5843] netdevsim netdevsim0 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 1458.671091][T21838] SELinux: policydb version -938488677 does not match my version range 15-35 [ 1458.680457][T21838] SELinux: failed to load policy [ 1458.881490][T21840] netlink: 'syz.5.15793': attribute type 1 has an invalid length. [ 1458.963893][T21851] netlink: 8 bytes leftover after parsing attributes in process `syz.5.15793'. [ 1459.402905][T21850] can0: slcan on ptm3. [ 1459.424370][T21869] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=50 sclass=netlink_xfrm_socket pid=21869 comm=syz.2.15797 [ 1459.440396][T21840] 8021q: adding VLAN 0 to HW filter on device bond4 [ 1459.461339][T21851] bond4: up delay (136) is not a multiple of miimon (100), value rounded to 100 ms [ 1459.473665][T21869] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=46 sclass=netlink_xfrm_socket pid=21869 comm=syz.2.15797 [ 1459.487506][T21869] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=52 sclass=netlink_xfrm_socket pid=21869 comm=syz.2.15797 [ 1459.500837][T21851] bond4: entered allmulticast mode [ 1459.502404][T21869] netlink: 104 bytes leftover after parsing attributes in process `syz.2.15797'. [ 1459.564210][T21859] team0: Device macvtap1 is already an upper device of the team interface [ 1459.666574][T21860] pim6reg1: entered allmulticast mode [ 1459.681610][T21885] SELinux: policydb version -938488677 does not match my version range 15-35 [ 1459.697696][T21885] SELinux: failed to load policy [ 1460.071952][T21901] netlink: 108 bytes leftover after parsing attributes in process `syz.5.15807'. [ 1460.820177][T21939] netlink: 'syz.2.15813': attribute type 27 has an invalid length. [ 1460.853841][T21939] netlink: 164 bytes leftover after parsing attributes in process `syz.2.15813'. [ 1460.877145][T21849] can0 (unregistered): slcan off ptm3. [ 1461.013104][T21951] tipc: Enabled bearer , priority 0 [ 1461.078801][T21951] syzkaller0: entered promiscuous mode [ 1461.107543][T21951] syzkaller0: entered allmulticast mode [ 1461.157451][T21951] tipc: Resetting bearer [ 1461.204679][T21950] tipc: Resetting bearer [ 1461.220497][T21950] tipc: Disabling bearer [ 1461.472780][T21959] syzkaller0: entered promiscuous mode [ 1461.514859][T21959] syzkaller0: entered allmulticast mode [ 1461.720370][T21981] bridge_slave_0: left promiscuous mode [ 1461.735833][T21981] bridge0: port 1(bridge_slave_0) entered disabled state [ 1461.750527][T21981] bridge_slave_1: left allmulticast mode [ 1461.756557][T21981] bridge_slave_1: left promiscuous mode [ 1461.765179][T21981] bridge0: port 2(bridge_slave_1) entered disabled state [ 1461.777172][T21981] bond0: (slave bond_slave_0): Releasing backup interface [ 1461.791558][T21981] bond0: (slave bond_slave_1): Releasing backup interface [ 1461.806378][T21981] team0: Port device team_slave_0 removed [ 1461.830733][T21981] team0: Port device team_slave_1 removed [ 1461.843826][T21981] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1461.857960][T21981] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1461.873692][T21981] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1461.884769][T21981] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1461.899879][T21981] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 1462.048844][T21998] batadv_slave_0: entered promiscuous mode [ 1462.104800][T22004] FAULT_INJECTION: forcing a failure. [ 1462.104800][T22004] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1462.131670][T21998] batman_adv: batadv0: Adding interface: macsec1 [ 1462.133966][T22004] CPU: 1 UID: 0 PID: 22004 Comm: syz.7.15839 Tainted: G W syzkaller #0 PREEMPT(full) [ 1462.134000][T22004] Tainted: [W]=WARN [ 1462.134006][T22004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1462.134017][T22004] Call Trace: [ 1462.134023][T22004] [ 1462.134031][T22004] __dump_stack+0x1d/0x30 [ 1462.134101][T22004] dump_stack_lvl+0x95/0xd0 [ 1462.134121][T22004] dump_stack+0x15/0x1b [ 1462.134139][T22004] should_fail_ex+0x263/0x280 [ 1462.134167][T22004] should_fail+0xb/0x20 [ 1462.134215][T22004] should_fail_usercopy+0x1a/0x20 [ 1462.134238][T22004] _copy_from_user+0x1c/0xb0 [ 1462.134263][T22004] __sys_bpf+0x183/0x7e0 [ 1462.134286][T22004] __x64_sys_bpf+0x41/0x50 [ 1462.134324][T22004] x64_sys_call+0x10cb/0x3020 [ 1462.134344][T22004] do_syscall_64+0x12c/0x370 [ 1462.134422][T22004] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1462.134442][T22004] RIP: 0033:0x7f263e20c799 [ 1462.134457][T22004] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1462.134527][T22004] RSP: 002b:00007f263cc67028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1462.134545][T22004] RAX: ffffffffffffffda RBX: 00007f263e485fa0 RCX: 00007f263e20c799 [ 1462.134558][T22004] RDX: 0000000000000094 RSI: 0000200000000800 RDI: 0000000000000005 [ 1462.134638][T22004] RBP: 00007f263cc67090 R08: 0000000000000000 R09: 0000000000000000 [ 1462.134650][T22004] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1462.134661][T22004] R13: 00007f263e486038 R14: 00007f263e485fa0 R15: 00007ffcde1ec938 [ 1462.134745][T22004] [ 1462.186628][T22008] delete_channel: no stack [ 1462.187942][T22008] delete_channel: no stack [ 1462.192359][T21998] batman_adv: batadv0: The MTU of interface macsec1 is too small (1468) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1462.201443][T22008] delete_channel: no stack [ 1462.201471][T22008] delete_channel: no stack [ 1462.201495][T22008] delete_channel: no stack [ 1462.201592][T22008] delete_channel: no stack [ 1462.201681][T22008] delete_channel: no stack [ 1462.201702][T22008] delete_channel: no stack [ 1462.201723][T22008] delete_channel: no stack [ 1462.201748][T22008] delete_channel: no stack [ 1462.201843][T22008] delete_channel: no stack [ 1462.201897][T22008] delete_channel: no stack [ 1462.201920][T22008] delete_channel: no stack [ 1462.201941][T22008] delete_channel: no stack [ 1462.201963][T22008] delete_channel: no stack [ 1462.201989][T22008] delete_channel: no stack [ 1462.202013][T22008] delete_channel: no stack [ 1462.202032][T22008] delete_channel: no stack [ 1462.202053][T22008] delete_channel: no stack [ 1462.202132][T22008] delete_channel: no stack [ 1462.202161][T22008] delete_channel: no stack [ 1462.202184][T22008] delete_channel: no stack [ 1462.202271][T22008] delete_channel: no stack [ 1462.202294][T22008] delete_channel: no stack [ 1462.202315][T22008] delete_channel: no stack [ 1462.202337][T22008] delete_channel: no stack [ 1462.420233][T22014] netlink: 32 bytes leftover after parsing attributes in process `syz.2.15842'. [ 1462.424182][T21998] batman_adv: batadv0: Interface activated: macsec1 [ 1462.715569][T22018] SELinux: policydb version -938488677 does not match my version range 15-35 [ 1462.731206][T22018] SELinux: failed to load policy [ 1462.732027][T22020] FAULT_INJECTION: forcing a failure. [ 1462.732027][T22020] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1462.778653][T22020] CPU: 0 UID: 0 PID: 22020 Comm: syz.3.15844 Tainted: G W syzkaller #0 PREEMPT(full) [ 1462.778683][T22020] Tainted: [W]=WARN [ 1462.778690][T22020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1462.778760][T22020] Call Trace: [ 1462.778768][T22020] [ 1462.778776][T22020] __dump_stack+0x1d/0x30 [ 1462.778798][T22020] dump_stack_lvl+0x95/0xd0 [ 1462.778818][T22020] dump_stack+0x15/0x1b [ 1462.778898][T22020] should_fail_ex+0x263/0x280 [ 1462.778922][T22020] should_fail+0xb/0x20 [ 1462.778941][T22020] should_fail_usercopy+0x1a/0x20 [ 1462.778984][T22020] _copy_to_user+0x20/0xa0 [ 1462.779020][T22020] simple_read_from_buffer+0xb5/0x130 [ 1462.779039][T22020] proc_fail_nth_read+0x10e/0x150 [ 1462.779103][T22020] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1462.779127][T22020] vfs_read+0x1ab/0x7f0 [ 1462.779154][T22020] ? __rcu_read_unlock+0x4e/0x70 [ 1462.779173][T22020] ? __fget_files+0x184/0x1c0 [ 1462.779344][T22020] ? tipc_setsockopt+0x208/0x620 [ 1462.779364][T22020] ? mutex_lock+0x57/0x90 [ 1462.779436][T22020] ksys_read+0xdc/0x1a0 [ 1462.779450][T22020] __x64_sys_read+0x40/0x50 [ 1462.779463][T22020] x64_sys_call+0x2886/0x3020 [ 1462.779524][T22020] do_syscall_64+0x12c/0x370 [ 1462.779545][T22020] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1462.779564][T22020] RIP: 0033:0x7ff1992ecfce [ 1462.779633][T22020] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1462.779649][T22020] RSP: 002b:00007ff197d86fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1462.779668][T22020] RAX: ffffffffffffffda RBX: 00007ff197d876c0 RCX: 00007ff1992ecfce [ 1462.779743][T22020] RDX: 000000000000000f RSI: 00007ff197d870a0 RDI: 0000000000000004 [ 1462.779821][T22020] RBP: 00007ff197d87090 R08: 0000000000000000 R09: 0000000000000000 [ 1462.779832][T22020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1462.779844][T22020] R13: 00007ff1995a6038 R14: 00007ff1995a5fa0 R15: 00007fff46ec2b58 [ 1462.779862][T22020] [ 1463.049187][T22016] bond5: entered promiscuous mode [ 1463.054590][T22016] bond6: entered promiscuous mode [ 1463.061070][T22016] bond7: entered promiscuous mode [ 1463.066601][T22016] bond8: entered promiscuous mode [ 1463.072373][T22016] bond9: entered promiscuous mode [ 1463.084988][T22016] netlink: 40 bytes leftover after parsing attributes in process `syz.2.15842'. [ 1463.174412][T22016] netlink: 40 bytes leftover after parsing attributes in process `syz.2.15842'. [ 1463.241919][T22016] netlink: 40 bytes leftover after parsing attributes in process `syz.2.15842'. [ 1463.364817][T22048] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=22048 comm=syz.0.15854 [ 1463.403909][T22048] netlink: 105116 bytes leftover after parsing attributes in process `syz.0.15854'. [ 1463.439076][T22052] netlink: 'syz.7.15850': attribute type 1 has an invalid length. [ 1463.455673][T22050] xt_CHECKSUM: CHECKSUM should be avoided. If really needed, restrict with "-p udp" and only use in OUTPUT [ 1463.479570][T22052] 8021q: adding VLAN 0 to HW filter on device bond6 [ 1463.499262][T22050] x_tables: ip_tables: rpfilter match: used from hooks FORWARD, but only valid from PREROUTING [ 1463.557971][T22055] team0: Device macvtap1 is already an upper device of the team interface [ 1463.638136][T22062] netlink: 'syz.5.15853': attribute type 1 has an invalid length. [ 1463.683183][T22067] netlink: 32 bytes leftover after parsing attributes in process `syz.0.15860'. [ 1463.730718][T22070] FAULT_INJECTION: forcing a failure. [ 1463.730718][T22070] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1463.746650][T22062] 8021q: adding VLAN 0 to HW filter on device bond5 [ 1463.756769][T22070] CPU: 1 UID: 0 PID: 22070 Comm: syz.3.15861 Tainted: G W syzkaller #0 PREEMPT(full) [ 1463.756854][T22070] Tainted: [W]=WARN [ 1463.756860][T22070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1463.756927][T22070] Call Trace: [ 1463.756932][T22070] [ 1463.756939][T22070] __dump_stack+0x1d/0x30 [ 1463.756964][T22070] dump_stack_lvl+0x95/0xd0 [ 1463.757016][T22070] dump_stack+0x15/0x1b [ 1463.757086][T22070] should_fail_ex+0x263/0x280 [ 1463.757119][T22070] should_fail+0xb/0x20 [ 1463.757134][T22070] should_fail_usercopy+0x1a/0x20 [ 1463.757200][T22070] _copy_from_user+0x1c/0xb0 [ 1463.757220][T22070] __sys_bind+0x106/0x290 [ 1463.757241][T22070] __x64_sys_bind+0x3f/0x50 [ 1463.757258][T22070] x64_sys_call+0x2b30/0x3020 [ 1463.757398][T22070] do_syscall_64+0x12c/0x370 [ 1463.757419][T22070] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1463.757438][T22070] RIP: 0033:0x7ff19932c799 [ 1463.757452][T22070] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1463.757492][T22070] RSP: 002b:00007ff197d87028 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 1463.757510][T22070] RAX: ffffffffffffffda RBX: 00007ff1995a5fa0 RCX: 00007ff19932c799 [ 1463.757523][T22070] RDX: 0000000000000074 RSI: 0000200000000000 RDI: 0000000000000005 [ 1463.757533][T22070] RBP: 00007ff197d87090 R08: 0000000000000000 R09: 0000000000000000 [ 1463.757575][T22070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1463.757585][T22070] R13: 00007ff1995a6038 R14: 00007ff1995a5fa0 R15: 00007fff46ec2b58 [ 1463.757601][T22070] [ 1463.892680][T22071] team0: Device macvtap1 is already an upper device of the team interface [ 1464.926620][T22073] lo: entered promiscuous mode [ 1464.934417][T22073] tunl0: entered promiscuous mode [ 1464.941244][T22073] gre0: entered promiscuous mode [ 1464.951430][T22073] gretap0: entered promiscuous mode [ 1464.958763][T22073] erspan0: entered promiscuous mode [ 1464.965911][T22073] ip_vti0: entered promiscuous mode [ 1464.977658][T22073] ip6_vti0: entered promiscuous mode [ 1464.985464][T22073] sit0: entered promiscuous mode [ 1464.994384][T22073] ip6tnl0: entered promiscuous mode [ 1465.001575][T22073] ip6gre0: entered promiscuous mode [ 1465.009606][T22073] syz_tun: entered promiscuous mode [ 1465.025002][T22073] ip6gretap0: entered promiscuous mode [ 1465.032820][T22073] bridge0: port 2(bridge_slave_1) entered disabled state [ 1465.040880][T22073] bridge0: port 1(bridge_slave_0) entered disabled state [ 1465.049183][T22073] bridge0: entered promiscuous mode [ 1465.057356][T22073] bond0: entered promiscuous mode [ 1465.062871][T22073] bond_slave_0: entered promiscuous mode [ 1465.068717][T22073] bond_slave_1: entered promiscuous mode [ 1465.076294][T22073] team0: entered promiscuous mode [ 1465.082255][T22073] team_slave_0: entered promiscuous mode [ 1465.088360][T22073] team_slave_1: entered promiscuous mode [ 1465.095874][T22073] dummy0: entered promiscuous mode [ 1465.103400][T22073] nlmon0: entered promiscuous mode [ 1465.111687][T22073] caif0: entered promiscuous mode [ 1465.117538][T22073] batadv0: entered promiscuous mode [ 1465.125228][T22073] vxcan0: entered promiscuous mode [ 1465.132960][T22073] vxcan1: entered promiscuous mode [ 1465.140920][T22073] veth0: entered promiscuous mode [ 1465.147749][T22073] veth1: entered promiscuous mode [ 1465.159546][T22073] wg0: entered promiscuous mode [ 1465.167702][T22073] wg1: entered promiscuous mode [ 1465.174434][T22073] wg2: entered promiscuous mode [ 1465.180536][T22073] veth0_to_bridge: entered promiscuous mode [ 1465.189929][T22073] veth1_to_bridge: entered promiscuous mode [ 1465.199765][T22073] veth0_to_bond: entered promiscuous mode [ 1465.207751][T22073] veth1_to_bond: entered promiscuous mode [ 1465.215953][T22073] veth0_to_team: entered promiscuous mode [ 1465.224643][T22073] veth1_to_team: entered promiscuous mode [ 1465.234254][T22073] veth0_to_batadv: entered promiscuous mode [ 1465.241948][T22073] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1465.249820][T22073] batadv_slave_0: entered promiscuous mode [ 1465.258433][T22073] veth1_to_batadv: entered promiscuous mode [ 1465.266093][T22073] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1465.273674][T22073] batadv_slave_1: entered promiscuous mode [ 1465.282547][T22073] xfrm0: entered promiscuous mode [ 1465.290189][T22073] veth0_to_hsr: entered promiscuous mode [ 1465.298303][T22073] veth1_to_hsr: entered promiscuous mode [ 1465.306360][T22073] hsr0: entered promiscuous mode [ 1465.312576][T22073] veth1_virt_wifi: entered promiscuous mode [ 1465.320345][T22073] veth0_virt_wifi: entered promiscuous mode [ 1465.333068][T22073] vlan0: entered promiscuous mode [ 1465.338643][T22073] vlan1: entered promiscuous mode [ 1465.354679][T22073] macvlan0: entered promiscuous mode [ 1465.364466][T22073] macvlan1: entered promiscuous mode [ 1465.371286][T22073] ipvlan0: entered promiscuous mode [ 1465.377600][T22073] ipvlan1: entered promiscuous mode [ 1465.385860][T22073] macvtap0: entered promiscuous mode [ 1465.392895][T22073] macsec0: entered promiscuous mode [ 1465.407604][T22073] geneve0: entered promiscuous mode [ 1465.416247][T22073] geneve1: entered promiscuous mode [ 1465.426334][T22073] netdevsim netdevsim0 netdevsim0: entered promiscuous mode [ 1465.439442][T22073] netdevsim netdevsim0 netdevsim1: entered promiscuous mode [ 1465.450632][T22073] netdevsim netdevsim0 netdevsim2: entered promiscuous mode [ 1465.464259][T22073] netdevsim netdevsim0 netdevsim3: entered promiscuous mode [ 1465.473004][T22073] syztnl1: entered promiscuous mode [ 1465.480706][T22073] bond1: entered promiscuous mode [ 1465.487332][T22073] ip6gre1: entered promiscuous mode [ 1465.493396][T22073] bridge1: entered promiscuous mode [ 1465.504982][T22073] bond2: entered promiscuous mode [ 1465.511298][T22073] ip6gretap1: entered promiscuous mode [ 1465.517105][T22073] bond3: entered promiscuous mode [ 1465.522278][T22073] bond4: entered promiscuous mode [ 1465.527915][T22073] gre1: entered promiscuous mode [ 1465.535482][T22073] bond5: entered promiscuous mode [ 1465.542304][T22073] vxlan0: entered promiscuous mode [ 1465.551397][T22083] netlink: 172 bytes leftover after parsing attributes in process `syz.3.15866'. [ 1465.570212][T22083] netlink: 8 bytes leftover after parsing attributes in process `syz.3.15866'. [ 1465.587494][T22083] netlink: 172 bytes leftover after parsing attributes in process `syz.3.15866'. [ 1465.622130][T22083] netlink: 100 bytes leftover after parsing attributes in process `syz.3.15866'. [ 1465.664337][ T3421] lo speed is unknown, defaulting to 1000 [ 1465.670924][ T2090] netdevsim netdevsim0 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0 [ 1465.687424][ T3421] syz0: Port: 1 Link DOWN [ 1465.692086][ T2090] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1465.738193][ T2090] netdevsim netdevsim0 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0 [ 1465.777578][ T2090] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1465.815787][ T2090] netdevsim netdevsim0 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0 [ 1465.851290][ T2090] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1465.861308][ T2090] netdevsim netdevsim0 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0 [ 1465.872343][ T2090] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1466.007351][T22115] lo: entered promiscuous mode [ 1466.017898][T22115] tunl0: entered promiscuous mode [ 1466.024684][T22115] gre0: entered promiscuous mode [ 1466.181110][T22115] gretap0: entered promiscuous mode [ 1466.209908][T22115] erspan0: entered promiscuous mode [ 1466.244639][T22115] ip_vti0: entered promiscuous mode [ 1466.290949][T22115] ip6_vti0: entered promiscuous mode [ 1466.340068][T22115] sit0: entered promiscuous mode [ 1466.395340][T22115] ip6tnl0: entered promiscuous mode [ 1466.448047][T22115] ip6gre0: entered promiscuous mode [ 1466.492590][T22115] syz_tun: entered promiscuous mode [ 1466.529222][T22115] ip6gretap0: entered promiscuous mode [ 1466.585333][T22115] bridge0: entered promiscuous mode [ 1466.661003][T22115] vcan0: entered promiscuous mode [ 1466.847856][T22115] bond0: entered promiscuous mode [ 1466.893902][T22115] team0: entered promiscuous mode [ 1466.943643][T22115] nlmon0: entered promiscuous mode [ 1466.973284][T22115] caif0: entered promiscuous mode [ 1466.985807][T22115] batadv0: entered promiscuous mode [ 1467.001550][T22115] vxcan0: entered promiscuous mode [ 1467.015777][T22115] vxcan1: entered promiscuous mode [ 1467.029279][T22115] veth0: entered promiscuous mode [ 1467.045508][T22115] veth1: entered promiscuous mode [ 1467.065320][T22115] wg0: entered promiscuous mode [ 1467.079271][T22115] wg1: entered promiscuous mode [ 1467.089459][T22115] wg2: entered promiscuous mode [ 1467.099063][T22115] veth0_to_bridge: entered promiscuous mode [ 1467.116495][T22115] bridge_slave_0: entered promiscuous mode [ 1467.131597][T22115] veth1_to_bridge: entered promiscuous mode [ 1467.151623][T22115] bridge_slave_1: entered promiscuous mode [ 1467.171661][T22115] veth0_to_bond: entered promiscuous mode [ 1467.185366][T22115] bond_slave_0: entered promiscuous mode [ 1467.196633][T22115] veth1_to_bond: entered promiscuous mode [ 1467.205201][T22115] bond_slave_1: entered promiscuous mode [ 1467.214184][T22115] veth0_to_team: entered promiscuous mode [ 1467.222817][T22115] team_slave_0: entered promiscuous mode [ 1467.229993][T22115] veth1_to_team: entered promiscuous mode [ 1467.238159][T22115] team_slave_1: entered promiscuous mode [ 1467.244298][T22115] veth0_to_batadv: entered promiscuous mode [ 1467.254691][T22115] veth1_to_batadv: entered promiscuous mode [ 1467.262600][T22115] batadv_slave_1: entered promiscuous mode [ 1467.274687][T22115] xfrm0: entered promiscuous mode [ 1467.283096][T22115] veth0_to_hsr: entered promiscuous mode [ 1467.291404][T22115] veth1_to_hsr: entered promiscuous mode [ 1467.300417][T22115] hsr0: entered promiscuous mode [ 1467.307760][T22115] veth1_virt_wifi: entered promiscuous mode [ 1467.315239][T22115] veth0_virt_wifi: entered promiscuous mode [ 1467.341531][T22115] vlan0: entered promiscuous mode [ 1467.354526][T22115] vlan1: entered promiscuous mode [ 1467.366573][T22115] macvlan0: entered promiscuous mode [ 1467.381758][T22115] macvlan1: entered promiscuous mode [ 1467.401537][T22115] ipvlan0: entered promiscuous mode [ 1467.410920][T22115] ipvlan1: entered promiscuous mode [ 1467.463548][T22115] macvtap0: entered promiscuous mode [ 1467.488814][T22115] macsec0: entered promiscuous mode [ 1467.519119][T22115] geneve0: entered promiscuous mode [ 1467.526251][T22115] geneve1: entered promiscuous mode [ 1467.535048][T22115] netdevsim netdevsim3 netdevsim0: entered promiscuous mode [ 1467.549421][T22115] netdevsim netdevsim3 netdevsim1: entered promiscuous mode [ 1467.559149][T22115] netdevsim netdevsim3 netdevsim2: entered promiscuous mode [ 1467.575082][T22115] netdevsim netdevsim3 netdevsim3: entered promiscuous mode [ 1467.590521][T22115] syztnl1: entered promiscuous mode [ 1467.596364][T22115] bond1: entered promiscuous mode [ 1467.601537][T22115] ip6gretap1: entered promiscuous mode [ 1467.607513][T22115] bond2: entered promiscuous mode [ 1467.612642][T22115] bond3: entered promiscuous mode [ 1467.618441][T22115] batman_adv: batadv0: Interface deactivated: macsec1 [ 1467.625733][T22115] macsec1: entered promiscuous mode [ 1467.637082][T22126] netdevsim netdevsim2 netdevsim0: entered allmulticast mode [ 1467.645923][T10519] netdevsim netdevsim3 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1467.678869][T10519] netdevsim netdevsim3 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1467.699750][T10519] netdevsim netdevsim3 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1467.709003][ T28] kauditd_printk_skb: 61 callbacks suppressed [ 1467.709018][ T28] audit: type=1326 audit(1774365470.169:1375): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22139 comm="syz.3.15889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff19932c799 code=0x7ffc0000 [ 1467.718644][T22147] __nla_validate_parse: 2 callbacks suppressed [ 1467.718658][T22147] netlink: 60 bytes leftover after parsing attributes in process `syz.0.15890'. [ 1467.762863][T10519] netdevsim netdevsim3 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1467.773793][ T28] audit: type=1326 audit(1774365470.169:1376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22139 comm="syz.3.15889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff19932c799 code=0x7ffc0000 [ 1467.778002][T22136] lo speed is unknown, defaulting to 1000 [ 1467.806927][T22152] FAULT_INJECTION: forcing a failure. [ 1467.806927][T22152] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1467.809254][T22147] bridge2: trying to set multicast query interval above maximum, setting to 8640000 (86400000ms) [ 1467.821144][T22152] CPU: 0 UID: 0 PID: 22152 Comm: syz.7.15892 Tainted: G W syzkaller #0 PREEMPT(full) [ 1467.821196][T22152] Tainted: [W]=WARN [ 1467.821202][T22152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1467.821213][T22152] Call Trace: [ 1467.821220][T22152] [ 1467.821228][T22152] __dump_stack+0x1d/0x30 [ 1467.821252][T22152] dump_stack_lvl+0x95/0xd0 [ 1467.821301][T22152] dump_stack+0x15/0x1b [ 1467.821319][T22152] should_fail_ex+0x263/0x280 [ 1467.821417][T22152] should_fail+0xb/0x20 [ 1467.821436][T22152] should_fail_usercopy+0x1a/0x20 [ 1467.821463][T22152] _copy_from_iter+0xcf/0xea0 [ 1467.821575][T22152] ? lockref_put_return+0xf7/0x130 [ 1467.821601][T22152] ? __rcu_read_unlock+0x4e/0x70 [ 1467.821620][T22152] copy_page_from_iter+0x178/0x2a0 [ 1467.821644][T22152] tun_get_user+0xbbd/0x27c0 [ 1467.821708][T22152] ? ref_tracker_alloc+0x1eb/0x2f0 [ 1467.821733][T22152] tun_chr_write_iter+0x15e/0x210 [ 1467.821863][T22152] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 1467.821883][T22152] vfs_write+0x5a6/0x9f0 [ 1467.821918][T22152] ksys_write+0xdc/0x1a0 [ 1467.821935][T22152] __x64_sys_write+0x40/0x50 [ 1467.822006][T22152] x64_sys_call+0x27e1/0x3020 [ 1467.822028][T22152] do_syscall_64+0x12c/0x370 [ 1467.822049][T22152] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1467.822081][T22152] RIP: 0033:0x7f263e1ccfce [ 1467.822164][T22152] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1467.822179][T22152] RSP: 002b:00007f263cc66fb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1467.822197][T22152] RAX: ffffffffffffffda RBX: 00007f263cc676c0 RCX: 00007f263e1ccfce [ 1467.822210][T22152] RDX: 0000000000000042 RSI: 0000200000000180 RDI: 00000000000000c8 [ 1467.822221][T22152] RBP: 00007f263cc67090 R08: 0000000000000000 R09: 0000000000000000 [ 1467.822258][T22152] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1467.822270][T22152] R13: 00007f263e486038 R14: 00007f263e485fa0 R15: 00007ffcde1ec938 [ 1467.822293][T22152] [ 1467.828400][ T28] audit: type=1326 audit(1774365470.169:1377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22139 comm="syz.3.15889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff19932c799 code=0x7ffc0000 [ 1467.832618][T22147] bridge2: entered promiscuous mode [ 1467.852166][ T28] audit: type=1326 audit(1774365470.169:1378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22139 comm="syz.3.15889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff19932c799 code=0x7ffc0000 [ 1467.887711][T22147] bridge2: entered allmulticast mode [ 1468.114036][ T28] audit: type=1326 audit(1774365470.169:1379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22139 comm="syz.3.15889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7ff19932c799 code=0x7ffc0000 [ 1468.140328][ T28] audit: type=1326 audit(1774365470.219:1380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22139 comm="syz.3.15889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff19932c799 code=0x7ffc0000 [ 1468.174295][ T28] audit: type=1326 audit(1774365470.219:1381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22139 comm="syz.3.15889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff19932c799 code=0x7ffc0000 [ 1468.202889][T22158] netlink: 'syz.7.15894': attribute type 1 has an invalid length. [ 1468.207768][ T28] audit: type=1326 audit(1774365470.219:1382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22139 comm="syz.3.15889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff19932c799 code=0x7ffc0000 [ 1468.235781][ T28] audit: type=1326 audit(1774365470.219:1383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22139 comm="syz.3.15889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff19932c799 code=0x7ffc0000 [ 1468.260317][ T28] audit: type=1326 audit(1774365470.219:1384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22139 comm="syz.3.15889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7ff19932c799 code=0x7ffc0000 [ 1468.449750][T22167] netdevsim netdevsim3: Direct firmware load for .. @ failed with error -2 [ 1468.477917][T22174] batman_adv: batadv0: Adding interface: macsec1 [ 1468.484575][T22174] batman_adv: batadv0: The MTU of interface macsec1 is too small (1468) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1468.512115][T22174] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1468.523260][T22174] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1468.534998][T22174] batman_adv: batadv0: Interface activated: macsec1 [ 1468.587368][T22180] FAULT_INJECTION: forcing a failure. [ 1468.587368][T22180] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1468.601367][T22180] CPU: 1 UID: 0 PID: 22180 Comm: syz.5.15903 Tainted: G W syzkaller #0 PREEMPT(full) [ 1468.601393][T22180] Tainted: [W]=WARN [ 1468.601399][T22180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1468.601465][T22180] Call Trace: [ 1468.601470][T22180] [ 1468.601477][T22180] __dump_stack+0x1d/0x30 [ 1468.601499][T22180] dump_stack_lvl+0x95/0xd0 [ 1468.601516][T22180] dump_stack+0x15/0x1b [ 1468.601590][T22180] should_fail_ex+0x263/0x280 [ 1468.601650][T22180] should_fail+0xb/0x20 [ 1468.601670][T22180] should_fail_usercopy+0x1a/0x20 [ 1468.601689][T22180] _copy_from_user+0x1c/0xb0 [ 1468.601749][T22180] do_ip_vs_set_ctl+0x1a4/0xa60 [ 1468.601776][T22180] ? do_ip_setsockopt+0x1af1/0x2290 [ 1468.601797][T22180] nf_setsockopt+0x199/0x1b0 [ 1468.601886][T22180] ip_setsockopt+0x102/0x110 [ 1468.601909][T22180] tcp_setsockopt+0x98/0xb0 [ 1468.601933][T22180] sock_common_setsockopt+0x69/0x80 [ 1468.601951][T22180] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 1468.602032][T22180] smc_setsockopt+0x183/0x750 [ 1468.602054][T22180] ? __pfx_smc_setsockopt+0x10/0x10 [ 1468.602176][T22180] __sys_setsockopt+0x184/0x200 [ 1468.602211][T22180] __x64_sys_setsockopt+0x64/0x80 [ 1468.602271][T22180] x64_sys_call+0x2327/0x3020 [ 1468.602300][T22180] do_syscall_64+0x12c/0x370 [ 1468.602322][T22180] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1468.602385][T22180] RIP: 0033:0x7fbea850c799 [ 1468.602398][T22180] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1468.602417][T22180] RSP: 002b:00007fbea6f5f028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 1468.602433][T22180] RAX: ffffffffffffffda RBX: 00007fbea8785fa0 RCX: 00007fbea850c799 [ 1468.602445][T22180] RDX: 0000000000000482 RSI: 0000000000000000 RDI: 0000000000000003 [ 1468.602457][T22180] RBP: 00007fbea6f5f090 R08: 000000000000002c R09: 0000000000000000 [ 1468.602470][T22180] R10: 00002000000000c0 R11: 0000000000000246 R12: 0000000000000001 [ 1468.602483][T22180] R13: 00007fbea8786038 R14: 00007fbea8785fa0 R15: 00007ffd18f22618 [ 1468.602536][T22180] [ 1468.865534][T22185] netlink: 4 bytes leftover after parsing attributes in process `syz.5.15904'. [ 1468.925741][T22185] veth3: entered promiscuous mode [ 1469.116270][T22197] lo speed is unknown, defaulting to 1000 [ 1469.157926][T22203] lo speed is unknown, defaulting to 1000 [ 1469.386814][T22228] loop5: detected capacity change from 512 to 0 [ 1469.393506][T22231] loop2: detected capacity change from 512 to 0 [ 1469.397122][T22233] FAULT_INJECTION: forcing a failure. [ 1469.397122][T22233] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1469.457226][T22233] CPU: 1 UID: 0 PID: 22233 Comm: syz.2.15922 Tainted: G W syzkaller #0 PREEMPT(full) [ 1469.457246][T22233] Tainted: [W]=WARN [ 1469.457250][T22233] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1469.457257][T22233] Call Trace: [ 1469.457262][T22233] [ 1469.457272][T22233] __dump_stack+0x1d/0x30 [ 1469.457295][T22233] dump_stack_lvl+0x95/0xd0 [ 1469.457306][T22233] dump_stack+0x15/0x1b [ 1469.457347][T22233] should_fail_ex+0x263/0x280 [ 1469.457361][T22233] should_fail_alloc_page+0xf2/0x100 [ 1469.457444][T22233] __alloc_frozen_pages_noprof+0x108/0x360 [ 1469.457505][T22233] alloc_pages_mpol+0xb3/0x260 [ 1469.457536][T22233] folio_alloc_mpol_noprof+0x39/0x80 [ 1469.457631][T22233] shmem_get_folio_gfp+0x3da/0xd60 [ 1469.457651][T22233] ? simple_xattr_get+0xb5/0x150 [ 1469.457737][T22233] shmem_write_begin+0xfc/0x1f0 [ 1469.457772][T22233] generic_perform_write+0x183/0x490 [ 1469.457787][T22233] ? _raw_spin_unlock+0x9/0x30 [ 1469.457871][T22233] shmem_file_write_iter+0xc5/0xf0 [ 1469.457888][T22233] ? __pfx_shmem_file_write_iter+0x10/0x10 [ 1469.457926][T22233] vfs_write+0x5a6/0x9f0 [ 1469.457944][T22233] ksys_write+0xdc/0x1a0 [ 1469.457954][T22233] __x64_sys_write+0x40/0x50 [ 1469.457963][T22233] x64_sys_call+0x27e1/0x3020 [ 1469.457977][T22233] do_syscall_64+0x12c/0x370 [ 1469.458007][T22233] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1469.458018][T22233] RIP: 0033:0x7f136beac799 [ 1469.458029][T22233] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1469.458044][T22233] RSP: 002b:00007f136a8de028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1469.458072][T22233] RAX: ffffffffffffffda RBX: 00007f136c126090 RCX: 00007f136beac799 [ 1469.458089][T22233] RDX: 0000000000000012 RSI: 0000200000000080 RDI: 0000000000000003 [ 1469.458096][T22233] RBP: 00007f136a8de090 R08: 0000000000000000 R09: 0000000000000000 [ 1469.458103][T22233] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1469.458125][T22233] R13: 00007f136c126128 R14: 00007f136c126090 R15: 00007fffd618ea78 [ 1469.458139][T22233] [ 1469.520633][T22240] netlink: 'syz.0.15915': attribute type 1 has an invalid length. [ 1469.765894][T22250] netlink: 6040 bytes leftover after parsing attributes in process `syz.3.15926'. [ 1469.878966][T22248] FAULT_INJECTION: forcing a failure. [ 1469.878966][T22248] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1469.896717][T22248] CPU: 1 UID: 0 PID: 22248 Comm: syz.5.15925 Tainted: G W syzkaller #0 PREEMPT(full) [ 1469.896792][T22248] Tainted: [W]=WARN [ 1469.896798][T22248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1469.896808][T22248] Call Trace: [ 1469.896813][T22248] [ 1469.896821][T22248] __dump_stack+0x1d/0x30 [ 1469.896870][T22248] dump_stack_lvl+0x95/0xd0 [ 1469.896883][T22248] dump_stack+0x15/0x1b [ 1469.896902][T22248] should_fail_ex+0x263/0x280 [ 1469.896916][T22248] should_fail+0xb/0x20 [ 1469.896927][T22248] should_fail_usercopy+0x1a/0x20 [ 1469.896980][T22248] _copy_from_user+0x1c/0xb0 [ 1469.897048][T22248] __sys_connect+0xd0/0x2a0 [ 1469.897064][T22248] __x64_sys_connect+0x3f/0x50 [ 1469.897078][T22248] x64_sys_call+0x2df0/0x3020 [ 1469.897091][T22248] do_syscall_64+0x12c/0x370 [ 1469.897170][T22248] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1469.897182][T22248] RIP: 0033:0x7fbea850c799 [ 1469.897192][T22248] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1469.897201][T22248] RSP: 002b:00007fbea6f5f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 1469.897213][T22248] RAX: ffffffffffffffda RBX: 00007fbea8785fa0 RCX: 00007fbea850c799 [ 1469.897252][T22248] RDX: 000000000000006e RSI: 000020000057eff8 RDI: 0000000000000005 [ 1469.897259][T22248] RBP: 00007fbea6f5f090 R08: 0000000000000000 R09: 0000000000000000 [ 1469.897266][T22248] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1469.897273][T22248] R13: 00007fbea8786038 R14: 00007fbea8785fa0 R15: 00007ffd18f22618 [ 1469.897285][T22248] [ 1470.514770][T22271] FAULT_INJECTION: forcing a failure. [ 1470.514770][T22271] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1470.528848][T22271] CPU: 0 UID: 0 PID: 22271 Comm: syz.2.15934 Tainted: G W syzkaller #0 PREEMPT(full) [ 1470.528945][T22271] Tainted: [W]=WARN [ 1470.528951][T22271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1470.528962][T22271] Call Trace: [ 1470.528969][T22271] [ 1470.528978][T22271] __dump_stack+0x1d/0x30 [ 1470.529005][T22271] dump_stack_lvl+0x95/0xd0 [ 1470.529026][T22271] dump_stack+0x15/0x1b [ 1470.529059][T22271] should_fail_ex+0x263/0x280 [ 1470.529080][T22271] should_fail+0xb/0x20 [ 1470.529100][T22271] should_fail_usercopy+0x1a/0x20 [ 1470.529229][T22271] _copy_from_user+0x1c/0xb0 [ 1470.529252][T22271] ___sys_sendmsg+0xc1/0x1e0 [ 1470.529335][T22271] __x64_sys_sendmsg+0xd4/0x160 [ 1470.529364][T22271] x64_sys_call+0x194c/0x3020 [ 1470.529456][T22271] do_syscall_64+0x12c/0x370 [ 1470.529474][T22271] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1470.529514][T22271] RIP: 0033:0x7f136beac799 [ 1470.529529][T22271] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1470.529545][T22271] RSP: 002b:00007f136a8ff028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1470.529565][T22271] RAX: ffffffffffffffda RBX: 00007f136c125fa0 RCX: 00007f136beac799 [ 1470.529583][T22271] RDX: 0000000000000000 RSI: 0000200000006040 RDI: 0000000000000004 [ 1470.529595][T22271] RBP: 00007f136a8ff090 R08: 0000000000000000 R09: 0000000000000000 [ 1470.529608][T22271] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1470.529620][T22271] R13: 00007f136c126038 R14: 00007f136c125fa0 R15: 00007fffd618ea78 [ 1470.529635][T22271] [ 1470.746255][T22273] netlink: 32 bytes leftover after parsing attributes in process `syz.5.15935'. [ 1470.966814][T22278] lo: entered promiscuous mode [ 1470.978236][T22278] tunl0: entered promiscuous mode [ 1470.986961][T22278] gre0: entered promiscuous mode [ 1471.033879][T22279] netlink: 40 bytes leftover after parsing attributes in process `syz.5.15935'. [ 1471.056778][T22278] gretap0: entered promiscuous mode [ 1471.065917][T22278] erspan0: entered promiscuous mode [ 1471.075632][T22278] ip_vti0: entered promiscuous mode [ 1471.084240][T22278] ip6_vti0: entered promiscuous mode [ 1471.105234][T22278] sit0: entered promiscuous mode [ 1471.114566][T22278] ip6tnl0: entered promiscuous mode [ 1471.124854][T22278] ip6gre0: entered promiscuous mode [ 1471.136948][T22278] syz_tun: entered promiscuous mode [ 1471.146211][T22278] ip6gretap0: entered promiscuous mode [ 1471.159815][T22278] bridge0: entered promiscuous mode [ 1471.174265][T22278] vcan0: entered promiscuous mode [ 1471.203372][T22279] netlink: 40 bytes leftover after parsing attributes in process `syz.5.15935'. [ 1471.240553][T22278] bond0: entered promiscuous mode [ 1471.250165][T22278] team0: entered promiscuous mode [ 1471.259094][T22278] dummy0: entered promiscuous mode [ 1471.272665][T22278] nlmon0: entered promiscuous mode [ 1471.282562][T22278] caif0: entered promiscuous mode [ 1471.288271][T22278] batadv0: entered promiscuous mode [ 1471.297188][T22278] vxcan0: entered promiscuous mode [ 1471.305455][T22278] vxcan1: entered promiscuous mode [ 1471.314591][T22278] veth0: entered promiscuous mode [ 1471.322918][T22278] veth1: entered promiscuous mode [ 1471.332932][T22278] wg0: entered promiscuous mode [ 1471.344422][T22278] wg1: entered promiscuous mode [ 1471.353975][T22278] wg2: entered promiscuous mode [ 1471.362286][T22278] veth0_to_bridge: entered promiscuous mode [ 1471.373356][T22278] bridge_slave_0: entered promiscuous mode [ 1471.386921][T22278] veth1_to_bridge: entered promiscuous mode [ 1471.396067][T22278] bridge_slave_1: entered promiscuous mode [ 1471.407523][T22278] veth0_to_bond: entered promiscuous mode [ 1471.417372][T22278] bond_slave_0: entered promiscuous mode [ 1471.424516][T22278] veth1_to_bond: entered promiscuous mode [ 1471.435282][T22278] bond_slave_1: entered promiscuous mode [ 1471.442721][T22278] veth0_to_team: entered promiscuous mode [ 1471.452410][T22278] team_slave_0: entered promiscuous mode [ 1471.460479][T22278] veth1_to_team: entered promiscuous mode [ 1471.470631][T22278] team_slave_1: entered promiscuous mode [ 1471.477339][T22278] veth0_to_batadv: entered promiscuous mode [ 1471.493381][T22278] veth1_to_batadv: entered promiscuous mode [ 1471.504328][T22278] batadv_slave_1: entered promiscuous mode [ 1471.514302][T22278] xfrm0: entered promiscuous mode [ 1471.523251][T22278] veth0_to_hsr: entered promiscuous mode [ 1471.534860][T22278] veth1_to_hsr: entered promiscuous mode [ 1471.545915][T22278] hsr0: entered promiscuous mode [ 1471.555016][T22278] veth1_virt_wifi: entered promiscuous mode [ 1471.564211][T22278] veth0_virt_wifi: entered promiscuous mode [ 1471.575992][T22278] vlan1: entered promiscuous mode [ 1471.628078][T22278] macvlan0: entered promiscuous mode [ 1471.642445][T22278] macvlan1: entered promiscuous mode [ 1471.650998][T22278] ipvlan0: entered promiscuous mode [ 1471.656547][T22278] ipvlan1: entered promiscuous mode [ 1471.668293][T22278] macvtap0: entered promiscuous mode [ 1471.675764][T22278] macsec0: entered promiscuous mode [ 1471.687163][T22278] geneve0: entered promiscuous mode [ 1471.696128][T22278] geneve1: entered promiscuous mode [ 1471.703571][T22278] netdevsim netdevsim5 netdevsim0: entered promiscuous mode [ 1471.716881][T22278] netdevsim netdevsim5 netdevsim1: entered promiscuous mode [ 1471.727563][T22278] netdevsim netdevsim5 netdevsim2: entered promiscuous mode [ 1471.739077][T22278] netdevsim netdevsim5 netdevsim3: entered promiscuous mode [ 1471.748510][T22278] syztnl1: entered promiscuous mode [ 1471.753893][T22278] ip6erspan0: entered promiscuous mode [ 1471.759904][T22278] bond1: entered promiscuous mode [ 1471.765077][T22278] vlan2: entered promiscuous mode [ 1471.771273][T22278] bond2: entered promiscuous mode [ 1471.777148][T22278] batman_adv: batadv0: Interface deactivated: macsec1 [ 1471.784674][T22278] macsec1: entered promiscuous mode [ 1471.794920][T22278] tun0: entered promiscuous mode [ 1471.802244][T22278] bond3: entered promiscuous mode [ 1471.807857][T22278] bond4: entered promiscuous mode [ 1471.813232][T22278] ip6gretap2: entered promiscuous mode [ 1471.819957][T22278] bond5: entered promiscuous mode [ 1471.826120][T22278] veth2: entered promiscuous mode [ 1472.126261][T22287] netlink: 32 bytes leftover after parsing attributes in process `syz.7.15938'. [ 1472.173868][ T36] netdevsim netdevsim5 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1472.328486][ T36] netdevsim netdevsim5 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1472.360656][ T36] netdevsim netdevsim5 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1472.395520][ T36] netdevsim netdevsim5 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1472.492105][T22300] netlink: 40 bytes leftover after parsing attributes in process `syz.7.15938'. [ 1472.585969][T22300] netlink: 40 bytes leftover after parsing attributes in process `syz.7.15938'. [ 1472.657299][T22295] lo: entered promiscuous mode [ 1472.663282][T22295] tunl0: entered promiscuous mode [ 1472.671944][T22295] gre0: entered promiscuous mode [ 1472.684593][T22295] gretap0: entered promiscuous mode [ 1472.694588][T22295] erspan0: entered promiscuous mode [ 1472.704354][T22295] ip_vti0: entered promiscuous mode [ 1472.713335][T22295] ip6_vti0: entered promiscuous mode [ 1472.722468][T22295] sit0: entered promiscuous mode [ 1472.733374][T22295] ip6tnl0: entered promiscuous mode [ 1472.743458][T22295] ip6gre0: entered promiscuous mode [ 1472.753384][T22295] syz_tun: entered promiscuous mode [ 1472.763018][T22295] ip6gretap0: entered promiscuous mode [ 1472.773846][T22295] bridge0: port 2(bridge_slave_1) entered disabled state [ 1472.781412][T22295] bridge0: port 1(bridge_slave_0) entered disabled state [ 1472.789036][T22295] bridge0: entered promiscuous mode [ 1472.798933][T22295] bond0: entered promiscuous mode [ 1472.804659][T22295] bond_slave_0: entered promiscuous mode [ 1472.811699][T22295] bond_slave_1: entered promiscuous mode [ 1472.820899][T22295] team0: entered promiscuous mode [ 1472.826199][T22295] team_slave_0: entered promiscuous mode [ 1472.832147][T22295] team_slave_1: entered promiscuous mode [ 1472.841758][T22295] dummy0: entered promiscuous mode [ 1472.851276][T22295] nlmon0: entered promiscuous mode [ 1472.859565][T22295] caif0: entered promiscuous mode [ 1472.865313][T22295] batadv0: entered promiscuous mode [ 1472.875579][T22295] vxcan0: entered promiscuous mode [ 1472.884361][T22295] vxcan1: entered promiscuous mode [ 1472.892423][T22295] veth0: entered promiscuous mode [ 1472.901451][T22295] veth1: entered promiscuous mode [ 1472.911109][T22295] wg0: entered promiscuous mode [ 1472.920524][T22295] wg1: entered promiscuous mode [ 1472.930130][T22295] wg2: entered promiscuous mode [ 1472.937996][T22295] veth0_to_bridge: entered promiscuous mode [ 1472.952217][T22295] veth1_to_bridge: entered promiscuous mode [ 1473.180721][T22295] veth0_to_bond: entered promiscuous mode [ 1473.189786][T22295] veth1_to_bond: entered promiscuous mode [ 1473.200525][T22295] veth0_to_team: entered promiscuous mode [ 1473.211064][T22295] veth1_to_team: entered promiscuous mode [ 1473.221190][T22295] veth0_to_batadv: entered promiscuous mode [ 1473.230502][T22295] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1473.238843][T22295] batadv_slave_0: entered promiscuous mode [ 1473.246581][T22295] veth1_to_batadv: entered promiscuous mode [ 1473.255591][T22295] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1473.263875][T22295] batadv_slave_1: entered promiscuous mode [ 1473.272617][T22295] xfrm0: entered promiscuous mode [ 1473.288060][T22295] veth0_to_hsr: entered promiscuous mode [ 1473.298290][T22295] veth1_to_hsr: entered promiscuous mode [ 1473.308246][T22295] hsr0: entered promiscuous mode [ 1473.315868][T22295] veth1_virt_wifi: entered promiscuous mode [ 1473.323959][T22295] veth0_virt_wifi: entered promiscuous mode [ 1473.330564][T22289] netlink: 'syz.5.15939': attribute type 1 has an invalid length. [ 1473.335829][T22295] vlan0: entered promiscuous mode [ 1473.344027][T22295] vlan1: entered promiscuous mode [ 1473.362135][T22295] macvlan0: entered promiscuous mode [ 1473.370190][T22295] macvlan1: entered promiscuous mode [ 1473.377384][T22295] ipvlan0: entered promiscuous mode [ 1473.382668][T22295] ipvlan1: entered promiscuous mode [ 1473.472752][T22295] macvtap0: entered promiscuous mode [ 1473.481161][T22295] macsec0: entered promiscuous mode [ 1473.491737][T22295] geneve0: entered promiscuous mode [ 1473.501840][T22295] geneve1: entered promiscuous mode [ 1473.508888][T22295] netdevsim netdevsim7 netdevsim0: entered promiscuous mode [ 1473.519481][T22295] netdevsim netdevsim7 netdevsim1: entered promiscuous mode [ 1473.530097][T22295] netdevsim netdevsim7 netdevsim2: entered promiscuous mode [ 1473.540771][T22295] netdevsim netdevsim7 netdevsim3: entered promiscuous mode [ 1473.549918][T22295] bond1: entered promiscuous mode [ 1473.555221][T22295] ip6gretap1: entered promiscuous mode [ 1473.562772][T22295] bond3: entered promiscuous mode [ 1473.568560][T22295] bond4: entered promiscuous mode [ 1473.575532][T22295] bond5: entered promiscuous mode [ 1473.588570][T22295] bond6: entered promiscuous mode [ 1473.719964][ T36] netdevsim netdevsim7 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1473.740360][ T36] netdevsim netdevsim7 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1473.773447][ T36] netdevsim netdevsim7 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1473.787624][T22325] netlink: 4 bytes leftover after parsing attributes in process `syz.3.15947'. [ 1473.836815][ T36] netdevsim netdevsim7 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1473.911453][T22328] sit1: entered allmulticast mode [ 1473.936953][T22332] netlink: 32 bytes leftover after parsing attributes in process `syz.3.15950'. [ 1474.020150][T22339] lo speed is unknown, defaulting to 1000 [ 1474.033851][T22344] vhci_hcd vhci_hcd.3: default hub control req: 8013 v0000 i0000 l31125 [ 1474.235004][T22355] netlink: 40 bytes leftover after parsing attributes in process `syz.3.15950'. [ 1474.360577][T22355] netlink: 40 bytes leftover after parsing attributes in process `syz.3.15950'. [ 1474.519990][T22351] lo speed is unknown, defaulting to 1000 [ 1474.538174][T22355] netlink: 40 bytes leftover after parsing attributes in process `syz.3.15950'. [ 1475.088864][ T28] kauditd_printk_skb: 54 callbacks suppressed [ 1475.088939][ T28] audit: type=1326 audit(1774365477.559:1439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22352 comm="syz.2.15957" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f136beac799 code=0x7ffc0000 [ 1475.163116][ T28] audit: type=1326 audit(1774365477.589:1440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22352 comm="syz.2.15957" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f136beac799 code=0x7ffc0000 [ 1475.222148][ T28] audit: type=1326 audit(1774365477.589:1441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22352 comm="syz.2.15957" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f136beac799 code=0x7ffc0000 [ 1475.273585][ T28] audit: type=1326 audit(1774365477.589:1442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22352 comm="syz.2.15957" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f136beac799 code=0x7ffc0000 [ 1475.304537][T22367] netlink: 220 bytes leftover after parsing attributes in process `syz.0.15953'. [ 1475.377339][ T28] audit: type=1326 audit(1774365477.589:1443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22352 comm="syz.2.15957" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f136beac799 code=0x7ffc0000 [ 1475.461033][ T28] audit: type=1326 audit(1774365477.589:1444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22352 comm="syz.2.15957" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f136beac799 code=0x7ffc0000 [ 1475.490046][T22369] FAULT_INJECTION: forcing a failure. [ 1475.490046][T22369] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1475.545500][T22369] CPU: 1 UID: 0 PID: 22369 Comm: syz.7.15959 Tainted: G W syzkaller #0 PREEMPT(full) [ 1475.545530][T22369] Tainted: [W]=WARN [ 1475.545536][T22369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1475.545545][T22369] Call Trace: [ 1475.545551][T22369] [ 1475.545558][T22369] __dump_stack+0x1d/0x30 [ 1475.545581][T22369] dump_stack_lvl+0x95/0xd0 [ 1475.545674][T22369] dump_stack+0x15/0x1b [ 1475.545693][T22369] should_fail_ex+0x263/0x280 [ 1475.545716][T22369] should_fail+0xb/0x20 [ 1475.545735][T22369] should_fail_usercopy+0x1a/0x20 [ 1475.545810][T22369] _copy_from_user+0x1c/0xb0 [ 1475.545832][T22369] ___sys_sendmsg+0xc1/0x1e0 [ 1475.546106][T22369] __x64_sys_sendmsg+0xd4/0x160 [ 1475.546175][T22369] x64_sys_call+0x194c/0x3020 [ 1475.546265][T22369] do_syscall_64+0x12c/0x370 [ 1475.546286][T22369] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1475.546304][T22369] RIP: 0033:0x7f263e20c799 [ 1475.546335][T22369] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1475.546423][T22369] RSP: 002b:00007f263cc67028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1475.546444][T22369] RAX: ffffffffffffffda RBX: 00007f263e485fa0 RCX: 00007f263e20c799 [ 1475.546458][T22369] RDX: 0000000004080800 RSI: 0000200000000000 RDI: 0000000000000003 [ 1475.546470][T22369] RBP: 00007f263cc67090 R08: 0000000000000000 R09: 0000000000000000 [ 1475.546505][T22369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1475.546516][T22369] R13: 00007f263e486038 R14: 00007f263e485fa0 R15: 00007ffcde1ec938 [ 1475.546535][T22369] [ 1475.707417][ T28] audit: type=1326 audit(1774365477.599:1445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22337 comm="syz.0.15953" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f6e0cebc799 code=0x0 [ 1475.760073][ T28] audit: type=1326 audit(1774365477.659:1446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22352 comm="syz.2.15957" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f136beac799 code=0x7ffc0000 [ 1475.802887][ T28] audit: type=1326 audit(1774365477.659:1447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22352 comm="syz.2.15957" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f136beac799 code=0x7ffc0000 [ 1475.834008][ T28] audit: type=1326 audit(1774365477.659:1448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22352 comm="syz.2.15957" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f136beac799 code=0x7ffc0000 [ 1476.039408][T22378] xfrm0 speed is unknown, defaulting to 1000 [ 1477.305102][T22378] xfrm0 speed is unknown, defaulting to 1000 [ 1477.357926][T22404] netlink: 32 bytes leftover after parsing attributes in process `syz.3.15970'. [ 1477.373189][T22402] lo speed is unknown, defaulting to 1000 [ 1477.385560][T22378] xfrm0 speed is unknown, defaulting to 1000 [ 1477.649650][T22407] netlink: 40 bytes leftover after parsing attributes in process `syz.3.15970'. [ 1477.741070][T22407] netlink: 40 bytes leftover after parsing attributes in process `syz.3.15970'. [ 1477.785684][T22378] infiniband syz1: set down [ 1477.794869][ T2421] xfrm0 speed is unknown, defaulting to 1000 [ 1477.857381][T22378] infiniband syz1: added xfrm0 [ 1477.883011][T22413] FAULT_INJECTION: forcing a failure. [ 1477.883011][T22413] name failslab, interval 1, probability 0, space 0, times 0 [ 1477.913149][T22407] netlink: 40 bytes leftover after parsing attributes in process `syz.3.15970'. [ 1477.930990][T22378] workqueue: Failed to create a rescuer kthread for wq "ib_mad1": -EINTR [ 1477.931519][T22378] infiniband syz1: Couldn't open port 1 [ 1478.028991][T22413] CPU: 0 UID: 0 PID: 22413 Comm: syz.0.15971 Tainted: G W syzkaller #0 PREEMPT(full) [ 1478.029020][T22413] Tainted: [W]=WARN [ 1478.029027][T22413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1478.029038][T22413] Call Trace: [ 1478.029044][T22413] [ 1478.029051][T22413] __dump_stack+0x1d/0x30 [ 1478.029084][T22413] dump_stack_lvl+0x95/0xd0 [ 1478.029105][T22413] dump_stack+0x15/0x1b [ 1478.029124][T22413] should_fail_ex+0x263/0x280 [ 1478.029146][T22413] should_failslab+0x8c/0xb0 [ 1478.029185][T22413] kmem_cache_alloc_noprof+0x66/0x400 [ 1478.029201][T22413] ? security_inode_alloc+0x37/0x100 [ 1478.029250][T22413] security_inode_alloc+0x37/0x100 [ 1478.029307][T22413] inode_init_always_gfp+0x4b7/0x500 [ 1478.029330][T22413] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 1478.029356][T22413] alloc_inode+0x58/0x170 [ 1478.029372][T22413] new_inode+0x1d/0xe0 [ 1478.029439][T22413] shmem_get_inode+0x246/0x750 [ 1478.029539][T22413] shmem_mknod+0x44/0x170 [ 1478.029606][T22413] shmem_mkdir+0x33/0x70 [ 1478.029627][T22413] vfs_mkdir+0x294/0x3e0 [ 1478.029676][T22413] filename_mkdirat+0x138/0x300 [ 1478.029692][T22413] __se_sys_mkdirat+0x32/0xf0 [ 1478.029709][T22413] __x64_sys_mkdirat+0x43/0x50 [ 1478.029727][T22413] x64_sys_call+0x2c4e/0x3020 [ 1478.029805][T22413] do_syscall_64+0x12c/0x370 [ 1478.029865][T22413] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1478.029918][T22413] RIP: 0033:0x7f6e0cebb607 [ 1478.029930][T22413] Code: 00 66 90 48 89 f2 b9 00 01 00 00 48 89 fe bf 9c ff ff ff e9 db f7 ff ff 66 2e 0f 1f 84 00 00 00 00 00 90 b8 02 01 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1478.029948][T22413] RSP: 002b:00007f6e0b916e58 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1478.029967][T22413] RAX: ffffffffffffffda RBX: 00007f6e0b916ee0 RCX: 00007f6e0cebb607 [ 1478.029981][T22413] RDX: 00000000000001ff RSI: 0000200000000080 RDI: 00000000ffffff9c [ 1478.029993][T22413] RBP: 0000200000000040 R08: 00002000000000c0 R09: 0000000000000000 [ 1478.030003][T22413] R10: 0000200000000040 R11: 0000000000000246 R12: 0000200000000080 [ 1478.030030][T22413] R13: 00007f6e0b916ea0 R14: 0000000000000000 R15: 0000000000000000 [ 1478.030043][T22413] [ 1478.492393][T22417] lo speed is unknown, defaulting to 1000 [ 1478.500274][T22417] xfrm0 speed is unknown, defaulting to 1000 [ 1478.583581][T22378] RDS/IB: syz1: added [ 1478.594136][T22378] smc: adding ib device syz1 with port count 1 [ 1478.607178][T22378] smc: ib device syz1 port 1 has pnetid SYZ0 (user defined) [ 1478.639046][ T2421] xfrm0 speed is unknown, defaulting to 1000 [ 1478.646529][T22378] xfrm0 speed is unknown, defaulting to 1000 [ 1478.752910][T22378] xfrm0 speed is unknown, defaulting to 1000 [ 1478.867459][T22378] xfrm0 speed is unknown, defaulting to 1000 [ 1478.981676][T22378] xfrm0 speed is unknown, defaulting to 1000 [ 1479.015519][T22432] __nla_validate_parse: 1 callbacks suppressed [ 1479.015536][T22432] netlink: 16 bytes leftover after parsing attributes in process `syz.3.15977'. [ 1479.086376][T22378] xfrm0 speed is unknown, defaulting to 1000 [ 1479.135420][T22378] xfrm0 speed is unknown, defaulting to 1000 [ 1479.186500][T22378] xfrm0 speed is unknown, defaulting to 1000 [ 1479.281303][T22378] xfrm0 speed is unknown, defaulting to 1000 [ 1479.356332][T22378] xfrm0 speed is unknown, defaulting to 1000 [ 1479.376805][T22444] netlink: 56 bytes leftover after parsing attributes in process `syz.0.15982'. [ 1479.409335][T22378] xfrm0 speed is unknown, defaulting to 1000 [ 1479.446997][T22378] xfrm0 speed is unknown, defaulting to 1000 [ 1479.615727][T22378] xfrm0 speed is unknown, defaulting to 1000 [ 1479.723609][T22453] netlink: 'syz.5.15985': attribute type 1 has an invalid length. [ 1479.735798][T22378] xfrm0 speed is unknown, defaulting to 1000 [ 1479.782675][T22453] bond6: (slave ip6gre1): The slave device specified does not support setting the MAC address [ 1479.815828][T22453] bond6: (slave ip6gre1): Setting fail_over_mac to active for active-backup mode [ 1479.827693][T22453] bond6: (slave ip6gre1): making interface the new active one [ 1479.836517][T22453] bond6: (slave ip6gre1): Enslaving as an active interface with an up link [ 1479.855476][T22378] xfrm0 speed is unknown, defaulting to 1000 [ 1479.965257][T22378] xfrm0 speed is unknown, defaulting to 1000 [ 1479.983961][T22459] netlink: 4 bytes leftover after parsing attributes in process `syz.5.15987'. [ 1480.076274][T22378] xfrm0 speed is unknown, defaulting to 1000 [ 1480.199440][T22378] xfrm0 speed is unknown, defaulting to 1000 [ 1480.256558][T22463] netlink: 32 bytes leftover after parsing attributes in process `syz.5.15988'. [ 1480.264503][T22378] xfrm0 speed is unknown, defaulting to 1000 [ 1480.394287][T22378] xfrm0 speed is unknown, defaulting to 1000 [ 1480.525424][T22469] bond6: entered promiscuous mode [ 1480.531144][T22469] ip6gre1: entered promiscuous mode [ 1480.554950][T22469] netlink: 40 bytes leftover after parsing attributes in process `syz.5.15988'. [ 1480.579361][T22448] lo speed is unknown, defaulting to 1000 [ 1480.888742][T22480] sctp: [Deprecated]: syz.7.15990 (pid 22480) Use of int in maxseg socket option. [ 1480.888742][T22480] Use struct sctp_assoc_value instead [ 1480.917506][ T28] kauditd_printk_skb: 67 callbacks suppressed [ 1480.917549][ T28] audit: type=1400 audit(1774365483.349:1516): avc: denied { read } for pid=22478 comm="syz.7.15990" path="socket:[200266]" dev="sockfs" ino=200266 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 1481.130845][T22484] FAULT_INJECTION: forcing a failure. [ 1481.130845][T22484] name failslab, interval 1, probability 0, space 0, times 0 [ 1481.145874][T22484] CPU: 0 UID: 0 PID: 22484 Comm: syz.2.15991 Tainted: G W syzkaller #0 PREEMPT(full) [ 1481.145900][T22484] Tainted: [W]=WARN [ 1481.145907][T22484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1481.145919][T22484] Call Trace: [ 1481.145926][T22484] [ 1481.145933][T22484] __dump_stack+0x1d/0x30 [ 1481.146032][T22484] dump_stack_lvl+0x95/0xd0 [ 1481.146103][T22484] dump_stack+0x15/0x1b [ 1481.146123][T22484] should_fail_ex+0x263/0x280 [ 1481.146168][T22484] should_failslab+0x8c/0xb0 [ 1481.146205][T22484] kmem_cache_alloc_noprof+0x66/0x400 [ 1481.146226][T22484] ? security_file_alloc+0x32/0xf0 [ 1481.146247][T22484] security_file_alloc+0x32/0xf0 [ 1481.146262][T22484] init_file+0x5b/0x1b0 [ 1481.146305][T22484] alloc_empty_file+0x8b/0x200 [ 1481.146322][T22484] alloc_file_pseudo+0xf6/0x190 [ 1481.146342][T22484] anon_inode_getfile_fmode+0xa5/0x140 [ 1481.146362][T22484] do_signalfd4+0x156/0x320 [ 1481.146534][T22484] __x64_sys_signalfd4+0xce/0x100 [ 1481.146551][T22484] x64_sys_call+0x2c85/0x3020 [ 1481.146615][T22484] do_syscall_64+0x12c/0x370 [ 1481.146634][T22484] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1481.146655][T22484] RIP: 0033:0x7f136beac799 [ 1481.146669][T22484] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1481.146758][T22484] RSP: 002b:00007f136a8bd028 EFLAGS: 00000246 ORIG_RAX: 0000000000000121 [ 1481.146856][T22484] RAX: ffffffffffffffda RBX: 00007f136c126180 RCX: 00007f136beac799 [ 1481.146868][T22484] RDX: 0000000000000008 RSI: 00002000000000c0 RDI: ffffffffffffffff [ 1481.146920][T22484] RBP: 00007f136a8bd090 R08: 0000000000000000 R09: 0000000000000000 [ 1481.146932][T22484] R10: 0000000000000800 R11: 0000000000000246 R12: 0000000000000001 [ 1481.146941][T22484] R13: 00007f136c126218 R14: 00007f136c126180 R15: 00007fffd618ea78 [ 1481.147079][T22484] [ 1481.485182][T22488] netlink: 4 bytes leftover after parsing attributes in process `syz.0.15992'. [ 1481.499874][T22490] FAULT_INJECTION: forcing a failure. [ 1481.499874][T22490] name failslab, interval 1, probability 0, space 0, times 0 [ 1481.537268][T22497] netlink: 28 bytes leftover after parsing attributes in process `syz.0.15992'. [ 1481.560934][T22497] ipvlan2: entered promiscuous mode [ 1481.575894][T22497] team0: Device ipvlan2 failed to register rx_handler [ 1481.617977][T22490] CPU: 0 UID: 0 PID: 22490 Comm: syz.7.15993 Tainted: G W syzkaller #0 PREEMPT(full) [ 1481.618009][T22490] Tainted: [W]=WARN [ 1481.618081][T22490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1481.618093][T22490] Call Trace: [ 1481.618101][T22490] [ 1481.618109][T22490] __dump_stack+0x1d/0x30 [ 1481.618135][T22490] dump_stack_lvl+0x95/0xd0 [ 1481.618176][T22490] dump_stack+0x15/0x1b [ 1481.618192][T22490] should_fail_ex+0x263/0x280 [ 1481.618214][T22490] should_failslab+0x8c/0xb0 [ 1481.618357][T22490] __kvmalloc_node_noprof+0x155/0x650 [ 1481.618455][T22490] ? __kmalloc_cache_noprof+0x2f9/0x410 [ 1481.618472][T22490] ? io_alloc_cache_init+0x36/0xb0 [ 1481.618651][T22490] io_alloc_cache_init+0x36/0xb0 [ 1481.618676][T22490] io_ring_ctx_alloc+0x2a3/0x670 [ 1481.618700][T22490] io_uring_create+0x50/0x510 [ 1481.618778][T22490] ? memchr_inv+0x30/0x2f0 [ 1481.618859][T22490] __se_sys_io_uring_setup+0x1cb/0x1e0 [ 1481.618885][T22490] __x64_sys_io_uring_setup+0x31/0x40 [ 1481.618901][T22490] x64_sys_call+0x2962/0x3020 [ 1481.618925][T22490] do_syscall_64+0x12c/0x370 [ 1481.619091][T22490] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1481.619114][T22490] RIP: 0033:0x7f263e20c799 [ 1481.619132][T22490] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1481.619160][T22490] RSP: 002b:00007f263cc66fb8 EFLAGS: 00000202 ORIG_RAX: 00000000000001a9 [ 1481.619176][T22490] RAX: ffffffffffffffda RBX: 00007f263e485fa0 RCX: 00007f263e20c799 [ 1481.619188][T22490] RDX: 00002000000000c0 RSI: 0000200000000000 RDI: 0000000000000bdc [ 1481.619199][T22490] RBP: 0000200000000000 R08: 0000000000000000 R09: 00002000000000c0 [ 1481.619210][T22490] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000001 [ 1481.619221][T22490] R13: 00002000000006c0 R14: 0000000000000bdc R15: 00002000000000c0 [ 1481.619237][T22490] [ 1481.972543][T22512] netlink: 8 bytes leftover after parsing attributes in process `syz.3.15994'. [ 1481.987877][T22512] bond4: Unable to set up delay as MII monitoring is disabled [ 1481.999326][T22512] bond4 (unregistering): Released all slaves [ 1482.039746][T22519] team0: Device macvtap1 is already an upper device of the team interface [ 1482.352988][T22524] lo speed is unknown, defaulting to 1000 [ 1482.361096][T22524] xfrm0 speed is unknown, defaulting to 1000 [ 1482.874129][T22533] bridge0: left promiscuous mode [ 1482.886723][T22533] bridge0: entered allmulticast mode [ 1482.893660][T22533] bridge_slave_1: left allmulticast mode [ 1482.899734][T22533] bridge0: port 2(bridge_slave_1) entered disabled state [ 1482.919670][T22533] bridge_slave_0: left allmulticast mode [ 1482.926003][T22533] bridge0: port 1(bridge_slave_0) entered disabled state [ 1482.978181][T22539] netlink: 48 bytes leftover after parsing attributes in process `syz.5.16006'. [ 1483.005346][T22538] batman_adv: batadv0: Adding interface: macsec1 [ 1483.012708][T22538] batman_adv: batadv0: The MTU of interface macsec1 is too small (1468) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1483.041954][T22538] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1483.052951][T22538] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1483.063591][T22538] batman_adv: batadv0: Interface activated: macsec1 [ 1483.316038][T22545] netlink: 8 bytes leftover after parsing attributes in process `syz.5.16009'. [ 1485.208142][ T5843] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1485.731427][T22547] netlink: 8 bytes leftover after parsing attributes in process `syz.7.16008'. [ 1485.770270][ T5843] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1486.650381][T22566] netlink: 28 bytes leftover after parsing attributes in process `syz.7.16014'. [ 1487.298508][T22566] netlink: 64 bytes leftover after parsing attributes in process `syz.7.16014'. [ 1487.321998][ T5843] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1487.371984][ T5843] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1487.388237][T22561] sg_write: data in/out 124/1 bytes for SCSI command 0x1c-- guessing data in; [ 1487.388237][T22561] program syz.3.16011 not setting count and/or reply_len properly [ 1487.435825][ T28] audit: type=1400 audit(1774365489.899:1517): avc: denied { accept } for pid=22580 comm="syz.2.16018" path="socket:[200501]" dev="sockfs" ino=200501 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1487.578887][T22593] netlink: 32 bytes leftover after parsing attributes in process `syz.0.16021'. [ 1487.645435][T22597] lo speed is unknown, defaulting to 1000 [ 1487.654226][T22597] xfrm0 speed is unknown, defaulting to 1000 [ 1487.814904][T22604] batman_adv: batadv0: Interface deactivated: macsec1 [ 1487.847550][T22604] macsec1: entered promiscuous mode [ 1487.887735][T22604] netlink: 40 bytes leftover after parsing attributes in process `syz.0.16021'. [ 1487.962126][ T5843] bridge0: port 3(vlan0) entered disabled state [ 1488.039270][ T5843] bridge_slave_1: left allmulticast mode [ 1488.053936][T22604] netlink: 40 bytes leftover after parsing attributes in process `syz.0.16021'. [ 1488.122326][ T5843] bridge_slave_1: left promiscuous mode [ 1488.162512][T22611] syz.3.16011 (22611): attempted to duplicate a private mapping with mremap. This is not supported. [ 1488.209298][ T5843] bridge0: port 2(bridge_slave_1) entered disabled state [ 1488.260662][T22604] netlink: 40 bytes leftover after parsing attributes in process `syz.0.16021'. [ 1488.293981][ T5843] bridge_slave_0: left allmulticast mode [ 1488.342045][T22561] __vm_enough_memory: pid: 22561, comm: syz.3.16011, bytes: 11727911428096 not enough memory for the allocation [ 1488.366204][ T5843] bridge_slave_0: left promiscuous mode [ 1488.557637][ T5843] bridge0: port 1(bridge_slave_0) entered disabled state [ 1488.723591][ T28] audit: type=1400 audit(1774365491.189:1518): avc: denied { write } for pid=22551 comm="syz.3.16011" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1488.949526][ T5843] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1488.976553][ T5843] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1489.009582][ T5843] bond0 (unregistering): Released all slaves [ 1489.084327][T22633] netlink: 220 bytes leftover after parsing attributes in process `syz.2.16026'. [ 1489.341784][T22653] netlink: 220 bytes leftover after parsing attributes in process `syz.0.16029'. [ 1489.378216][ T5843] hsr_slave_0: left promiscuous mode [ 1489.385981][ T28] audit: type=1400 audit(1774365491.849:1519): avc: denied { ioctl } for pid=22655 comm="syz.0.16030" path="/dev/uhid" dev="devtmpfs" ino=253 ioctlcmd=0x940a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1489.413994][ T2424] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 1489.425421][ T5843] hsr_slave_1: left promiscuous mode [ 1489.434992][ T5843] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1489.442489][ T2424] hid-generic 0000:0000:0000.000F: hidraw0: HID v0.00 Device [syz1] on syz0 [ 1489.453313][ T5843] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1489.482798][ T5843] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1489.498400][ T5843] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1489.522795][ T5843] veth1_macvtap: left promiscuous mode [ 1489.549651][ T5843] veth0_macvtap: left promiscuous mode [ 1489.566813][ T5843] veth1_vlan: left promiscuous mode [ 1489.659949][T22670] netlink: 4 bytes leftover after parsing attributes in process `syz.2.16035'. [ 1490.779844][ T5843] team0 (unregistering): Port device team_slave_1 removed [ 1490.800320][ T5843] team0 (unregistering): Port device team_slave_0 removed [ 1490.887319][T22672] faux_driver regulatory: loading /lib/firmware/regulatory.db failed with error -4 [ 1490.897297][T22672] faux_driver regulatory: Direct firmware load for regulatory.db failed with error -4 [ 1491.184989][T22695] netlink: 12 bytes leftover after parsing attributes in process `syz.7.16041'. [ 1491.196905][T22695] netlink: 28 bytes leftover after parsing attributes in process `syz.7.16041'. [ 1491.207308][T22695] netlink: 12 bytes leftover after parsing attributes in process `syz.7.16041'. [ 1491.217141][T22695] FAULT_INJECTION: forcing a failure. [ 1491.217141][T22695] name failslab, interval 1, probability 0, space 0, times 0 [ 1491.231689][T22695] CPU: 1 UID: 0 PID: 22695 Comm: syz.7.16041 Tainted: G W syzkaller #0 PREEMPT(full) [ 1491.231736][T22695] Tainted: [W]=WARN [ 1491.231743][T22695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1491.231753][T22695] Call Trace: [ 1491.231759][T22695] [ 1491.231765][T22695] __dump_stack+0x1d/0x30 [ 1491.231788][T22695] dump_stack_lvl+0x95/0xd0 [ 1491.231857][T22695] dump_stack+0x15/0x1b [ 1491.231874][T22695] should_fail_ex+0x263/0x280 [ 1491.231894][T22695] should_failslab+0x8c/0xb0 [ 1491.231910][T22695] kmem_cache_alloc_noprof+0x66/0x400 [ 1491.232007][T22695] ? radix_tree_node_alloc+0x8a/0x1f0 [ 1491.232023][T22695] radix_tree_node_alloc+0x8a/0x1f0 [ 1491.232038][T22695] ? sysvec_apic_timer_interrupt+0x44/0x80 [ 1491.232071][T22695] idr_get_free+0x1fa/0x550 [ 1491.232173][T22695] idr_alloc_u32+0xf2/0x1a0 [ 1491.232221][T22695] tcf_idr_check_alloc+0x1ff/0x2e0 [ 1491.232243][T22695] tcf_mirred_init+0x194/0x990 [ 1491.232265][T22695] ? __pfx_tcf_mirred_init+0x10/0x10 [ 1491.232333][T22695] tcf_action_init_1+0x395/0x4d0 [ 1491.232354][T22695] tcf_action_init+0x29c/0x700 [ 1491.232445][T22695] tc_ctl_action+0x29b/0x830 [ 1491.232480][T22695] ? __pfx_tc_ctl_action+0x10/0x10 [ 1491.232496][T22695] rtnetlink_rcv_msg+0x6a7/0x720 [ 1491.232512][T22695] ? avc_has_perm_noaudit+0xab/0x130 [ 1491.232533][T22695] ? raw_irqentry_exit_cond_resched+0x3d/0x60 [ 1491.232603][T22695] ? irqentry_exit+0x91/0x520 [ 1491.232625][T22695] netlink_rcv_skb+0x123/0x220 [ 1491.232646][T22695] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 1491.232699][T22695] rtnetlink_rcv+0x1c/0x30 [ 1491.232713][T22695] netlink_unicast+0x5c0/0x690 [ 1491.232783][T22695] netlink_sendmsg+0x5c8/0x6f0 [ 1491.232837][T22695] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1491.232929][T22695] ____sys_sendmsg+0x563/0x5b0 [ 1491.232995][T22695] ___sys_sendmsg+0x195/0x1e0 [ 1491.233026][T22695] __x64_sys_sendmsg+0xd4/0x160 [ 1491.233089][T22695] x64_sys_call+0x194c/0x3020 [ 1491.233108][T22695] do_syscall_64+0x12c/0x370 [ 1491.233125][T22695] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1491.233179][T22695] RIP: 0033:0x7f263e20c799 [ 1491.233192][T22695] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1491.233241][T22695] RSP: 002b:00007f263cc67028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1491.233291][T22695] RAX: ffffffffffffffda RBX: 00007f263e485fa0 RCX: 00007f263e20c799 [ 1491.233302][T22695] RDX: 0000000000000000 RSI: 0000200000006280 RDI: 0000000000000006 [ 1491.233312][T22695] RBP: 00007f263cc67090 R08: 0000000000000000 R09: 0000000000000000 [ 1491.233322][T22695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1491.233378][T22695] R13: 00007f263e486038 R14: 00007f263e485fa0 R15: 00007ffcde1ec938 [ 1491.233394][T22695] [ 1491.593371][T22690] lo speed is unknown, defaulting to 1000 [ 1491.605148][T22690] xfrm0 speed is unknown, defaulting to 1000 [ 1491.937427][T22750] syzkaller0: entered promiscuous mode [ 1491.943020][T22750] syzkaller0: entered allmulticast mode [ 1492.058761][T22758] FAULT_INJECTION: forcing a failure. [ 1492.058761][T22758] name failslab, interval 1, probability 0, space 0, times 0 [ 1492.086898][T22758] CPU: 1 UID: 0 PID: 22758 Comm: syz.3.16051 Tainted: G W syzkaller #0 PREEMPT(full) [ 1492.086952][T22758] Tainted: [W]=WARN [ 1492.086958][T22758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1492.086967][T22758] Call Trace: [ 1492.086972][T22758] [ 1492.086979][T22758] __dump_stack+0x1d/0x30 [ 1492.087079][T22758] dump_stack_lvl+0x95/0xd0 [ 1492.087096][T22758] dump_stack+0x15/0x1b [ 1492.087111][T22758] should_fail_ex+0x263/0x280 [ 1492.087134][T22758] should_failslab+0x8c/0xb0 [ 1492.087154][T22758] __kmalloc_noprof+0xb8/0x4e0 [ 1492.087223][T22758] ? tcf_idr_create+0x41/0x4a0 [ 1492.087240][T22758] tcf_idr_create+0x41/0x4a0 [ 1492.087309][T22758] tcf_idr_create_from_flags+0x60/0x80 [ 1492.087330][T22758] tcf_mirred_init+0x460/0x990 [ 1492.087352][T22758] ? __pfx_tcf_mirred_init+0x10/0x10 [ 1492.087370][T22758] tcf_action_init_1+0x395/0x4d0 [ 1492.087424][T22758] tcf_action_init+0x29c/0x700 [ 1492.087458][T22758] ? irqentry_exit+0x91/0x520 [ 1492.087518][T22758] tc_ctl_action+0x29b/0x830 [ 1492.087544][T22758] ? __pfx_tc_ctl_action+0x10/0x10 [ 1492.087559][T22758] rtnetlink_rcv_msg+0x6a7/0x720 [ 1492.087575][T22758] ? raw_irqentry_exit_cond_resched+0x3d/0x60 [ 1492.087606][T22758] ? irqentry_exit+0x91/0x520 [ 1492.087632][T22758] netlink_rcv_skb+0x123/0x220 [ 1492.087693][T22758] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 1492.087714][T22758] rtnetlink_rcv+0x1c/0x30 [ 1492.087727][T22758] netlink_unicast+0x5c0/0x690 [ 1492.087755][T22758] netlink_sendmsg+0x5c8/0x6f0 [ 1492.087897][T22758] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1492.087919][T22758] ____sys_sendmsg+0x563/0x5b0 [ 1492.087981][T22758] ___sys_sendmsg+0x195/0x1e0 [ 1492.088009][T22758] __x64_sys_sendmsg+0xd4/0x160 [ 1492.088085][T22758] x64_sys_call+0x194c/0x3020 [ 1492.088107][T22758] do_syscall_64+0x12c/0x370 [ 1492.088127][T22758] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1492.088144][T22758] RIP: 0033:0x7ff19932c799 [ 1492.088212][T22758] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1492.088225][T22758] RSP: 002b:00007ff197d87028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1492.088241][T22758] RAX: ffffffffffffffda RBX: 00007ff1995a5fa0 RCX: 00007ff19932c799 [ 1492.088278][T22758] RDX: 0000000000000000 RSI: 0000200000006280 RDI: 0000000000000006 [ 1492.088292][T22758] RBP: 00007ff197d87090 R08: 0000000000000000 R09: 0000000000000000 [ 1492.088305][T22758] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1492.088387][T22758] R13: 00007ff1995a6038 R14: 00007ff1995a5fa0 R15: 00007fff46ec2b58 [ 1492.088405][T22758] [ 1492.489110][T22774] netlink: 'syz.0.16053': attribute type 1 has an invalid length. [ 1492.519417][T22774] 8021q: adding VLAN 0 to HW filter on device bond6 [ 1492.540644][T22774] netlink: 8 bytes leftover after parsing attributes in process `syz.0.16053'. [ 1492.582898][T22774] bond7: Unable to set up delay as MII monitoring is disabled [ 1492.630850][T22774] bond7 (unregistering): Released all slaves [ 1492.668482][T22778] team0: Device macvtap1 is already an upper device of the team interface [ 1493.967400][T22805] FAULT_INJECTION: forcing a failure. [ 1493.967400][T22805] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1494.004454][T22805] CPU: 1 UID: 0 PID: 22805 Comm: syz.2.16063 Tainted: G W syzkaller #0 PREEMPT(full) [ 1494.004530][T22805] Tainted: [W]=WARN [ 1494.004541][T22805] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1494.004550][T22805] Call Trace: [ 1494.004556][T22805] [ 1494.004564][T22805] __dump_stack+0x1d/0x30 [ 1494.004588][T22805] dump_stack_lvl+0x95/0xd0 [ 1494.004667][T22805] dump_stack+0x15/0x1b [ 1494.004687][T22805] should_fail_ex+0x263/0x280 [ 1494.004773][T22805] should_fail+0xb/0x20 [ 1494.004792][T22805] should_fail_usercopy+0x1a/0x20 [ 1494.004815][T22805] _copy_from_user+0x1c/0xb0 [ 1494.004837][T22805] __copy_msghdr+0x244/0x300 [ 1494.004884][T22805] ___sys_sendmsg+0x10c/0x1e0 [ 1494.004915][T22805] __x64_sys_sendmsg+0xd4/0x160 [ 1494.004941][T22805] x64_sys_call+0x194c/0x3020 [ 1494.004989][T22805] do_syscall_64+0x12c/0x370 [ 1494.005007][T22805] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1494.005060][T22805] RIP: 0033:0x7f136beac799 [ 1494.005073][T22805] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1494.005113][T22805] RSP: 002b:00007f136a8ff028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1494.005176][T22805] RAX: ffffffffffffffda RBX: 00007f136c125fa0 RCX: 00007f136beac799 [ 1494.005187][T22805] RDX: 0000000000008000 RSI: 00002000000001c0 RDI: 0000000000000003 [ 1494.005267][T22805] RBP: 00007f136a8ff090 R08: 0000000000000000 R09: 0000000000000000 [ 1494.005276][T22805] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1494.005286][T22805] R13: 00007f136c126038 R14: 00007f136c125fa0 R15: 00007fffd618ea78 [ 1494.005300][T22805] [ 1494.206456][T22795] dvmrp0: entered allmulticast mode [ 1494.226399][T22791] dvmrp0: left allmulticast mode [ 1494.253362][T22808] syzkaller0: entered promiscuous mode [ 1494.259814][T22808] syzkaller0: entered allmulticast mode [ 1494.477873][T22824] netlink: 8 bytes leftover after parsing attributes in process `syz.0.16066'. [ 1495.430754][T22837] siw: device registration error -23 [ 1495.438983][T22838] siw: device registration error -23 [ 1495.449155][T22838] netlink: 14 bytes leftover after parsing attributes in process `syz.7.16074'. [ 1495.461387][T22838] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1495.472395][T22838] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1495.484003][T22838] bond0 (unregistering): Released all slaves [ 1495.500083][ T28] audit: type=1400 audit(1774365497.969:1520): avc: denied { write } for pid=22836 comm="syz.7.16074" name="urandom" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 1495.794898][T22844] siw: device registration error -23 [ 1495.871424][T22847] lo speed is unknown, defaulting to 1000 [ 1495.878176][T22847] xfrm0 speed is unknown, defaulting to 1000 [ 1496.255457][ T28] audit: type=1400 audit(1774365498.719:1521): avc: denied { ioctl } for pid=22853 comm="syz.3.16078" path="socket:[201865]" dev="sockfs" ino=201865 ioctlcmd=0x586a scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 1496.352052][T22864] syzkaller0: entered promiscuous mode [ 1496.357782][T22864] syzkaller0: entered allmulticast mode [ 1496.387630][ T28] audit: type=1326 audit(1774365498.859:1522): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22851 comm="syz.2.16077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f136beac799 code=0x7ffc0000 [ 1496.458163][ T28] audit: type=1326 audit(1774365498.889:1523): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22851 comm="syz.2.16077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f136beac799 code=0x7ffc0000 [ 1496.615423][ T28] audit: type=1326 audit(1774365498.889:1524): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22851 comm="syz.2.16077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f136beac799 code=0x7ffc0000 [ 1496.816767][ T28] audit: type=1326 audit(1774365498.889:1525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22851 comm="syz.2.16077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f136beac799 code=0x7ffc0000 [ 1496.854373][T22876] netlink: 32 bytes leftover after parsing attributes in process `syz.0.16087'. [ 1497.019264][T22877] netlink: 8 bytes leftover after parsing attributes in process `syz.3.16086'. [ 1497.866752][ T28] audit: type=1326 audit(1774365498.889:1526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22851 comm="syz.2.16077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f136beac799 code=0x7ffc0000 [ 1498.058667][ T28] audit: type=1326 audit(1774365498.889:1527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22851 comm="syz.2.16077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f136beac799 code=0x7ffc0000 [ 1498.706775][T22883] netlink: 40 bytes leftover after parsing attributes in process `syz.0.16087'. [ 1499.034104][ T28] audit: type=1326 audit(1774365498.889:1528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22851 comm="syz.2.16077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f136beac799 code=0x7ffc0000 [ 1499.081333][ T28] audit: type=1326 audit(1774365498.889:1529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22851 comm="syz.2.16077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f136beac799 code=0x7ffc0000 [ 1499.307356][T22879] bond6: entered promiscuous mode [ 1499.529947][T22883] netlink: 40 bytes leftover after parsing attributes in process `syz.0.16087'. [ 1499.659735][T22883] netlink: 40 bytes leftover after parsing attributes in process `syz.0.16087'. [ 1500.053663][T22895] batman_adv: batadv0: Adding interface: macsec1 [ 1500.071705][T22895] batman_adv: batadv0: The MTU of interface macsec1 is too small (1468) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 1500.127951][T22895] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 1500.151138][T22895] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1500.176088][T22895] batman_adv: batadv0: Interface activated: macsec1 [ 1500.423252][T22912] netlink: 8 bytes leftover after parsing attributes in process `syz.2.16098'. [ 1500.620189][T22912] netlink: 24 bytes leftover after parsing attributes in process `syz.2.16098'. [ 1500.813732][T22924] netlink: 8 bytes leftover after parsing attributes in process `syz.5.16100'. [ 1500.825318][T22925] netlink: 8 bytes leftover after parsing attributes in process `syz.2.16098'. [ 1501.003263][T22915] syzkaller0: entered promiscuous mode [ 1501.028525][T22915] syzkaller0: entered allmulticast mode [ 1501.164975][T22932] netlink: 12 bytes leftover after parsing attributes in process `syz.0.16102'. [ 1501.531529][T22937] FAULT_INJECTION: forcing a failure. [ 1501.531529][T22937] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1501.566480][T22937] CPU: 1 UID: 0 PID: 22937 Comm: syz.0.16104 Tainted: G W syzkaller #0 PREEMPT(full) [ 1501.566506][T22937] Tainted: [W]=WARN [ 1501.566537][T22937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1501.566546][T22937] Call Trace: [ 1501.566553][T22937] [ 1501.566560][T22937] __dump_stack+0x1d/0x30 [ 1501.566583][T22937] dump_stack_lvl+0x95/0xd0 [ 1501.566665][T22937] dump_stack+0x15/0x1b [ 1501.566680][T22937] should_fail_ex+0x263/0x280 [ 1501.566703][T22937] should_fail+0xb/0x20 [ 1501.566724][T22937] should_fail_usercopy+0x1a/0x20 [ 1501.566748][T22937] _copy_from_iter+0xcf/0xea0 [ 1501.566822][T22937] ? should_fail_ex+0xd9/0x280 [ 1501.566839][T22937] ? should_failslab+0x8c/0xb0 [ 1501.566855][T22937] ? __kmalloc_noprof+0x1e3/0x4e0 [ 1501.566877][T22937] ? kernfs_fop_write_iter+0xe2/0x300 [ 1501.566990][T22937] kernfs_fop_write_iter+0x125/0x300 [ 1501.567022][T22937] ? __pfx_kernfs_fop_write_iter+0x10/0x10 [ 1501.567049][T22937] vfs_write+0x5a6/0x9f0 [ 1501.567136][T22937] ksys_write+0xdc/0x1a0 [ 1501.567215][T22937] __x64_sys_write+0x40/0x50 [ 1501.567231][T22937] x64_sys_call+0x27e1/0x3020 [ 1501.567330][T22937] do_syscall_64+0x12c/0x370 [ 1501.567351][T22937] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1501.567372][T22937] RIP: 0033:0x7f6e0cebc799 [ 1501.567387][T22937] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1501.567435][T22937] RSP: 002b:00007f6e0b917028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1501.567452][T22937] RAX: ffffffffffffffda RBX: 00007f6e0d135fa0 RCX: 00007f6e0cebc799 [ 1501.567465][T22937] RDX: 0000000000000027 RSI: 00002000000006c0 RDI: 0000000000000004 [ 1501.567478][T22937] RBP: 00007f6e0b917090 R08: 0000000000000000 R09: 0000000000000000 [ 1501.567489][T22937] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1501.567499][T22937] R13: 00007f6e0d136038 R14: 00007f6e0d135fa0 R15: 00007ffd9bd72e78 [ 1501.567513][T22937] [ 1501.892031][T22941] netlink: 'syz.0.16106': attribute type 8 has an invalid length. [ 1501.905215][T22941] netlink: 16402 bytes leftover after parsing attributes in process `syz.0.16106'. [ 1501.930601][T22941] netlink: 340 bytes leftover after parsing attributes in process `syz.0.16106'. [ 1502.006276][T22941] lo speed is unknown, defaulting to 1000 [ 1502.015948][T22941] xfrm0 speed is unknown, defaulting to 1000 [ 1502.403933][ T28] kauditd_printk_skb: 61 callbacks suppressed [ 1502.403947][ T28] audit: type=1326 audit(1774365504.869:1591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22944 comm="syz.2.16108" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f136beac799 code=0x7ffc0000 [ 1502.556604][T22955] bond4: (slave ip6gretap2): making interface the new active one [ 1502.565860][T22955] bond4: (slave ip6gretap2): Enslaving as an active interface with an up link [ 1502.576617][T22955] netlink: 12 bytes leftover after parsing attributes in process `syz.3.16111'. [ 1502.590768][ T28] audit: type=1326 audit(1774365504.909:1592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22944 comm="syz.2.16108" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f136beac799 code=0x7ffc0000 [ 1502.646720][ T28] audit: type=1326 audit(1774365504.909:1593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22944 comm="syz.2.16108" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f136beac799 code=0x7ffc0000 [ 1502.715733][ T28] audit: type=1326 audit(1774365504.909:1594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22944 comm="syz.2.16108" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f136beac799 code=0x7ffc0000 [ 1502.752837][ T28] audit: type=1326 audit(1774365504.909:1595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22944 comm="syz.2.16108" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f136beac799 code=0x7ffc0000 [ 1502.779021][ T28] audit: type=1326 audit(1774365504.909:1596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22944 comm="syz.2.16108" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f136beac799 code=0x7ffc0000 [ 1502.808761][T22968] FAULT_INJECTION: forcing a failure. [ 1502.808761][T22968] name failslab, interval 1, probability 0, space 0, times 0 [ 1502.823168][ T28] audit: type=1326 audit(1774365504.979:1597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22944 comm="syz.2.16108" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f136beac799 code=0x7ffc0000 [ 1502.849927][T22968] CPU: 0 UID: 0 PID: 22968 Comm: syz.3.16116 Tainted: G W syzkaller #0 PREEMPT(full) [ 1502.850014][T22968] Tainted: [W]=WARN [ 1502.850020][T22968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1502.850030][T22968] Call Trace: [ 1502.850035][T22968] [ 1502.850042][T22968] __dump_stack+0x1d/0x30 [ 1502.850064][T22968] dump_stack_lvl+0x95/0xd0 [ 1502.850082][T22968] dump_stack+0x15/0x1b [ 1502.850103][T22968] should_fail_ex+0x263/0x280 [ 1502.850124][T22968] should_failslab+0x8c/0xb0 [ 1502.850140][T22968] kmem_cache_alloc_node_noprof+0x6d/0x460 [ 1502.850165][T22968] ? __alloc_skb+0x2d6/0x690 [ 1502.850306][T22968] __alloc_skb+0x2d6/0x690 [ 1502.850324][T22968] ? __alloc_skb+0x200/0x690 [ 1502.850393][T22968] netlink_alloc_large_skb+0xbf/0xf0 [ 1502.850416][T22968] netlink_sendmsg+0x40c/0x6f0 [ 1502.850437][T22968] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1502.850518][T22968] ____sys_sendmsg+0x563/0x5b0 [ 1502.850617][T22968] ___sys_sendmsg+0x195/0x1e0 [ 1502.850647][T22968] __x64_sys_sendmsg+0xd4/0x160 [ 1502.850674][T22968] x64_sys_call+0x194c/0x3020 [ 1502.850743][T22968] do_syscall_64+0x12c/0x370 [ 1502.850780][T22968] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1502.850800][T22968] RIP: 0033:0x7ff19932c799 [ 1502.850814][T22968] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1502.850829][T22968] RSP: 002b:00007ff197d87028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1502.850871][T22968] RAX: ffffffffffffffda RBX: 00007ff1995a5fa0 RCX: 00007ff19932c799 [ 1502.850962][T22968] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 1502.850972][T22968] RBP: 00007ff197d87090 R08: 0000000000000000 R09: 0000000000000000 [ 1502.850982][T22968] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1502.850991][T22968] R13: 00007ff1995a6038 R14: 00007ff1995a5fa0 R15: 00007fff46ec2b58 [ 1502.851009][T22968] [ 1503.082042][ T28] audit: type=1326 audit(1774365504.979:1598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22944 comm="syz.2.16108" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f136beac799 code=0x7ffc0000 [ 1503.109864][ T28] audit: type=1326 audit(1774365504.999:1599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22944 comm="syz.2.16108" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f136beac799 code=0x7ffc0000 [ 1503.172983][T22977] netlink: 96 bytes leftover after parsing attributes in process `syz.7.16119'. [ 1503.187503][ T28] audit: type=1326 audit(1774365504.999:1600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22944 comm="syz.2.16108" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f136beac799 code=0x7ffc0000 [ 1503.257859][T22978] syzkaller0: entered promiscuous mode [ 1503.263526][T22978] syzkaller0: entered allmulticast mode [ 1503.395830][T22993] netlink: 32 bytes leftover after parsing attributes in process `syz.3.16120'. [ 1503.730333][T23020] ipip0: entered promiscuous mode [ 1503.735791][T23020] bond4: entered promiscuous mode [ 1503.741050][T23020] ip6gretap2: entered promiscuous mode [ 1503.772581][T23021] netlink: 40 bytes leftover after parsing attributes in process `syz.3.16120'. [ 1503.836381][T23023] netlink: 'syz.0.16122': attribute type 1 has an invalid length. [ 1503.860021][T23023] 8021q: adding VLAN 0 to HW filter on device bond7 [ 1503.887075][T23021] netlink: 40 bytes leftover after parsing attributes in process `syz.3.16120'. [ 1504.015794][T23023] team0: Device macvtap1 is already an upper device of the team interface [ 1504.050368][T23021] netlink: 40 bytes leftover after parsing attributes in process `syz.3.16120'. [ 1504.720049][T23047] syzkaller0: entered promiscuous mode [ 1504.751754][T23047] syzkaller0: entered allmulticast mode [ 1504.933564][T23067] netlink: 40 bytes leftover after parsing attributes in process `syz.7.16136'. [ 1505.306440][T23085] FAULT_INJECTION: forcing a failure. [ 1505.306440][T23085] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1505.333872][T23085] CPU: 0 UID: 0 PID: 23085 Comm: syz.5.16140 Tainted: G W syzkaller #0 PREEMPT(full) [ 1505.333903][T23085] Tainted: [W]=WARN [ 1505.333909][T23085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1505.333918][T23085] Call Trace: [ 1505.333923][T23085] [ 1505.334008][T23085] __dump_stack+0x1d/0x30 [ 1505.334030][T23085] dump_stack_lvl+0x95/0xd0 [ 1505.334093][T23085] dump_stack+0x15/0x1b [ 1505.334109][T23085] should_fail_ex+0x263/0x280 [ 1505.334129][T23085] should_fail+0xb/0x20 [ 1505.334145][T23085] should_fail_usercopy+0x1a/0x20 [ 1505.334214][T23085] _copy_to_user+0x20/0xa0 [ 1505.334235][T23085] simple_read_from_buffer+0xb5/0x130 [ 1505.334280][T23085] proc_fail_nth_read+0x10e/0x150 [ 1505.334306][T23085] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1505.334394][T23085] vfs_read+0x1ab/0x7f0 [ 1505.334420][T23085] ? __rcu_read_unlock+0x4e/0x70 [ 1505.334438][T23085] ? __fget_files+0x184/0x1c0 [ 1505.334461][T23085] ? mutex_lock+0x57/0x90 [ 1505.334510][T23085] ksys_read+0xdc/0x1a0 [ 1505.334524][T23085] __x64_sys_read+0x40/0x50 [ 1505.334586][T23085] x64_sys_call+0x2886/0x3020 [ 1505.334608][T23085] do_syscall_64+0x12c/0x370 [ 1505.334757][T23085] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1505.334774][T23085] RIP: 0033:0x7fbea84ccfce [ 1505.334786][T23085] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 1505.334799][T23085] RSP: 002b:00007fbea6f5efe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1505.334849][T23085] RAX: ffffffffffffffda RBX: 00007fbea6f5f6c0 RCX: 00007fbea84ccfce [ 1505.334863][T23085] RDX: 000000000000000f RSI: 00007fbea6f5f0a0 RDI: 0000000000000004 [ 1505.334875][T23085] RBP: 00007fbea6f5f090 R08: 0000000000000000 R09: 0000000000000000 [ 1505.334960][T23085] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1505.334970][T23085] R13: 00007fbea8786038 R14: 00007fbea8785fa0 R15: 00007ffd18f22618 [ 1505.334984][T23085] [ 1505.778044][T23120] FAULT_INJECTION: forcing a failure. [ 1505.778044][T23120] name failslab, interval 1, probability 0, space 0, times 0 [ 1505.797178][T23120] CPU: 1 UID: 0 PID: 23120 Comm: syz.5.16145 Tainted: G W syzkaller #0 PREEMPT(full) [ 1505.797282][T23120] Tainted: [W]=WARN [ 1505.797288][T23120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1505.797297][T23120] Call Trace: [ 1505.797303][T23120] [ 1505.797309][T23120] __dump_stack+0x1d/0x30 [ 1505.797331][T23120] dump_stack_lvl+0x95/0xd0 [ 1505.797468][T23120] dump_stack+0x15/0x1b [ 1505.797486][T23120] should_fail_ex+0x263/0x280 [ 1505.797507][T23120] should_failslab+0x8c/0xb0 [ 1505.797526][T23120] kmem_cache_alloc_node_noprof+0x6d/0x460 [ 1505.797633][T23120] ? __alloc_skb+0x2d6/0x690 [ 1505.797657][T23120] __alloc_skb+0x2d6/0x690 [ 1505.797696][T23120] ? __alloc_skb+0x200/0x690 [ 1505.797718][T23120] netlink_alloc_large_skb+0xbf/0xf0 [ 1505.797743][T23120] netlink_sendmsg+0x40c/0x6f0 [ 1505.797827][T23120] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1505.797930][T23120] ____sys_sendmsg+0x563/0x5b0 [ 1505.797958][T23120] ___sys_sendmsg+0x195/0x1e0 [ 1505.797992][T23120] __x64_sys_sendmsg+0xd4/0x160 [ 1505.798040][T23120] x64_sys_call+0x194c/0x3020 [ 1505.798062][T23120] do_syscall_64+0x12c/0x370 [ 1505.798157][T23120] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1505.798240][T23120] RIP: 0033:0x7fbea850c799 [ 1505.798256][T23120] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1505.798272][T23120] RSP: 002b:00007fbea6f5f028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1505.798340][T23120] RAX: ffffffffffffffda RBX: 00007fbea8785fa0 RCX: 00007fbea850c799 [ 1505.798419][T23120] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 1505.798432][T23120] RBP: 00007fbea6f5f090 R08: 0000000000000000 R09: 0000000000000000 [ 1505.798467][T23120] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1505.798508][T23120] R13: 00007fbea8786038 R14: 00007fbea8785fa0 R15: 00007ffd18f22618 [ 1505.798525][T23120] [ 1506.093049][T23132] netlink: 32 bytes leftover after parsing attributes in process `syz.0.16149'. [ 1506.283809][T23137] syzkaller0: entered promiscuous mode [ 1506.355834][T23137] syzkaller0: entered allmulticast mode [ 1506.509512][T23139] syztnl0: entered promiscuous mode [ 1506.516098][T23139] sit1: entered promiscuous mode [ 1506.523431][T23139] gre1: entered promiscuous mode [ 1506.530686][T23139] batman_adv: batadv0: Interface deactivated: macsec1 [ 1506.538665][T23139] macsec1: entered promiscuous mode [ 1506.546328][T23139] bridge1: entered promiscuous mode [ 1506.569546][T23140] bridge2: entered promiscuous mode [ 1506.577134][T23140] bridge3: entered promiscuous mode [ 1506.583780][T23140] bond7: entered promiscuous mode [ 1507.947253][T23175] netlink: 'syz.5.16156': attribute type 1 has an invalid length. [ 1507.961596][T23175] 8021q: adding VLAN 0 to HW filter on device bond7 [ 1508.249229][T23188] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1508.261372][T23188] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1508.680782][T23207] FAULT_INJECTION: forcing a failure. [ 1508.680782][T23207] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1508.694766][T23207] CPU: 1 UID: 0 PID: 23207 Comm: syz.0.16168 Tainted: G W syzkaller #0 PREEMPT(full) [ 1508.694792][T23207] Tainted: [W]=WARN [ 1508.694818][T23207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1508.694828][T23207] Call Trace: [ 1508.694833][T23207] [ 1508.694841][T23207] __dump_stack+0x1d/0x30 [ 1508.694865][T23207] dump_stack_lvl+0x95/0xd0 [ 1508.694885][T23207] dump_stack+0x15/0x1b [ 1508.694911][T23207] should_fail_ex+0x263/0x280 [ 1508.694925][T23207] should_fail+0xb/0x20 [ 1508.694938][T23207] should_fail_usercopy+0x1a/0x20 [ 1508.694952][T23207] _copy_from_user+0x1c/0xb0 [ 1508.695006][T23207] __copy_msghdr+0x244/0x300 [ 1508.695022][T23207] ___sys_sendmsg+0x10c/0x1e0 [ 1508.695044][T23207] __x64_sys_sendmsg+0xd4/0x160 [ 1508.695074][T23207] x64_sys_call+0x194c/0x3020 [ 1508.695106][T23207] do_syscall_64+0x12c/0x370 [ 1508.695119][T23207] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1508.695130][T23207] RIP: 0033:0x7f6e0cebc799 [ 1508.695197][T23207] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1508.695237][T23207] RSP: 002b:00007f6e0b917028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1508.695249][T23207] RAX: ffffffffffffffda RBX: 00007f6e0d135fa0 RCX: 00007f6e0cebc799 [ 1508.695256][T23207] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 1508.695263][T23207] RBP: 00007f6e0b917090 R08: 0000000000000000 R09: 0000000000000000 [ 1508.695291][T23207] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1508.695298][T23207] R13: 00007f6e0d136038 R14: 00007f6e0d135fa0 R15: 00007ffd9bd72e78 [ 1508.695307][T23207] [ 1508.898541][T23213] __nla_validate_parse: 7 callbacks suppressed [ 1508.898553][T23213] netlink: 96 bytes leftover after parsing attributes in process `syz.0.16170'. [ 1509.462406][T23226] syzkaller0: entered promiscuous mode [ 1509.468281][T23226] syzkaller0: entered allmulticast mode [ 1509.504290][ T28] kauditd_printk_skb: 151 callbacks suppressed [ 1509.504305][ T28] audit: type=1326 audit(1774365511.969:1752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23227 comm="syz.5.16176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbea850c799 code=0x7ffc0000 [ 1509.537476][ T28] audit: type=1326 audit(1774365511.969:1753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23227 comm="syz.5.16176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbea850c799 code=0x7ffc0000 [ 1509.561892][ T28] audit: type=1326 audit(1774365511.969:1754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23227 comm="syz.5.16176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbea850c799 code=0x7ffc0000 [ 1509.587526][ T28] audit: type=1326 audit(1774365511.969:1755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23227 comm="syz.5.16176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbea850c799 code=0x7ffc0000 [ 1509.614237][ T28] audit: type=1326 audit(1774365511.969:1756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23227 comm="syz.5.16176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fbea850c799 code=0x7ffc0000 [ 1509.645677][ T28] audit: type=1326 audit(1774365511.999:1757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23227 comm="syz.5.16176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbea850c799 code=0x7ffc0000 [ 1509.675851][ T28] audit: type=1326 audit(1774365512.029:1758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23227 comm="syz.5.16176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbea850c799 code=0x7ffc0000 [ 1509.706659][ T28] audit: type=1326 audit(1774365512.029:1759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23227 comm="syz.5.16176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbea850c799 code=0x7ffc0000 [ 1509.718774][T23235] ipt_REJECT: ECHOREPLY no longer supported. [ 1509.734208][ T28] audit: type=1326 audit(1774365512.029:1760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23227 comm="syz.5.16176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbea850c799 code=0x7ffc0000 [ 1509.767606][ T28] audit: type=1326 audit(1774365512.029:1761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23227 comm="syz.5.16176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=122 compat=0 ip=0x7fbea850c799 code=0x7ffc0000 [ 1509.840284][T23243] netlink: 4768 bytes leftover after parsing attributes in process `syz.3.16181'. [ 1509.945104][T23261] syzkaller0: entered promiscuous mode [ 1509.951482][T23261] syzkaller0: entered allmulticast mode [ 1510.069633][T23263] netlink: 12 bytes leftover after parsing attributes in process `syz.3.16188'. [ 1510.300282][T23272] netlink: 96 bytes leftover after parsing attributes in process `syz.7.16192'. [ 1510.721519][T23275] ipt_REJECT: ECHOREPLY no longer supported. [ 1510.763182][T23283] FAULT_INJECTION: forcing a failure. [ 1510.763182][T23283] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1510.776723][T23283] CPU: 1 UID: 0 PID: 23283 Comm: syz.0.16197 Tainted: G W syzkaller #0 PREEMPT(full) [ 1510.776753][T23283] Tainted: [W]=WARN [ 1510.776758][T23283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1510.776767][T23283] Call Trace: [ 1510.776773][T23283] [ 1510.776780][T23283] __dump_stack+0x1d/0x30 [ 1510.776872][T23283] dump_stack_lvl+0x95/0xd0 [ 1510.776890][T23283] dump_stack+0x15/0x1b [ 1510.776955][T23283] should_fail_ex+0x263/0x280 [ 1510.776976][T23283] should_fail+0xb/0x20 [ 1510.776994][T23283] should_fail_usercopy+0x1a/0x20 [ 1510.777014][T23283] _copy_from_user+0x1c/0xb0 [ 1510.777038][T23283] ip6gre_tunnel_siocdevprivate+0x13d/0x950 [ 1510.777068][T23283] dev_ifsioc+0x923/0xf60 [ 1510.777093][T23283] dev_ioctl+0x78c/0x960 [ 1510.777171][T23283] sock_ioctl+0x593/0x610 [ 1510.777182][T23283] ? __pfx_sock_ioctl+0x10/0x10 [ 1510.777227][T23283] __se_sys_ioctl+0xce/0x140 [ 1510.777279][T23283] __x64_sys_ioctl+0x43/0x50 [ 1510.777288][T23283] x64_sys_call+0x1563/0x3020 [ 1510.777348][T23283] do_syscall_64+0x12c/0x370 [ 1510.777399][T23283] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1510.777411][T23283] RIP: 0033:0x7f6e0cebc799 [ 1510.777420][T23283] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1510.777430][T23283] RSP: 002b:00007f6e0b917028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1510.777442][T23283] RAX: ffffffffffffffda RBX: 00007f6e0d135fa0 RCX: 00007f6e0cebc799 [ 1510.777509][T23283] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000004 [ 1510.777516][T23283] RBP: 00007f6e0b917090 R08: 0000000000000000 R09: 0000000000000000 [ 1510.777523][T23283] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1510.777530][T23283] R13: 00007f6e0d136038 R14: 00007f6e0d135fa0 R15: 00007ffd9bd72e78 [ 1510.777589][T23283] [ 1511.108314][T23305] ipt_REJECT: ECHOREPLY no longer supported. [ 1511.231900][T23314] FAULT_INJECTION: forcing a failure. [ 1511.231900][T23314] name failslab, interval 1, probability 0, space 0, times 0 [ 1511.254853][T23314] CPU: 1 UID: 0 PID: 23314 Comm: syz.7.16209 Tainted: G W syzkaller #0 PREEMPT(full) [ 1511.254918][T23314] Tainted: [W]=WARN [ 1511.254925][T23314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1511.254937][T23314] Call Trace: [ 1511.254944][T23314] [ 1511.254953][T23314] __dump_stack+0x1d/0x30 [ 1511.254978][T23314] dump_stack_lvl+0x95/0xd0 [ 1511.254999][T23314] dump_stack+0x15/0x1b [ 1511.255031][T23314] should_fail_ex+0x263/0x280 [ 1511.255058][T23314] should_failslab+0x8c/0xb0 [ 1511.255075][T23314] __kmalloc_cache_node_noprof+0x6b/0x480 [ 1511.255098][T23314] ? __get_vm_area_node+0x106/0x1d0 [ 1511.255184][T23314] __get_vm_area_node+0x106/0x1d0 [ 1511.255204][T23314] __vmalloc_node_range_noprof+0x291/0x12b0 [ 1511.255281][T23314] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 1511.255439][T23314] ? __schedule+0x93c/0xd40 [ 1511.255463][T23314] ? __rcu_read_unlock+0x4e/0x70 [ 1511.255482][T23314] ? avc_has_perm_noaudit+0xab/0x130 [ 1511.255505][T23314] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 1511.255528][T23314] __vmalloc_noprof+0xa4/0xf0 [ 1511.255594][T23314] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 1511.255612][T23314] bpf_prog_alloc_no_stats+0x47/0x390 [ 1511.255629][T23314] ? bpf_prog_alloc+0x2a/0x150 [ 1511.255645][T23314] bpf_prog_alloc+0x3c/0x150 [ 1511.255667][T23314] bpf_prog_load+0x506/0x1140 [ 1511.255688][T23314] ? security_bpf+0x2b/0x90 [ 1511.255703][T23314] __sys_bpf+0x505/0x7e0 [ 1511.255722][T23314] __x64_sys_bpf+0x41/0x50 [ 1511.255822][T23314] x64_sys_call+0x10cb/0x3020 [ 1511.255842][T23314] do_syscall_64+0x12c/0x370 [ 1511.255896][T23314] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1511.255912][T23314] RIP: 0033:0x7f263e20c799 [ 1511.255926][T23314] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1511.255995][T23314] RSP: 002b:00007f263cc67028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1511.256014][T23314] RAX: ffffffffffffffda RBX: 00007f263e485fa0 RCX: 00007f263e20c799 [ 1511.256027][T23314] RDX: 0000000000000070 RSI: 00002000000000c0 RDI: 0000000000000005 [ 1511.256039][T23314] RBP: 00007f263cc67090 R08: 0000000000000000 R09: 0000000000000000 [ 1511.256104][T23314] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1511.256114][T23314] R13: 00007f263e486038 R14: 00007f263e485fa0 R15: 00007ffcde1ec938 [ 1511.256129][T23314] [ 1511.256316][T23314] syz.7.16209: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=/,mems_allowed=0 [ 1511.528491][T23314] CPU: 1 UID: 0 PID: 23314 Comm: syz.7.16209 Tainted: G W syzkaller #0 PREEMPT(full) [ 1511.528509][T23314] Tainted: [W]=WARN [ 1511.528513][T23314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1511.528520][T23314] Call Trace: [ 1511.528524][T23314] [ 1511.528528][T23314] __dump_stack+0x1d/0x30 [ 1511.528569][T23314] dump_stack_lvl+0x95/0xd0 [ 1511.528582][T23314] dump_stack+0x15/0x1b [ 1511.528593][T23314] warn_alloc+0x145/0x1c0 [ 1511.528610][T23314] __vmalloc_node_range_noprof+0x2b6/0x12b0 [ 1511.528663][T23314] ? __schedule+0x93c/0xd40 [ 1511.528678][T23314] ? __rcu_read_unlock+0x4e/0x70 [ 1511.528689][T23314] ? avc_has_perm_noaudit+0xab/0x130 [ 1511.528742][T23314] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 1511.528754][T23314] __vmalloc_noprof+0xa4/0xf0 [ 1511.528766][T23314] ? bpf_prog_alloc_no_stats+0x47/0x390 [ 1511.528776][T23314] bpf_prog_alloc_no_stats+0x47/0x390 [ 1511.528804][T23314] ? bpf_prog_alloc+0x2a/0x150 [ 1511.528813][T23314] bpf_prog_alloc+0x3c/0x150 [ 1511.528981][T23314] bpf_prog_load+0x506/0x1140 [ 1511.528996][T23314] ? security_bpf+0x2b/0x90 [ 1511.529007][T23314] __sys_bpf+0x505/0x7e0 [ 1511.529020][T23314] __x64_sys_bpf+0x41/0x50 [ 1511.529112][T23314] x64_sys_call+0x10cb/0x3020 [ 1511.529135][T23314] do_syscall_64+0x12c/0x370 [ 1511.529148][T23314] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1511.529159][T23314] RIP: 0033:0x7f263e20c799 [ 1511.529168][T23314] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 1511.529177][T23314] RSP: 002b:00007f263cc67028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1511.529245][T23314] RAX: ffffffffffffffda RBX: 00007f263e485fa0 RCX: 00007f263e20c799 [ 1511.529252][T23314] RDX: 0000000000000070 RSI: 00002000000000c0 RDI: 0000000000000005 [ 1511.529385][T23314] RBP: 00007f263cc67090 R08: 0000000000000000 R09: 0000000000000000 [ 1511.529398][T23314] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1511.529408][T23314] R13: 00007f263e486038 R14: 00007f263e485fa0 R15: 00007ffcde1ec938 [ 1511.529418][T23314] [ 1511.529523][T23314] Mem-Info: [ 1511.765822][T23314] active_anon:8330 inactive_anon:14 isolated_anon:0 [ 1511.765822][T23314] active_file:17654 inactive_file:13084 isolated_file:0 [ 1511.765822][T23314] unevictable:0 dirty:494 writeback:0 [ 1511.765822][T23314] slab_reclaimable:4961 slab_unreclaimable:51941 [ 1511.765822][T23314] mapped:30074 shmem:770 pagetables:1902 [ 1511.765822][T23314] sec_pagetables:0 bounce:0 [ 1511.765822][T23314] kernel_misc_reclaimable:0 [ 1511.765822][T23314] free:1815559 free_pcp:12748 free_cma:0 [ 1511.814215][T23314] Node 0 active_anon:33320kB inactive_anon:56kB active_file:70616kB inactive_file:52336kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:120296kB dirty:1976kB writeback:0kB shmem:3080kB kernel_stack:7264kB pagetables:7608kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 1511.845093][T23314] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1511.880404][T23314] lowmem_reserve[]: 0 2879 7857 7857 [ 1511.886314][T23314] Node 0 DMA32 free:2944636kB boost:0kB min:4128kB low:7052kB high:9976kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:3129332kB managed:2948160kB mlocked:0kB bounce:0kB free_pcp:3524kB local_pcp:0kB free_cma:0kB [ 1511.919435][T23314] lowmem_reserve[]: 0 0 4978 4978 [ 1511.925027][T23314] Node 0 Normal free:4302192kB boost:0kB min:7188kB low:12284kB high:17380kB reserved_highatomic:0KB free_highatomic:0KB active_anon:33236kB inactive_anon:56kB active_file:70616kB inactive_file:52336kB unevictable:0kB writepending:1984kB zspages:0kB present:5242880kB managed:5098240kB mlocked:0kB bounce:0kB free_pcp:47612kB local_pcp:28924kB free_cma:0kB [ 1511.960092][T23314] lowmem_reserve[]: 0 0 0 0 [ 1511.965431][T23314] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 1511.981079][T23314] Node 0 DMA32: 5*4kB (M) 1*8kB (M) 4*16kB (M) 5*32kB (M) 4*64kB (M) 1*128kB (M) 2*256kB (M) 3*512kB (M) 3*1024kB (M) 3*2048kB (M) 716*4096kB (M) = 2944636kB [ 1512.009271][T23314] Node 0 Normal: 502*4kB (UE) 2887*8kB (UME) 604*16kB (UME) 927*32kB (UME) 429*64kB (UME) 323*128kB (UME) 261*256kB (UM) 204*512kB (UM) 216*1024kB (UM) 176*2048kB (UM) 834*4096kB (UM) = 4302192kB [ 1512.031499][T23314] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 1512.041628][T23314] 31490 total pagecache pages [ 1512.046820][T23314] 14 pages in swap cache [ 1512.046914][ T2988] ================================================================== [ 1512.046943][ T2988] BUG: KCSAN: data-race in _prb_read_valid / prb_reserve [ 1512.046977][ T2988] [ 1512.046982][ T2988] write to 0xffffffff86d21988 of 88 bytes by task 23314 on cpu 1: [ 1512.046998][ T2988] prb_reserve+0x6e6/0xae0 [ 1512.047020][ T2988] vprintk_store+0x54a/0x910 [ 1512.047036][ T2988] vprintk_emit+0x1a4/0x600 [ 1512.047052][ T2988] vprintk_default+0x26/0x30 [ 1512.047069][ T2988] vprintk+0x1d/0x30 [ 1512.047089][ T2988] _printk+0x79/0xa0 [ 1512.047105][ T2988] show_swap_cache_info+0x31/0x80 [ 1512.047125][ T2988] __show_mem+0x135d/0x1440 [ 1512.047144][ T2988] warn_alloc+0x1a1/0x1c0 [ 1512.047163][ T2988] __vmalloc_node_range_noprof+0x2b6/0x12b0 [ 1512.047185][ T2988] __vmalloc_noprof+0xa4/0xf0 [ 1512.047204][ T2988] bpf_prog_alloc_no_stats+0x47/0x390 [ 1512.047229][ T2988] bpf_prog_alloc+0x3c/0x150 [ 1512.047244][ T2988] bpf_prog_load+0x506/0x1140 [ 1512.047259][ T2988] __sys_bpf+0x505/0x7e0 [ 1512.047273][ T2988] __x64_sys_bpf+0x41/0x50 [ 1512.047296][ T2988] x64_sys_call+0x10cb/0x3020 [ 1512.051680][T23314] Free swap = 124940kB [ 1512.060229][ T2988] do_syscall_64+0x12c/0x370 [ 1512.060257][ T2988] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1512.060274][ T2988] [ 1512.060279][ T2988] read to 0xffffffff86d21988 of 8 bytes by task 2988 on cpu 0: [ 1512.060292][ T2988] _prb_read_valid+0x383/0x950 [ 1512.060316][ T2988] prb_read_valid+0x3c/0x60 [ 1512.060346][ T2988] syslog_print+0x258/0x560 [ 1512.060362][ T2988] do_syslog+0x52b/0x7f0 [ 1512.060376][ T2988] __x64_sys_syslog+0x41/0x50 [ 1512.060392][ T2988] x64_sys_call+0x2b9e/0x3020 [ 1512.060416][ T2988] do_syscall_64+0x12c/0x370 [ 1512.060432][ T2988] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1512.060450][ T2988] [ 1512.060454][ T2988] value changed: 0x00000000000038fb -> 0x00000000000058fb [ 1512.060465][ T2988] [ 1512.060469][ T2988] Reported by Kernel Concurrency Sanitizer on: [ 1512.060483][ T2988] CPU: 0 UID: 0 PID: 2988 Comm: klogd Tainted: G W syzkaller #0 PREEMPT(full) [ 1512.060506][ T2988] Tainted: [W]=WARN [ 1512.060511][ T2988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 1512.060521][ T2988] ================================================================== [ 1512.290321][T23314] Total swap = 124996kB [ 1512.295001][T23314] 2097051 pages RAM [ 1512.299392][T23314] 0 pages HighMem/MovableOnly [ 1512.304138][T23314] 81611 pages reserved